{"url":"http://public2.vulnerablecode.io/api/packages/504999?format=json","purl":"pkg:apk/alpine/firefox@82.0-r0?arch=aarch64&distroversion=v3.17&reponame=community","type":"apk","namespace":"alpine","name":"firefox","version":"82.0-r0","qualifiers":{"arch":"aarch64","distroversion":"v3.17","reponame":"community"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"82.0.3-r0","latest_non_vulnerable_version":"103.0-r0","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33675?format=json","vulnerability_id":"VCID-1q54-juu2-xbat","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Mozilla Thunderbird, the worst of which could result in the arbitrary\n    execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15683.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15683.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-15683","reference_id":"","reference_type":"","scores":[{"value":"0.01566","scoring_system":"epss","scoring_elements":"0.81583","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01566","scoring_system":"epss","scoring_elements":"0.81544","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01566","scoring_system":"epss","scoring_elements":"0.81545","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01566","scoring_system":"epss","scoring_elements":"0.81547","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01566","scoring_system":"epss","scoring_elements":"0.81569","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01566","scoring_system":"epss","scoring_elements":"0.81578","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01566","scoring_system":"epss","scoring_elements":"0.81443","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01566","scoring_system":"epss","scoring_elements":"0.81455","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01566","scoring_system":"epss","scoring_elements":"0.81476","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01566","scoring_system":"epss","scoring_elements":"0.81474","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01566","scoring_system":"epss","scoring_elements":"0.81501","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01566","scoring_system":"epss","scoring_elements":"0.81507","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01566","scoring_system":"epss","scoring_elements":"0.81527","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01566","scoring_system":"epss","scoring_elements":"0.81514","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-15683"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15683","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15683"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15969","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15969"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1889932","reference_id":"1889932","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1889932"},{"reference_url":"https://security.archlinux.org/ASA-202011-1","reference_id":"ASA-202011-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202011-1"},{"reference_url":"https://security.archlinux.org/AVG-1256","reference_id":"AVG-1256","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1256"},{"reference_url":"https://security.gentoo.org/glsa/202010-08","reference_id":"GLSA-202010-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202010-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-45","reference_id":"mfsa2020-45","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-45"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-46","reference_id":"mfsa2020-46","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-46"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-47","reference_id":"mfsa2020-47","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-47"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4310","reference_id":"RHSA-2020:4310","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4310"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4311","reference_id":"RHSA-2020:4311","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4311"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4315","reference_id":"RHSA-2020:4315","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4315"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4317","reference_id":"RHSA-2020:4317","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4317"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4330","reference_id":"RHSA-2020:4330","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4330"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4909","reference_id":"RHSA-2020:4909","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4909"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4913","reference_id":"RHSA-2020:4913","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4913"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4944","reference_id":"RHSA-2020:4944","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4944"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4945","reference_id":"RHSA-2020:4945","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4945"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4947","reference_id":"RHSA-2020:4947","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4947"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4948","reference_id":"RHSA-2020:4948","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4948"},{"reference_url":"https://usn.ubuntu.com/4599-1/","reference_id":"USN-4599-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4599-1/"},{"reference_url":"https://usn.ubuntu.com/4599-2/","reference_id":"USN-4599-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4599-2/"},{"reference_url":"https://usn.ubuntu.com/4647-1/","reference_id":"USN-4647-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4647-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/504999?format=json","purl":"pkg:apk/alpine/firefox@82.0-r0?arch=aarch64&distroversion=v3.17&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@82.0-r0%3Farch=aarch64&distroversion=v3.17&reponame=community"}],"aliases":["CVE-2020-15683"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1q54-juu2-xbat"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63181?format=json","vulnerability_id":"VCID-8ckv-8maw-k3af","summary":"When multiple WASM threads had a reference to a module, and were looking up exported functions, one WASM thread could have overwritten another's entry in a shared stub table, resulting in a potentially exploitable crash.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-15681","reference_id":"","reference_type":"","scores":[{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.6291","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62741","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62894","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62909","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62799","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62829","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62793","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62844","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62861","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62879","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62867","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62845","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62886","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62893","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62873","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-15681"},{"reference_url":"https://security.archlinux.org/ASA-202011-1","reference_id":"ASA-202011-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202011-1"},{"reference_url":"https://security.archlinux.org/AVG-1256","reference_id":"AVG-1256","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1256"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-45","reference_id":"mfsa2020-45","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-45"},{"reference_url":"https://usn.ubuntu.com/4599-1/","reference_id":"USN-4599-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4599-1/"},{"reference_url":"https://usn.ubuntu.com/4599-2/","reference_id":"USN-4599-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4599-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/504999?format=json","purl":"pkg:apk/alpine/firefox@82.0-r0?arch=aarch64&distroversion=v3.17&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@82.0-r0%3Farch=aarch64&distroversion=v3.17&reponame=community"}],"aliases":["CVE-2020-15681"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8ckv-8maw-k3af"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63182?format=json","vulnerability_id":"VCID-9z19-npd3-sbar","summary":"When a link to an external protocol was clicked, a prompt was presented that allowed the user to choose what application to open it in. An attacker could induce that prompt to be associated with an origin they didn't control, resulting in a spoofing attack. This was fixed by changing external protocol prompts to be tab-modal while also ensuring they could not be incorrectly associated with a different origin.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-15682","reference_id":"","reference_type":"","scores":[{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32507","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32865","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32707","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32593","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32996","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.33031","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32854","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32901","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32932","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32935","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32897","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32872","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32912","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.3289","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32855","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-15682"},{"reference_url":"https://security.archlinux.org/ASA-202011-1","reference_id":"ASA-202011-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202011-1"},{"reference_url":"https://security.archlinux.org/AVG-1256","reference_id":"AVG-1256","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1256"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-45","reference_id":"mfsa2020-45","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-45"},{"reference_url":"https://usn.ubuntu.com/4599-1/","reference_id":"USN-4599-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4599-1/"},{"reference_url":"https://usn.ubuntu.com/4599-2/","reference_id":"USN-4599-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4599-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/504999?format=json","purl":"pkg:apk/alpine/firefox@82.0-r0?arch=aarch64&distroversion=v3.17&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@82.0-r0%3Farch=aarch64&distroversion=v3.17&reponame=community"}],"aliases":["CVE-2020-15682"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9z19-npd3-sbar"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63180?format=json","vulnerability_id":"VCID-m1pc-eqy5-2khu","summary":"If a valid external protocol handler was referenced in an image tag, the resulting broken image size could be distinguished from a broken image size of a non-existent protocol handler. This allowed an attacker to successfully probe whether an external protocol handler was registered.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-15680","reference_id":"","reference_type":"","scores":[{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55006","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.54931","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55013","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55032","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55036","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55061","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55037","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55086","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55098","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55079","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55099","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55103","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55082","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-15680"},{"reference_url":"https://security.archlinux.org/ASA-202011-1","reference_id":"ASA-202011-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202011-1"},{"reference_url":"https://security.archlinux.org/AVG-1256","reference_id":"AVG-1256","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1256"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-45","reference_id":"mfsa2020-45","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-45"},{"reference_url":"https://usn.ubuntu.com/4599-1/","reference_id":"USN-4599-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4599-1/"},{"reference_url":"https://usn.ubuntu.com/4599-2/","reference_id":"USN-4599-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4599-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/504999?format=json","purl":"pkg:apk/alpine/firefox@82.0-r0?arch=aarch64&distroversion=v3.17&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@82.0-r0%3Farch=aarch64&distroversion=v3.17&reponame=community"}],"aliases":["CVE-2020-15680"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m1pc-eqy5-2khu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63183?format=json","vulnerability_id":"VCID-ndex-79sm-gfak","summary":"Mozilla developers Christian Holler, Sebastian Hengst, Bogdan Tara, and Tyson Smith reported memory safety bugs present in Firefox 81. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15684.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15684.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-15684","reference_id":"","reference_type":"","scores":[{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61763","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.6193","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.6192","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61938","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61837","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61867","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61839","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61889","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61904","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61925","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61913","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61893","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61937","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61941","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61924","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-15684"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1963792","reference_id":"1963792","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1963792"},{"reference_url":"https://security.archlinux.org/ASA-202011-1","reference_id":"ASA-202011-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202011-1"},{"reference_url":"https://security.archlinux.org/AVG-1256","reference_id":"AVG-1256","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1256"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-45","reference_id":"mfsa2020-45","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-45"},{"reference_url":"https://usn.ubuntu.com/4599-1/","reference_id":"USN-4599-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4599-1/"},{"reference_url":"https://usn.ubuntu.com/4599-2/","reference_id":"USN-4599-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4599-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/504999?format=json","purl":"pkg:apk/alpine/firefox@82.0-r0?arch=aarch64&distroversion=v3.17&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@82.0-r0%3Farch=aarch64&distroversion=v3.17&reponame=community"}],"aliases":["CVE-2020-15684"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ndex-79sm-gfak"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40868?format=json","vulnerability_id":"VCID-unmm-942j-gkh7","summary":"crossbeam-channel Undefined Behavior before v0.4.4\n### Impact\n\nThe affected version of this crate's the `bounded` channel incorrectly assumes that `Vec::from_iter` has allocated capacity that same as the number of iterator elements. `Vec::from_iter` does not actually guarantee that and may allocate extra memory. The destructor of the `bounded` channel reconstructs `Vec` from the raw pointer based on the incorrect assumes described above. This is unsound and causing deallocation with the incorrect capacity when `Vec::from_iter` has allocated different sizes with the number of iterator elements.\n\n### Patches\n\nThis has been fixed in crossbeam-channel 0.4.4.\n\nWe recommend users to upgrade to 0.4.4.\n\n### References\n\nSee https://github.com/crossbeam-rs/crossbeam/pull/533, https://github.com/crossbeam-rs/crossbeam/issues/539, and https://github.com/RustSec/advisory-db/pull/425 for more details.\n\n### License\n\nThis advisory is in the public domain.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15254.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15254.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-15254","reference_id":"","reference_type":"","scores":[{"value":"0.0051","scoring_system":"epss","scoring_elements":"0.66434","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0051","scoring_system":"epss","scoring_elements":"0.66285","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0051","scoring_system":"epss","scoring_elements":"0.66324","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0051","scoring_system":"epss","scoring_elements":"0.66351","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0051","scoring_system":"epss","scoring_elements":"0.66321","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0051","scoring_system":"epss","scoring_elements":"0.66369","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0051","scoring_system":"epss","scoring_elements":"0.66383","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0051","scoring_system":"epss","scoring_elements":"0.66403","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0051","scoring_system":"epss","scoring_elements":"0.6639","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0051","scoring_system":"epss","scoring_elements":"0.66359","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0051","scoring_system":"epss","scoring_elements":"0.66394","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0051","scoring_system":"epss","scoring_elements":"0.6641","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0051","scoring_system":"epss","scoring_elements":"0.66395","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0051","scoring_system":"epss","scoring_elements":"0.66419","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-15254"},{"reference_url":"https://github.com/crossbeam-rs/crossbeam","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/crossbeam-rs/crossbeam"},{"reference_url":"https://github.com/crossbeam-rs/crossbeam/issues/539","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/crossbeam-rs/crossbeam/issues/539"},{"reference_url":"https://github.com/crossbeam-rs/crossbeam/pull/533","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/crossbeam-rs/crossbeam/pull/533"},{"reference_url":"https://github.com/crossbeam-rs/crossbeam/security/advisories/GHSA-v5m7-53cv-f3hx","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/crossbeam-rs/crossbeam/security/advisories/GHSA-v5m7-53cv-f3hx"},{"reference_url":"https://github.com/RustSec/advisory-db/pull/425","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/RustSec/advisory-db/pull/425"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-15254","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-15254"},{"reference_url":"https://rustsec.org/advisories/RUSTSEC-2020-0052.html","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://rustsec.org/advisories/RUSTSEC-2020-0052.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1963791","reference_id":"1963791","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1963791"},{"reference_url":"https://security.archlinux.org/ASA-202011-1","reference_id":"ASA-202011-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202011-1"},{"reference_url":"https://security.archlinux.org/AVG-1256","reference_id":"AVG-1256","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1256"},{"reference_url":"https://github.com/advisories/GHSA-v5m7-53cv-f3hx","reference_id":"GHSA-v5m7-53cv-f3hx","reference_type":"","scores":[{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-v5m7-53cv-f3hx"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-45","reference_id":"mfsa2020-45","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-45"},{"reference_url":"https://usn.ubuntu.com/4599-1/","reference_id":"USN-4599-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4599-1/"},{"reference_url":"https://usn.ubuntu.com/4599-2/","reference_id":"USN-4599-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4599-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/504999?format=json","purl":"pkg:apk/alpine/firefox@82.0-r0?arch=aarch64&distroversion=v3.17&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@82.0-r0%3Farch=aarch64&distroversion=v3.17&reponame=community"}],"aliases":["CVE-2020-15254","GHSA-v5m7-53cv-f3hx"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-unmm-942j-gkh7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33678?format=json","vulnerability_id":"VCID-uwzy-pbnf-kkfw","summary":"Multiple vulnerabilities have been found in Mozilla Firefox and\n    Mozilla Thunderbird, the worst of which could result in the arbitrary\n    execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15969.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15969.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-15969","reference_id":"","reference_type":"","scores":[{"value":"0.03155","scoring_system":"epss","scoring_elements":"0.86955","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03155","scoring_system":"epss","scoring_elements":"0.86912","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03155","scoring_system":"epss","scoring_elements":"0.86906","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03155","scoring_system":"epss","scoring_elements":"0.86922","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03155","scoring_system":"epss","scoring_elements":"0.86928","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03155","scoring_system":"epss","scoring_elements":"0.86945","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03155","scoring_system":"epss","scoring_elements":"0.8695","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03155","scoring_system":"epss","scoring_elements":"0.86851","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03155","scoring_system":"epss","scoring_elements":"0.86861","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03155","scoring_system":"epss","scoring_elements":"0.8688","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03155","scoring_system":"epss","scoring_elements":"0.86874","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03155","scoring_system":"epss","scoring_elements":"0.86894","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03155","scoring_system":"epss","scoring_elements":"0.86903","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03155","scoring_system":"epss","scoring_elements":"0.86916","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-15969"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15683","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15683"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15959","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15959"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15960","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15960"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15961","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15961"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15962","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15962"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15963","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15963"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15964","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15964"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15965","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15965"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15966","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15966"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15967","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15967"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15968","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15968"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15969","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15969"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15970","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15970"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15971","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15971"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15972","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15972"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15973","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15973"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15974","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15974"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15976","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15976"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15977","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15977"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15979","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15979"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15980","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15980"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15981"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15982","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15982"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15984","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15984"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15985","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15985"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15986","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15986"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15987","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15987"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15988","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15988"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15989","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15989"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15990","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15990"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15991","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15991"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15992","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15992"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16000"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16001","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16001"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16002","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16003","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16003"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16004","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16004"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16005","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16005"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16006","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16006"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16008","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16008"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16009","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16009"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16013","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16013"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16014","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16014"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16015","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16015"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16016","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16016"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16017","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16017"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16018","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16018"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16019","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16019"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16020","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16020"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16021","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16021"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16022","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16022"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16023","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16023"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16024","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16024"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16025","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16025"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16026","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16026"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16027","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16027"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16028","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16028"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16029","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16029"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16030","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16030"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16031","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16031"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16032","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16032"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16033","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16033"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16034","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16034"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16035","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16035"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16036","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16036"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16037","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16037"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16038","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16038"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16039","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16039"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16040","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16040"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16041","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16041"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36765","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36765"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6510","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6510"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6514","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6514"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6515","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6515"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6517","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6517"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6518","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6518"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6520"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6521","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6521"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6522","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6522"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6523","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6523"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6524","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6524"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6525","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6525"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6526","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6526"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6527","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6527"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6528","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6528"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6529","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6529"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6530","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6530"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6531","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6531"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6532","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6532"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6533","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6533"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6534","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6534"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6535","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6535"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6536","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6536"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6537","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6537"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6538"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6539","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6539"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6540","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6540"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6541","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6541"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6542","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6542"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6543","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6544","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6544"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6545","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6545"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6548","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6549","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6549"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6551","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6551"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6552","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6552"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6553","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6553"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6554","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6554"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6555","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6555"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6556","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6556"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6557","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6557"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6559","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6559"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6560","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6560"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6561","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6561"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6562","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6562"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6563","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6563"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6564","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6564"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6565","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6565"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6566"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6567","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6567"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6569","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6569"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6570","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6570"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6571","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6571"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6575","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6575"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6576","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6576"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1885885","reference_id":"1885885","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1885885"},{"reference_url":"https://security.archlinux.org/ASA-202010-1","reference_id":"ASA-202010-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202010-1"},{"reference_url":"https://security.archlinux.org/ASA-202011-1","reference_id":"ASA-202011-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202011-1"},{"reference_url":"https://security.archlinux.org/AVG-1238","reference_id":"AVG-1238","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1238"},{"reference_url":"https://security.archlinux.org/AVG-1256","reference_id":"AVG-1256","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1256"},{"reference_url":"https://security.gentoo.org/glsa/202010-01","reference_id":"GLSA-202010-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202010-01"},{"reference_url":"https://security.gentoo.org/glsa/202010-08","reference_id":"GLSA-202010-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202010-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-45","reference_id":"mfsa2020-45","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-45"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-46","reference_id":"mfsa2020-46","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-46"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-47","reference_id":"mfsa2020-47","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-47"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4235","reference_id":"RHSA-2020:4235","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4235"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4310","reference_id":"RHSA-2020:4310","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4310"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4311","reference_id":"RHSA-2020:4311","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4311"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4315","reference_id":"RHSA-2020:4315","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4315"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4317","reference_id":"RHSA-2020:4317","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4317"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4330","reference_id":"RHSA-2020:4330","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4330"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4909","reference_id":"RHSA-2020:4909","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4909"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4913","reference_id":"RHSA-2020:4913","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4913"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4944","reference_id":"RHSA-2020:4944","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4944"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4945","reference_id":"RHSA-2020:4945","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4945"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4947","reference_id":"RHSA-2020:4947","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4947"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4948","reference_id":"RHSA-2020:4948","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4948"},{"reference_url":"https://usn.ubuntu.com/4599-1/","reference_id":"USN-4599-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4599-1/"},{"reference_url":"https://usn.ubuntu.com/4599-2/","reference_id":"USN-4599-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4599-2/"},{"reference_url":"https://usn.ubuntu.com/4647-1/","reference_id":"USN-4647-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4647-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/504999?format=json","purl":"pkg:apk/alpine/firefox@82.0-r0?arch=aarch64&distroversion=v3.17&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@82.0-r0%3Farch=aarch64&distroversion=v3.17&reponame=community"}],"aliases":["CVE-2020-15969"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uwzy-pbnf-kkfw"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@82.0-r0%3Farch=aarch64&distroversion=v3.17&reponame=community"}