{"url":"http://public2.vulnerablecode.io/api/packages/79132?format=json","purl":"pkg:ebuild/www-client/firefox-bin@68.6.0","type":"ebuild","namespace":"www-client","name":"firefox-bin","version":"68.6.0","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"68.7.0","latest_non_vulnerable_version":"137.0.1","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31946?format=json","vulnerability_id":"VCID-1a64-m2w1-hkhs","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6814.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6814.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6814","reference_id":"","reference_type":"","scores":[{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74841","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74736","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74742","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74745","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74748","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74777","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74801","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74769","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74788","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74619","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74623","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.7465","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74624","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74655","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.7467","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74693","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74673","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74664","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74701","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74709","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.747","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6814"},{"reference_url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1592078%2C1604847%2C1608256%2C1612636%2C1614339","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1592078%2C1604847%2C1608256%2C1612636%2C1614339"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2020-08/","reference_id":"","reference_type":"","scores":[],"url":"https://www.mozilla.org/security/advisories/mfsa2020-08/"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2020-09/","reference_id":"","reference_type":"","scores":[],"url":"https://www.mozilla.org/security/advisories/mfsa2020-09/"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2020-10/","reference_id":"","reference_type":"","scores":[],"url":"https://www.mozilla.org/security/advisories/mfsa2020-10/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1812205","reference_id":"1812205","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1812205"},{"reference_url":"https://security.archlinux.org/ASA-202003-11","reference_id":"ASA-202003-11","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202003-11"},{"reference_url":"https://security.archlinux.org/ASA-202003-8","reference_id":"ASA-202003-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202003-8"},{"reference_url":"https://security.archlinux.org/AVG-1112","reference_id":"AVG-1112","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1112"},{"reference_url":"https://security.archlinux.org/AVG-1115","reference_id":"AVG-1115","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1115"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-6814","reference_id":"CVE-2020-6814","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-6814"},{"reference_url":"https://security.gentoo.org/glsa/202003-02","reference_id":"GLSA-202003-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-02"},{"reference_url":"https://security.gentoo.org/glsa/202003-10","reference_id":"GLSA-202003-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-08","reference_id":"mfsa2020-08","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-09","reference_id":"mfsa2020-09","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-09"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-10","reference_id":"mfsa2020-10","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-10"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0815","reference_id":"RHSA-2020:0815","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0815"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0816","reference_id":"RHSA-2020:0816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0816"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0819","reference_id":"RHSA-2020:0819","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0819"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0820","reference_id":"RHSA-2020:0820","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0820"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0905","reference_id":"RHSA-2020:0905","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0905"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0914","reference_id":"RHSA-2020:0914","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0914"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0918","reference_id":"RHSA-2020:0918","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0918"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0919","reference_id":"RHSA-2020:0919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0919"},{"reference_url":"https://usn.ubuntu.com/4299-1/","reference_id":"USN-4299-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4299-1/"},{"reference_url":"https://usn.ubuntu.com/4328-1/","reference_id":"USN-4328-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4328-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79132?format=json","purl":"pkg:ebuild/www-client/firefox-bin@68.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@68.6.0"}],"aliases":["CVE-2020-6814"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1a64-m2w1-hkhs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51225?format=json","vulnerability_id":"VCID-2sd2-88zt-kkaq","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the\n    worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6796.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6796.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6796","reference_id":"","reference_type":"","scores":[{"value":"0.00866","scoring_system":"epss","scoring_elements":"0.75308","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00866","scoring_system":"epss","scoring_elements":"0.75238","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00866","scoring_system":"epss","scoring_elements":"0.75262","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00866","scoring_system":"epss","scoring_elements":"0.75244","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00866","scoring_system":"epss","scoring_elements":"0.75252","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00866","scoring_system":"epss","scoring_elements":"0.75077","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00866","scoring_system":"epss","scoring_elements":"0.75079","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00866","scoring_system":"epss","scoring_elements":"0.75109","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00866","scoring_system":"epss","scoring_elements":"0.75085","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00866","scoring_system":"epss","scoring_elements":"0.7512","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00866","scoring_system":"epss","scoring_elements":"0.75132","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00866","scoring_system":"epss","scoring_elements":"0.75154","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00866","scoring_system":"epss","scoring_elements":"0.75121","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00866","scoring_system":"epss","scoring_elements":"0.75158","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00866","scoring_system":"epss","scoring_elements":"0.75165","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00866","scoring_system":"epss","scoring_elements":"0.75193","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00866","scoring_system":"epss","scoring_elements":"0.75196","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00866","scoring_system":"epss","scoring_elements":"0.752","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00866","scoring_system":"epss","scoring_elements":"0.75209","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6796"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6796","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6796"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1801916","reference_id":"1801916","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1801916"},{"reference_url":"https://security.archlinux.org/ASA-202002-5","reference_id":"ASA-202002-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202002-5"},{"reference_url":"https://security.archlinux.org/AVG-1096","reference_id":"AVG-1096","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1096"},{"reference_url":"https://security.gentoo.org/glsa/202003-02","reference_id":"GLSA-202003-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-05","reference_id":"mfsa2020-05","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-05"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-06","reference_id":"mfsa2020-06","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0512","reference_id":"RHSA-2020:0512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0512"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0519","reference_id":"RHSA-2020:0519","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0519"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0520","reference_id":"RHSA-2020:0520","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0520"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0521","reference_id":"RHSA-2020:0521","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0521"},{"reference_url":"https://usn.ubuntu.com/4278-1/","reference_id":"USN-4278-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4278-1/"},{"reference_url":"https://usn.ubuntu.com/4278-2/","reference_id":"USN-4278-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4278-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79132?format=json","purl":"pkg:ebuild/www-client/firefox-bin@68.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@68.6.0"}],"aliases":["CVE-2020-6796"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2sd2-88zt-kkaq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31932?format=json","vulnerability_id":"VCID-3smq-ax5u-ryd3","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17012.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17012.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17012","reference_id":"","reference_type":"","scores":[{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84426","published_at":"2026-05-14T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84318","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84337","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84362","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84379","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84378","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84394","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84183","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84196","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84214","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84215","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84237","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84243","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84261","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84256","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84253","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84275","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84276","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.8428","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84304","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84314","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17012"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1779437","reference_id":"1779437","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1779437"},{"reference_url":"https://security.archlinux.org/ASA-201912-1","reference_id":"ASA-201912-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201912-1"},{"reference_url":"https://security.archlinux.org/ASA-201912-2","reference_id":"ASA-201912-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201912-2"},{"reference_url":"https://security.archlinux.org/AVG-1071","reference_id":"AVG-1071","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1071"},{"reference_url":"https://security.archlinux.org/AVG-1072","reference_id":"AVG-1072","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1072"},{"reference_url":"https://security.gentoo.org/glsa/202003-02","reference_id":"GLSA-202003-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-02"},{"reference_url":"https://security.gentoo.org/glsa/202003-10","reference_id":"GLSA-202003-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-36","reference_id":"mfsa2019-36","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-36"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-37","reference_id":"mfsa2019-37","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-37"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-38","reference_id":"mfsa2019-38","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-38"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4107","reference_id":"RHSA-2019:4107","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4108","reference_id":"RHSA-2019:4108","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4111","reference_id":"RHSA-2019:4111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4148","reference_id":"RHSA-2019:4148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4195","reference_id":"RHSA-2019:4195","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4195"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4205","reference_id":"RHSA-2019:4205","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4205"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0292","reference_id":"RHSA-2020:0292","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0292"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0295","reference_id":"RHSA-2020:0295","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0295"},{"reference_url":"https://usn.ubuntu.com/4216-1/","reference_id":"USN-4216-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4216-1/"},{"reference_url":"https://usn.ubuntu.com/4216-2/","reference_id":"USN-4216-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4216-2/"},{"reference_url":"https://usn.ubuntu.com/4241-1/","reference_id":"USN-4241-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4241-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79132?format=json","purl":"pkg:ebuild/www-client/firefox-bin@68.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@68.6.0"}],"aliases":["CVE-2019-17012"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3smq-ax5u-ryd3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51226?format=json","vulnerability_id":"VCID-4c3c-ygt3-kbg5","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the\n    worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6797.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6797.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6797","reference_id":"","reference_type":"","scores":[{"value":"0.0102","scoring_system":"epss","scoring_elements":"0.77416","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0102","scoring_system":"epss","scoring_elements":"0.7734","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0102","scoring_system":"epss","scoring_elements":"0.77362","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0102","scoring_system":"epss","scoring_elements":"0.77351","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0102","scoring_system":"epss","scoring_elements":"0.7737","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0102","scoring_system":"epss","scoring_elements":"0.77159","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0102","scoring_system":"epss","scoring_elements":"0.77165","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0102","scoring_system":"epss","scoring_elements":"0.77195","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0102","scoring_system":"epss","scoring_elements":"0.77176","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0102","scoring_system":"epss","scoring_elements":"0.77209","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0102","scoring_system":"epss","scoring_elements":"0.77217","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0102","scoring_system":"epss","scoring_elements":"0.77245","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0102","scoring_system":"epss","scoring_elements":"0.77224","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0102","scoring_system":"epss","scoring_elements":"0.7722","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0102","scoring_system":"epss","scoring_elements":"0.7726","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0102","scoring_system":"epss","scoring_elements":"0.77262","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0102","scoring_system":"epss","scoring_elements":"0.77253","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0102","scoring_system":"epss","scoring_elements":"0.77287","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0102","scoring_system":"epss","scoring_elements":"0.77292","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0102","scoring_system":"epss","scoring_elements":"0.77306","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0102","scoring_system":"epss","scoring_elements":"0.77312","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6797"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1801917","reference_id":"1801917","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1801917"},{"reference_url":"https://security.gentoo.org/glsa/202003-02","reference_id":"GLSA-202003-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-05","reference_id":"mfsa2020-05","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-05"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-06","reference_id":"mfsa2020-06","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-07","reference_id":"mfsa2020-07","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-07"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79132?format=json","purl":"pkg:ebuild/www-client/firefox-bin@68.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@68.6.0"}],"aliases":["CVE-2020-6797"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4c3c-ygt3-kbg5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51223?format=json","vulnerability_id":"VCID-7hkk-2k6p-vyc7","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the\n    worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17024.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17024.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17024","reference_id":"","reference_type":"","scores":[{"value":"0.03276","scoring_system":"epss","scoring_elements":"0.8731","published_at":"2026-05-14T12:55:00Z"},{"value":"0.03276","scoring_system":"epss","scoring_elements":"0.87235","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03276","scoring_system":"epss","scoring_elements":"0.87247","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03276","scoring_system":"epss","scoring_elements":"0.87266","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03276","scoring_system":"epss","scoring_elements":"0.87261","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03276","scoring_system":"epss","scoring_elements":"0.87275","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03276","scoring_system":"epss","scoring_elements":"0.87116","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03276","scoring_system":"epss","scoring_elements":"0.87126","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03276","scoring_system":"epss","scoring_elements":"0.87143","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03276","scoring_system":"epss","scoring_elements":"0.8714","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03276","scoring_system":"epss","scoring_elements":"0.8716","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03276","scoring_system":"epss","scoring_elements":"0.87168","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03276","scoring_system":"epss","scoring_elements":"0.87181","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03276","scoring_system":"epss","scoring_elements":"0.87176","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03276","scoring_system":"epss","scoring_elements":"0.87171","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03276","scoring_system":"epss","scoring_elements":"0.87187","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03276","scoring_system":"epss","scoring_elements":"0.87192","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03276","scoring_system":"epss","scoring_elements":"0.87186","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03276","scoring_system":"epss","scoring_elements":"0.87205","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03276","scoring_system":"epss","scoring_elements":"0.87211","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03276","scoring_system":"epss","scoring_elements":"0.87214","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17024"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17016","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17016"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17017","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17017"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17022","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17022"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17024","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17024"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17026","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17026"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1788727","reference_id":"1788727","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1788727"},{"reference_url":"https://security.archlinux.org/ASA-202001-1","reference_id":"ASA-202001-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202001-1"},{"reference_url":"https://security.archlinux.org/ASA-202001-4","reference_id":"ASA-202001-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202001-4"},{"reference_url":"https://security.archlinux.org/AVG-1084","reference_id":"AVG-1084","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1084"},{"reference_url":"https://security.archlinux.org/AVG-1086","reference_id":"AVG-1086","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1086"},{"reference_url":"https://security.gentoo.org/glsa/202003-02","reference_id":"GLSA-202003-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-01","reference_id":"mfsa2020-01","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-02","reference_id":"mfsa2020-02","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-04","reference_id":"mfsa2020-04","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0085","reference_id":"RHSA-2020:0085","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0085"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0086","reference_id":"RHSA-2020:0086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0111","reference_id":"RHSA-2020:0111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0120","reference_id":"RHSA-2020:0120","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0120"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0123","reference_id":"RHSA-2020:0123","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0123"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0127","reference_id":"RHSA-2020:0127","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0127"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0292","reference_id":"RHSA-2020:0292","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0292"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0295","reference_id":"RHSA-2020:0295","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0295"},{"reference_url":"https://usn.ubuntu.com/4234-1/","reference_id":"USN-4234-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4234-1/"},{"reference_url":"https://usn.ubuntu.com/4241-1/","reference_id":"USN-4241-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4241-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79132?format=json","purl":"pkg:ebuild/www-client/firefox-bin@68.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@68.6.0"}],"aliases":["CVE-2019-17024"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7hkk-2k6p-vyc7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51221?format=json","vulnerability_id":"VCID-c4qs-a9kw-p3hc","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the\n    worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17017.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17017.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17017","reference_id":"","reference_type":"","scores":[{"value":"0.0263","scoring_system":"epss","scoring_elements":"0.85842","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0263","scoring_system":"epss","scoring_elements":"0.85758","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0263","scoring_system":"epss","scoring_elements":"0.8578","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0263","scoring_system":"epss","scoring_elements":"0.85796","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0263","scoring_system":"epss","scoring_elements":"0.85794","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0263","scoring_system":"epss","scoring_elements":"0.85807","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0263","scoring_system":"epss","scoring_elements":"0.85608","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0263","scoring_system":"epss","scoring_elements":"0.85621","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0263","scoring_system":"epss","scoring_elements":"0.85639","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0263","scoring_system":"epss","scoring_elements":"0.85645","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0263","scoring_system":"epss","scoring_elements":"0.85665","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0263","scoring_system":"epss","scoring_elements":"0.85677","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0263","scoring_system":"epss","scoring_elements":"0.85692","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0263","scoring_system":"epss","scoring_elements":"0.85688","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0263","scoring_system":"epss","scoring_elements":"0.85684","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0263","scoring_system":"epss","scoring_elements":"0.85706","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0263","scoring_system":"epss","scoring_elements":"0.85712","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0263","scoring_system":"epss","scoring_elements":"0.85705","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0263","scoring_system":"epss","scoring_elements":"0.85729","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0263","scoring_system":"epss","scoring_elements":"0.8574","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0263","scoring_system":"epss","scoring_elements":"0.85742","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17017"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17016","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17016"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17017","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17017"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17022","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17022"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17024","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17024"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17026","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17026"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1788724","reference_id":"1788724","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1788724"},{"reference_url":"https://security.archlinux.org/ASA-202001-1","reference_id":"ASA-202001-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202001-1"},{"reference_url":"https://security.archlinux.org/ASA-202001-4","reference_id":"ASA-202001-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202001-4"},{"reference_url":"https://security.archlinux.org/AVG-1084","reference_id":"AVG-1084","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1084"},{"reference_url":"https://security.archlinux.org/AVG-1086","reference_id":"AVG-1086","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1086"},{"reference_url":"https://security.gentoo.org/glsa/202003-02","reference_id":"GLSA-202003-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-01","reference_id":"mfsa2020-01","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-02","reference_id":"mfsa2020-02","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-04","reference_id":"mfsa2020-04","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0085","reference_id":"RHSA-2020:0085","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0085"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0086","reference_id":"RHSA-2020:0086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0111","reference_id":"RHSA-2020:0111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0120","reference_id":"RHSA-2020:0120","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0120"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0123","reference_id":"RHSA-2020:0123","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0123"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0127","reference_id":"RHSA-2020:0127","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0127"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0292","reference_id":"RHSA-2020:0292","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0292"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0295","reference_id":"RHSA-2020:0295","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0295"},{"reference_url":"https://usn.ubuntu.com/4234-1/","reference_id":"USN-4234-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4234-1/"},{"reference_url":"https://usn.ubuntu.com/4241-1/","reference_id":"USN-4241-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4241-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79132?format=json","purl":"pkg:ebuild/www-client/firefox-bin@68.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@68.6.0"}],"aliases":["CVE-2019-17017"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c4qs-a9kw-p3hc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31928?format=json","vulnerability_id":"VCID-ex1b-2rdy-7qhw","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17005.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17005.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17005","reference_id":"","reference_type":"","scores":[{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86409","published_at":"2026-05-14T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86303","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86322","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86344","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86363","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.8636","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86373","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86199","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86209","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86222","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86223","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86241","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86253","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86267","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86264","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.8626","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86276","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86281","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86274","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86293","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17005"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1779435","reference_id":"1779435","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1779435"},{"reference_url":"https://security.archlinux.org/ASA-201912-1","reference_id":"ASA-201912-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201912-1"},{"reference_url":"https://security.archlinux.org/ASA-201912-2","reference_id":"ASA-201912-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201912-2"},{"reference_url":"https://security.archlinux.org/AVG-1071","reference_id":"AVG-1071","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1071"},{"reference_url":"https://security.archlinux.org/AVG-1072","reference_id":"AVG-1072","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1072"},{"reference_url":"https://security.gentoo.org/glsa/202003-02","reference_id":"GLSA-202003-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-02"},{"reference_url":"https://security.gentoo.org/glsa/202003-10","reference_id":"GLSA-202003-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-36","reference_id":"mfsa2019-36","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-36"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-37","reference_id":"mfsa2019-37","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-37"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-38","reference_id":"mfsa2019-38","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-38"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4107","reference_id":"RHSA-2019:4107","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4108","reference_id":"RHSA-2019:4108","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4111","reference_id":"RHSA-2019:4111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4148","reference_id":"RHSA-2019:4148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4195","reference_id":"RHSA-2019:4195","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4195"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4205","reference_id":"RHSA-2019:4205","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4205"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0292","reference_id":"RHSA-2020:0292","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0292"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0295","reference_id":"RHSA-2020:0295","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0295"},{"reference_url":"https://usn.ubuntu.com/4216-1/","reference_id":"USN-4216-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4216-1/"},{"reference_url":"https://usn.ubuntu.com/4216-2/","reference_id":"USN-4216-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4216-2/"},{"reference_url":"https://usn.ubuntu.com/4241-1/","reference_id":"USN-4241-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4241-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79132?format=json","purl":"pkg:ebuild/www-client/firefox-bin@68.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@68.6.0"}],"aliases":["CVE-2019-17005"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ex1b-2rdy-7qhw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51222?format=json","vulnerability_id":"VCID-javq-3r82-73fq","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the\n    worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17022.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17022.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17022","reference_id":"","reference_type":"","scores":[{"value":"0.03924","scoring_system":"epss","scoring_elements":"0.88426","published_at":"2026-05-14T12:55:00Z"},{"value":"0.03924","scoring_system":"epss","scoring_elements":"0.88398","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03924","scoring_system":"epss","scoring_elements":"0.88388","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03924","scoring_system":"epss","scoring_elements":"0.88375","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03924","scoring_system":"epss","scoring_elements":"0.88359","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03924","scoring_system":"epss","scoring_elements":"0.88386","published_at":"2026-05-11T12:55:00Z"},{"value":"0.04633","scoring_system":"epss","scoring_elements":"0.89286","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04633","scoring_system":"epss","scoring_elements":"0.89283","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04633","scoring_system":"epss","scoring_elements":"0.89296","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04633","scoring_system":"epss","scoring_elements":"0.89308","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04633","scoring_system":"epss","scoring_elements":"0.89312","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04633","scoring_system":"epss","scoring_elements":"0.89316","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04633","scoring_system":"epss","scoring_elements":"0.8929","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04633","scoring_system":"epss","scoring_elements":"0.89236","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04633","scoring_system":"epss","scoring_elements":"0.89242","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04633","scoring_system":"epss","scoring_elements":"0.89257","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04633","scoring_system":"epss","scoring_elements":"0.89259","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04633","scoring_system":"epss","scoring_elements":"0.89276","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04633","scoring_system":"epss","scoring_elements":"0.89281","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17022"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17016","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17016"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17017","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17017"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17022","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17022"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17024","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17024"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17026","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17026"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1788726","reference_id":"1788726","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1788726"},{"reference_url":"https://security.archlinux.org/ASA-202001-1","reference_id":"ASA-202001-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202001-1"},{"reference_url":"https://security.archlinux.org/ASA-202001-4","reference_id":"ASA-202001-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202001-4"},{"reference_url":"https://security.archlinux.org/AVG-1084","reference_id":"AVG-1084","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1084"},{"reference_url":"https://security.archlinux.org/AVG-1086","reference_id":"AVG-1086","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1086"},{"reference_url":"https://security.gentoo.org/glsa/202003-02","reference_id":"GLSA-202003-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-01","reference_id":"mfsa2020-01","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-02","reference_id":"mfsa2020-02","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-04","reference_id":"mfsa2020-04","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0085","reference_id":"RHSA-2020:0085","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0085"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0086","reference_id":"RHSA-2020:0086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0111","reference_id":"RHSA-2020:0111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0120","reference_id":"RHSA-2020:0120","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0120"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0123","reference_id":"RHSA-2020:0123","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0123"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0127","reference_id":"RHSA-2020:0127","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0127"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0292","reference_id":"RHSA-2020:0292","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0292"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0295","reference_id":"RHSA-2020:0295","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0295"},{"reference_url":"https://usn.ubuntu.com/4234-1/","reference_id":"USN-4234-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4234-1/"},{"reference_url":"https://usn.ubuntu.com/4241-1/","reference_id":"USN-4241-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4241-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79132?format=json","purl":"pkg:ebuild/www-client/firefox-bin@68.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@68.6.0"}],"aliases":["CVE-2019-17022"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-javq-3r82-73fq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31944?format=json","vulnerability_id":"VCID-jr81-ed7a-aqcp","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6811.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6811.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6811","reference_id":"","reference_type":"","scores":[{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80316","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.8032","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.8025","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80304","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80281","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80374","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80211","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80214","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80241","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80333","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80266","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01843","scoring_system":"epss","scoring_elements":"0.82972","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01843","scoring_system":"epss","scoring_elements":"0.82899","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01843","scoring_system":"epss","scoring_elements":"0.82916","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01843","scoring_system":"epss","scoring_elements":"0.82929","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01843","scoring_system":"epss","scoring_elements":"0.82925","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01843","scoring_system":"epss","scoring_elements":"0.8295","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01843","scoring_system":"epss","scoring_elements":"0.82957","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01843","scoring_system":"epss","scoring_elements":"0.82967","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01843","scoring_system":"epss","scoring_elements":"0.82963","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01843","scoring_system":"epss","scoring_elements":"0.83002","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6811"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1607742","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1607742"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2020-08/","reference_id":"","reference_type":"","scores":[],"url":"https://www.mozilla.org/security/advisories/mfsa2020-08/"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2020-09/","reference_id":"","reference_type":"","scores":[],"url":"https://www.mozilla.org/security/advisories/mfsa2020-09/"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2020-10/","reference_id":"","reference_type":"","scores":[],"url":"https://www.mozilla.org/security/advisories/mfsa2020-10/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1812202","reference_id":"1812202","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1812202"},{"reference_url":"https://security.archlinux.org/ASA-202003-11","reference_id":"ASA-202003-11","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202003-11"},{"reference_url":"https://security.archlinux.org/ASA-202003-8","reference_id":"ASA-202003-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202003-8"},{"reference_url":"https://security.archlinux.org/AVG-1112","reference_id":"AVG-1112","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1112"},{"reference_url":"https://security.archlinux.org/AVG-1115","reference_id":"AVG-1115","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1115"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-6811","reference_id":"CVE-2020-6811","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-6811"},{"reference_url":"https://security.gentoo.org/glsa/202003-02","reference_id":"GLSA-202003-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-02"},{"reference_url":"https://security.gentoo.org/glsa/202003-10","reference_id":"GLSA-202003-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-08","reference_id":"mfsa2020-08","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-09","reference_id":"mfsa2020-09","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-09"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-10","reference_id":"mfsa2020-10","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-10"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0815","reference_id":"RHSA-2020:0815","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0815"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0816","reference_id":"RHSA-2020:0816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0816"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0819","reference_id":"RHSA-2020:0819","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0819"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0820","reference_id":"RHSA-2020:0820","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0820"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0905","reference_id":"RHSA-2020:0905","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0905"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0914","reference_id":"RHSA-2020:0914","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0914"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0918","reference_id":"RHSA-2020:0918","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0918"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0919","reference_id":"RHSA-2020:0919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0919"},{"reference_url":"https://usn.ubuntu.com/4299-1/","reference_id":"USN-4299-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4299-1/"},{"reference_url":"https://usn.ubuntu.com/4328-1/","reference_id":"USN-4328-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4328-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79132?format=json","purl":"pkg:ebuild/www-client/firefox-bin@68.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@68.6.0"}],"aliases":["CVE-2020-6811"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jr81-ed7a-aqcp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51227?format=json","vulnerability_id":"VCID-kr94-y6hg-d3hp","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the\n    worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6799.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6799.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6799","reference_id":"","reference_type":"","scores":[{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64933","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64885","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64856","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64877","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64672","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64724","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64752","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.6471","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64758","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64773","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.6479","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64778","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64751","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64789","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64799","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64787","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64804","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64817","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64813","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64793","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64842","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6799"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1801919","reference_id":"1801919","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1801919"},{"reference_url":"https://security.gentoo.org/glsa/202003-02","reference_id":"GLSA-202003-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-05","reference_id":"mfsa2020-05","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-05"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-06","reference_id":"mfsa2020-06","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79132?format=json","purl":"pkg:ebuild/www-client/firefox-bin@68.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@68.6.0"}],"aliases":["CVE-2020-6799"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kr94-y6hg-d3hp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31933?format=json","vulnerability_id":"VCID-m5h6-y3tw-eue6","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20503.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20503.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-20503","reference_id":"","reference_type":"","scores":[{"value":"0.02474","scoring_system":"epss","scoring_elements":"0.85431","published_at":"2026-05-14T12:55:00Z"},{"value":"0.02474","scoring_system":"epss","scoring_elements":"0.85318","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02474","scoring_system":"epss","scoring_elements":"0.85327","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02474","scoring_system":"epss","scoring_elements":"0.85341","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02474","scoring_system":"epss","scoring_elements":"0.85367","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02474","scoring_system":"epss","scoring_elements":"0.85385","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02474","scoring_system":"epss","scoring_elements":"0.8538","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02474","scoring_system":"epss","scoring_elements":"0.85393","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02474","scoring_system":"epss","scoring_elements":"0.85205","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02474","scoring_system":"epss","scoring_elements":"0.85216","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02474","scoring_system":"epss","scoring_elements":"0.85235","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02474","scoring_system":"epss","scoring_elements":"0.85237","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02474","scoring_system":"epss","scoring_elements":"0.85259","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02474","scoring_system":"epss","scoring_elements":"0.85267","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02474","scoring_system":"epss","scoring_elements":"0.85282","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02474","scoring_system":"epss","scoring_elements":"0.8528","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02474","scoring_system":"epss","scoring_elements":"0.85277","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02474","scoring_system":"epss","scoring_elements":"0.85297","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02474","scoring_system":"epss","scoring_elements":"0.85299","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02474","scoring_system":"epss","scoring_elements":"0.85295","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-20503"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6422","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6422"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6424","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6424"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6425","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6425"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6426","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6426"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6427","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6427"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6428","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6428"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6429","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6429"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6449","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6449"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1812203","reference_id":"1812203","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1812203"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953270","reference_id":"953270","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953270"},{"reference_url":"https://security.archlinux.org/ASA-202003-11","reference_id":"ASA-202003-11","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202003-11"},{"reference_url":"https://security.archlinux.org/ASA-202003-12","reference_id":"ASA-202003-12","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202003-12"},{"reference_url":"https://security.archlinux.org/ASA-202003-8","reference_id":"ASA-202003-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202003-8"},{"reference_url":"https://security.archlinux.org/AVG-1112","reference_id":"AVG-1112","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1112"},{"reference_url":"https://security.archlinux.org/AVG-1115","reference_id":"AVG-1115","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1115"},{"reference_url":"https://security.archlinux.org/AVG-1118","reference_id":"AVG-1118","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1118"},{"reference_url":"https://security.gentoo.org/glsa/202003-02","reference_id":"GLSA-202003-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-02"},{"reference_url":"https://security.gentoo.org/glsa/202003-10","reference_id":"GLSA-202003-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-08","reference_id":"mfsa2020-08","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-09","reference_id":"mfsa2020-09","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-09"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-10","reference_id":"mfsa2020-10","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-10"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0815","reference_id":"RHSA-2020:0815","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0815"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0816","reference_id":"RHSA-2020:0816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0816"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0819","reference_id":"RHSA-2020:0819","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0819"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0820","reference_id":"RHSA-2020:0820","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0820"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0905","reference_id":"RHSA-2020:0905","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0905"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0914","reference_id":"RHSA-2020:0914","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0914"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0918","reference_id":"RHSA-2020:0918","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0918"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0919","reference_id":"RHSA-2020:0919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0919"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1270","reference_id":"RHSA-2020:1270","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1270"},{"reference_url":"https://usn.ubuntu.com/4299-1/","reference_id":"USN-4299-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4299-1/"},{"reference_url":"https://usn.ubuntu.com/4328-1/","reference_id":"USN-4328-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4328-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79132?format=json","purl":"pkg:ebuild/www-client/firefox-bin@68.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@68.6.0"}],"aliases":["CVE-2019-20503"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m5h6-y3tw-eue6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31929?format=json","vulnerability_id":"VCID-pws7-8qmm-hfes","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17008.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17008.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17008","reference_id":"","reference_type":"","scores":[{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.7512","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.75018","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.75026","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.75053","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.75076","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.75057","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.75066","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74896","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74897","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74925","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74899","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74933","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74945","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74968","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74946","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74936","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74973","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.7498","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74972","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.75009","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.75015","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17008"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1779431","reference_id":"1779431","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1779431"},{"reference_url":"https://security.archlinux.org/ASA-201912-1","reference_id":"ASA-201912-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201912-1"},{"reference_url":"https://security.archlinux.org/ASA-201912-2","reference_id":"ASA-201912-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201912-2"},{"reference_url":"https://security.archlinux.org/AVG-1071","reference_id":"AVG-1071","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1071"},{"reference_url":"https://security.archlinux.org/AVG-1072","reference_id":"AVG-1072","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1072"},{"reference_url":"https://security.gentoo.org/glsa/202003-02","reference_id":"GLSA-202003-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-02"},{"reference_url":"https://security.gentoo.org/glsa/202003-10","reference_id":"GLSA-202003-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-36","reference_id":"mfsa2019-36","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-36"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-37","reference_id":"mfsa2019-37","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-37"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-38","reference_id":"mfsa2019-38","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-38"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4107","reference_id":"RHSA-2019:4107","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4108","reference_id":"RHSA-2019:4108","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4111","reference_id":"RHSA-2019:4111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4148","reference_id":"RHSA-2019:4148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4195","reference_id":"RHSA-2019:4195","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4195"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4205","reference_id":"RHSA-2019:4205","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4205"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0292","reference_id":"RHSA-2020:0292","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0292"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0295","reference_id":"RHSA-2020:0295","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0295"},{"reference_url":"https://usn.ubuntu.com/4216-1/","reference_id":"USN-4216-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4216-1/"},{"reference_url":"https://usn.ubuntu.com/4216-2/","reference_id":"USN-4216-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4216-2/"},{"reference_url":"https://usn.ubuntu.com/4241-1/","reference_id":"USN-4241-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4241-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79132?format=json","purl":"pkg:ebuild/www-client/firefox-bin@68.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@68.6.0"}],"aliases":["CVE-2019-17008"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pws7-8qmm-hfes"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31938?format=json","vulnerability_id":"VCID-rszh-1c16-47ah","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6798.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6798.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6798","reference_id":"","reference_type":"","scores":[{"value":"0.01646","scoring_system":"epss","scoring_elements":"0.82167","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01646","scoring_system":"epss","scoring_elements":"0.82048","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01646","scoring_system":"epss","scoring_elements":"0.82066","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01646","scoring_system":"epss","scoring_elements":"0.82087","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01646","scoring_system":"epss","scoring_elements":"0.82112","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01646","scoring_system":"epss","scoring_elements":"0.82109","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01646","scoring_system":"epss","scoring_elements":"0.82126","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01646","scoring_system":"epss","scoring_elements":"0.81905","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01646","scoring_system":"epss","scoring_elements":"0.81916","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01646","scoring_system":"epss","scoring_elements":"0.81939","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01646","scoring_system":"epss","scoring_elements":"0.81935","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01646","scoring_system":"epss","scoring_elements":"0.81962","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01646","scoring_system":"epss","scoring_elements":"0.8197","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01646","scoring_system":"epss","scoring_elements":"0.81989","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01646","scoring_system":"epss","scoring_elements":"0.81978","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01646","scoring_system":"epss","scoring_elements":"0.81972","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01646","scoring_system":"epss","scoring_elements":"0.82008","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01646","scoring_system":"epss","scoring_elements":"0.8201","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01646","scoring_system":"epss","scoring_elements":"0.82033","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01646","scoring_system":"epss","scoring_elements":"0.82044","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6798"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6793","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6793"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6794","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6794"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6796","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6796"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1801918","reference_id":"1801918","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1801918"},{"reference_url":"https://security.archlinux.org/ASA-202002-5","reference_id":"ASA-202002-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202002-5"},{"reference_url":"https://security.archlinux.org/ASA-202002-9","reference_id":"ASA-202002-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202002-9"},{"reference_url":"https://security.archlinux.org/AVG-1096","reference_id":"AVG-1096","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1096"},{"reference_url":"https://security.archlinux.org/AVG-1099","reference_id":"AVG-1099","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1099"},{"reference_url":"https://security.gentoo.org/glsa/202003-02","reference_id":"GLSA-202003-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-02"},{"reference_url":"https://security.gentoo.org/glsa/202003-10","reference_id":"GLSA-202003-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-05","reference_id":"mfsa2020-05","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-05"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-06","reference_id":"mfsa2020-06","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-07","reference_id":"mfsa2020-07","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0512","reference_id":"RHSA-2020:0512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0512"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0519","reference_id":"RHSA-2020:0519","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0519"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0520","reference_id":"RHSA-2020:0520","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0520"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0521","reference_id":"RHSA-2020:0521","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0521"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0565","reference_id":"RHSA-2020:0565","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0565"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0574","reference_id":"RHSA-2020:0574","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0574"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0576","reference_id":"RHSA-2020:0576","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0576"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0577","reference_id":"RHSA-2020:0577","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0577"},{"reference_url":"https://usn.ubuntu.com/4278-1/","reference_id":"USN-4278-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4278-1/"},{"reference_url":"https://usn.ubuntu.com/4278-2/","reference_id":"USN-4278-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4278-2/"},{"reference_url":"https://usn.ubuntu.com/4328-1/","reference_id":"USN-4328-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4328-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79132?format=json","purl":"pkg:ebuild/www-client/firefox-bin@68.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@68.6.0"}],"aliases":["CVE-2020-6798"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rszh-1c16-47ah"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31940?format=json","vulnerability_id":"VCID-t4eb-c363-u7hc","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6805.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6805.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6805","reference_id":"","reference_type":"","scores":[{"value":"0.00796","scoring_system":"epss","scoring_elements":"0.74151","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00796","scoring_system":"epss","scoring_elements":"0.74071","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00796","scoring_system":"epss","scoring_elements":"0.74061","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00796","scoring_system":"epss","scoring_elements":"0.74109","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00796","scoring_system":"epss","scoring_elements":"0.74087","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00796","scoring_system":"epss","scoring_elements":"0.74068","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00796","scoring_system":"epss","scoring_elements":"0.7407","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00796","scoring_system":"epss","scoring_elements":"0.74037","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00796","scoring_system":"epss","scoring_elements":"0.74029","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00796","scoring_system":"epss","scoring_elements":"0.74094","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74937","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74887","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74889","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74917","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74891","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74924","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74959","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74938","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74928","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74965","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6805"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1610880","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1610880"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2020-08/","reference_id":"","reference_type":"","scores":[],"url":"https://www.mozilla.org/security/advisories/mfsa2020-08/"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2020-09/","reference_id":"","reference_type":"","scores":[],"url":"https://www.mozilla.org/security/advisories/mfsa2020-09/"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2020-10/","reference_id":"","reference_type":"","scores":[],"url":"https://www.mozilla.org/security/advisories/mfsa2020-10/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1812199","reference_id":"1812199","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1812199"},{"reference_url":"https://security.archlinux.org/ASA-202003-11","reference_id":"ASA-202003-11","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202003-11"},{"reference_url":"https://security.archlinux.org/ASA-202003-8","reference_id":"ASA-202003-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202003-8"},{"reference_url":"https://security.archlinux.org/AVG-1112","reference_id":"AVG-1112","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1112"},{"reference_url":"https://security.archlinux.org/AVG-1115","reference_id":"AVG-1115","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1115"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-6805","reference_id":"CVE-2020-6805","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-6805"},{"reference_url":"https://security.gentoo.org/glsa/202003-02","reference_id":"GLSA-202003-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-02"},{"reference_url":"https://security.gentoo.org/glsa/202003-10","reference_id":"GLSA-202003-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-08","reference_id":"mfsa2020-08","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-09","reference_id":"mfsa2020-09","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-09"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-10","reference_id":"mfsa2020-10","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-10"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0815","reference_id":"RHSA-2020:0815","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0815"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0816","reference_id":"RHSA-2020:0816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0816"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0819","reference_id":"RHSA-2020:0819","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0819"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0820","reference_id":"RHSA-2020:0820","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0820"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0905","reference_id":"RHSA-2020:0905","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0905"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0914","reference_id":"RHSA-2020:0914","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0914"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0918","reference_id":"RHSA-2020:0918","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0918"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0919","reference_id":"RHSA-2020:0919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0919"},{"reference_url":"https://usn.ubuntu.com/4299-1/","reference_id":"USN-4299-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4299-1/"},{"reference_url":"https://usn.ubuntu.com/4328-1/","reference_id":"USN-4328-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4328-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79132?format=json","purl":"pkg:ebuild/www-client/firefox-bin@68.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@68.6.0"}],"aliases":["CVE-2020-6805"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t4eb-c363-u7hc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31920?format=json","vulnerability_id":"VCID-vzb9-aeqz-hybr","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11745.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11745.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-11745","reference_id":"","reference_type":"","scores":[{"value":"0.00806","scoring_system":"epss","scoring_elements":"0.74317","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00806","scoring_system":"epss","scoring_elements":"0.74229","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00806","scoring_system":"epss","scoring_elements":"0.74223","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00806","scoring_system":"epss","scoring_elements":"0.74251","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00806","scoring_system":"epss","scoring_elements":"0.74275","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00806","scoring_system":"epss","scoring_elements":"0.74237","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00806","scoring_system":"epss","scoring_elements":"0.7426","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00806","scoring_system":"epss","scoring_elements":"0.74101","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00806","scoring_system":"epss","scoring_elements":"0.74107","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00806","scoring_system":"epss","scoring_elements":"0.74133","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00806","scoring_system":"epss","scoring_elements":"0.74105","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00806","scoring_system":"epss","scoring_elements":"0.74137","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00806","scoring_system":"epss","scoring_elements":"0.74152","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00806","scoring_system":"epss","scoring_elements":"0.74174","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00806","scoring_system":"epss","scoring_elements":"0.74155","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00806","scoring_system":"epss","scoring_elements":"0.74149","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00806","scoring_system":"epss","scoring_elements":"0.74186","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00806","scoring_system":"epss","scoring_elements":"0.74195","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00806","scoring_system":"epss","scoring_elements":"0.74187","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00806","scoring_system":"epss","scoring_elements":"0.74221","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00806","scoring_system":"epss","scoring_elements":"0.7423","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-11745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17007","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17007"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1774831","reference_id":"1774831","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1774831"},{"reference_url":"https://security.archlinux.org/ASA-201912-1","reference_id":"ASA-201912-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201912-1"},{"reference_url":"https://security.archlinux.org/ASA-201912-2","reference_id":"ASA-201912-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201912-2"},{"reference_url":"https://security.archlinux.org/AVG-1071","reference_id":"AVG-1071","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1071"},{"reference_url":"https://security.archlinux.org/AVG-1072","reference_id":"AVG-1072","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1072"},{"reference_url":"https://security.gentoo.org/glsa/202003-02","reference_id":"GLSA-202003-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-02"},{"reference_url":"https://security.gentoo.org/glsa/202003-10","reference_id":"GLSA-202003-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-10"},{"reference_url":"https://security.gentoo.org/glsa/202003-37","reference_id":"GLSA-202003-37","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-37"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-36","reference_id":"mfsa2019-36","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-36"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-37","reference_id":"mfsa2019-37","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-37"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-38","reference_id":"mfsa2019-38","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-38"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4114","reference_id":"RHSA-2019:4114","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4114"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4152","reference_id":"RHSA-2019:4152","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4152"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4190","reference_id":"RHSA-2019:4190","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4190"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0243","reference_id":"RHSA-2020:0243","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0243"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0466","reference_id":"RHSA-2020:0466","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0466"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1267","reference_id":"RHSA-2020:1267","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1267"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1345","reference_id":"RHSA-2020:1345","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1345"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1461","reference_id":"RHSA-2020:1461","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1461"},{"reference_url":"https://usn.ubuntu.com/4203-1/","reference_id":"USN-4203-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4203-1/"},{"reference_url":"https://usn.ubuntu.com/4203-2/","reference_id":"USN-4203-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4203-2/"},{"reference_url":"https://usn.ubuntu.com/4216-1/","reference_id":"USN-4216-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4216-1/"},{"reference_url":"https://usn.ubuntu.com/4216-2/","reference_id":"USN-4216-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4216-2/"},{"reference_url":"https://usn.ubuntu.com/4241-1/","reference_id":"USN-4241-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4241-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79132?format=json","purl":"pkg:ebuild/www-client/firefox-bin@68.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@68.6.0"}],"aliases":["CVE-2019-11745"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vzb9-aeqz-hybr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31943?format=json","vulnerability_id":"VCID-wpm1-y59u-zkgu","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6807.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6807.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6807","reference_id":"","reference_type":"","scores":[{"value":"0.00779","scoring_system":"epss","scoring_elements":"0.73711","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00779","scoring_system":"epss","scoring_elements":"0.73668","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00779","scoring_system":"epss","scoring_elements":"0.73616","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00779","scoring_system":"epss","scoring_elements":"0.73676","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00779","scoring_system":"epss","scoring_elements":"0.73694","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00779","scoring_system":"epss","scoring_elements":"0.73671","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00779","scoring_system":"epss","scoring_elements":"0.73658","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00779","scoring_system":"epss","scoring_elements":"0.73622","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00779","scoring_system":"epss","scoring_elements":"0.73651","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00779","scoring_system":"epss","scoring_elements":"0.73627","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00786","scoring_system":"epss","scoring_elements":"0.73978","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00786","scoring_system":"epss","scoring_elements":"0.73881","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00786","scoring_system":"epss","scoring_elements":"0.7389","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00786","scoring_system":"epss","scoring_elements":"0.73891","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00786","scoring_system":"epss","scoring_elements":"0.73886","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00786","scoring_system":"epss","scoring_elements":"0.73912","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00786","scoring_system":"epss","scoring_elements":"0.73935","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00786","scoring_system":"epss","scoring_elements":"0.73898","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00786","scoring_system":"epss","scoring_elements":"0.73921","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00786","scoring_system":"epss","scoring_elements":"0.73856","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00786","scoring_system":"epss","scoring_elements":"0.73847","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6807"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1614971","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1614971"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2020-08/","reference_id":"","reference_type":"","scores":[],"url":"https://www.mozilla.org/security/advisories/mfsa2020-08/"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2020-09/","reference_id":"","reference_type":"","scores":[],"url":"https://www.mozilla.org/security/advisories/mfsa2020-09/"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2020-10/","reference_id":"","reference_type":"","scores":[],"url":"https://www.mozilla.org/security/advisories/mfsa2020-10/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1812201","reference_id":"1812201","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1812201"},{"reference_url":"https://security.archlinux.org/ASA-202003-11","reference_id":"ASA-202003-11","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202003-11"},{"reference_url":"https://security.archlinux.org/ASA-202003-8","reference_id":"ASA-202003-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202003-8"},{"reference_url":"https://security.archlinux.org/AVG-1112","reference_id":"AVG-1112","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1112"},{"reference_url":"https://security.archlinux.org/AVG-1115","reference_id":"AVG-1115","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1115"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-6807","reference_id":"CVE-2020-6807","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-6807"},{"reference_url":"https://security.gentoo.org/glsa/202003-02","reference_id":"GLSA-202003-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-02"},{"reference_url":"https://security.gentoo.org/glsa/202003-10","reference_id":"GLSA-202003-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-08","reference_id":"mfsa2020-08","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-09","reference_id":"mfsa2020-09","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-09"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-10","reference_id":"mfsa2020-10","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-10"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0815","reference_id":"RHSA-2020:0815","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0815"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0816","reference_id":"RHSA-2020:0816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0816"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0819","reference_id":"RHSA-2020:0819","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0819"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0820","reference_id":"RHSA-2020:0820","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0820"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0905","reference_id":"RHSA-2020:0905","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0905"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0914","reference_id":"RHSA-2020:0914","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0914"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0918","reference_id":"RHSA-2020:0918","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0918"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0919","reference_id":"RHSA-2020:0919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0919"},{"reference_url":"https://usn.ubuntu.com/4299-1/","reference_id":"USN-4299-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4299-1/"},{"reference_url":"https://usn.ubuntu.com/4328-1/","reference_id":"USN-4328-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4328-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79132?format=json","purl":"pkg:ebuild/www-client/firefox-bin@68.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@68.6.0"}],"aliases":["CVE-2020-6807"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wpm1-y59u-zkgu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51220?format=json","vulnerability_id":"VCID-x12h-hqf2-37cc","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the\n    worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17016.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17016.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17016","reference_id":"","reference_type":"","scores":[{"value":"0.02928","scoring_system":"epss","scoring_elements":"0.86511","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02928","scoring_system":"epss","scoring_elements":"0.86515","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02928","scoring_system":"epss","scoring_elements":"0.86559","published_at":"2026-05-14T12:55:00Z"},{"value":"0.02928","scoring_system":"epss","scoring_elements":"0.86495","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02928","scoring_system":"epss","scoring_elements":"0.86476","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02928","scoring_system":"epss","scoring_elements":"0.86524","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03465","scoring_system":"epss","scoring_elements":"0.87544","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03465","scoring_system":"epss","scoring_elements":"0.87536","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03465","scoring_system":"epss","scoring_elements":"0.8755","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03465","scoring_system":"epss","scoring_elements":"0.87551","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03465","scoring_system":"epss","scoring_elements":"0.87549","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03465","scoring_system":"epss","scoring_elements":"0.87566","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03465","scoring_system":"epss","scoring_elements":"0.87573","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03465","scoring_system":"epss","scoring_elements":"0.87571","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03465","scoring_system":"epss","scoring_elements":"0.87539","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03465","scoring_system":"epss","scoring_elements":"0.8748","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03465","scoring_system":"epss","scoring_elements":"0.8749","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03465","scoring_system":"epss","scoring_elements":"0.87504","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03465","scoring_system":"epss","scoring_elements":"0.87506","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03465","scoring_system":"epss","scoring_elements":"0.87525","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03465","scoring_system":"epss","scoring_elements":"0.87532","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17016"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17016","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17016"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17017","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17017"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17022","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17022"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17024","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17024"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17026","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17026"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1788723","reference_id":"1788723","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1788723"},{"reference_url":"https://security.archlinux.org/ASA-202001-1","reference_id":"ASA-202001-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202001-1"},{"reference_url":"https://security.archlinux.org/ASA-202001-4","reference_id":"ASA-202001-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202001-4"},{"reference_url":"https://security.archlinux.org/AVG-1084","reference_id":"AVG-1084","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1084"},{"reference_url":"https://security.archlinux.org/AVG-1086","reference_id":"AVG-1086","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1086"},{"reference_url":"https://security.gentoo.org/glsa/202003-02","reference_id":"GLSA-202003-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-01","reference_id":"mfsa2020-01","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-02","reference_id":"mfsa2020-02","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-04","reference_id":"mfsa2020-04","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0085","reference_id":"RHSA-2020:0085","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0085"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0086","reference_id":"RHSA-2020:0086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0111","reference_id":"RHSA-2020:0111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0120","reference_id":"RHSA-2020:0120","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0120"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0123","reference_id":"RHSA-2020:0123","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0123"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0127","reference_id":"RHSA-2020:0127","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0127"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0292","reference_id":"RHSA-2020:0292","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0292"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0295","reference_id":"RHSA-2020:0295","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0295"},{"reference_url":"https://usn.ubuntu.com/4234-1/","reference_id":"USN-4234-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4234-1/"},{"reference_url":"https://usn.ubuntu.com/4241-1/","reference_id":"USN-4241-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4241-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79132?format=json","purl":"pkg:ebuild/www-client/firefox-bin@68.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@68.6.0"}],"aliases":["CVE-2019-17016"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x12h-hqf2-37cc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31941?format=json","vulnerability_id":"VCID-x4vq-y6b6-dqf6","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"http://packetstormsecurity.com/files/157524/Firefox-js-ReadableStreamCloseInternal-Out-Of-Bounds-Access.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/157524/Firefox-js-ReadableStreamCloseInternal-Out-Of-Bounds-Access.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6806.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6806.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6806","reference_id":"","reference_type":"","scores":[{"value":"0.02611","scoring_system":"epss","scoring_elements":"0.8575","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02611","scoring_system":"epss","scoring_elements":"0.85754","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02611","scoring_system":"epss","scoring_elements":"0.85697","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02611","scoring_system":"epss","scoring_elements":"0.85737","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02611","scoring_system":"epss","scoring_elements":"0.85716","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02611","scoring_system":"epss","scoring_elements":"0.85798","published_at":"2026-05-14T12:55:00Z"},{"value":"0.02611","scoring_system":"epss","scoring_elements":"0.85669","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02611","scoring_system":"epss","scoring_elements":"0.85665","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02611","scoring_system":"epss","scoring_elements":"0.85686","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02611","scoring_system":"epss","scoring_elements":"0.85763","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02611","scoring_system":"epss","scoring_elements":"0.857","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03504","scoring_system":"epss","scoring_elements":"0.87622","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03504","scoring_system":"epss","scoring_elements":"0.87559","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03504","scoring_system":"epss","scoring_elements":"0.87569","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03504","scoring_system":"epss","scoring_elements":"0.87582","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03504","scoring_system":"epss","scoring_elements":"0.87585","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03504","scoring_system":"epss","scoring_elements":"0.87604","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03504","scoring_system":"epss","scoring_elements":"0.8761","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03504","scoring_system":"epss","scoring_elements":"0.87617","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03504","scoring_system":"epss","scoring_elements":"0.87614","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03504","scoring_system":"epss","scoring_elements":"0.87628","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6806"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1612308","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1612308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2020-08/","reference_id":"","reference_type":"","scores":[],"url":"https://www.mozilla.org/security/advisories/mfsa2020-08/"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2020-09/","reference_id":"","reference_type":"","scores":[],"url":"https://www.mozilla.org/security/advisories/mfsa2020-09/"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2020-10/","reference_id":"","reference_type":"","scores":[],"url":"https://www.mozilla.org/security/advisories/mfsa2020-10/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1812200","reference_id":"1812200","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1812200"},{"reference_url":"https://security.archlinux.org/ASA-202003-11","reference_id":"ASA-202003-11","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202003-11"},{"reference_url":"https://security.archlinux.org/ASA-202003-8","reference_id":"ASA-202003-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202003-8"},{"reference_url":"https://security.archlinux.org/AVG-1112","reference_id":"AVG-1112","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1112"},{"reference_url":"https://security.archlinux.org/AVG-1115","reference_id":"AVG-1115","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1115"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-6806","reference_id":"CVE-2020-6806","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-6806"},{"reference_url":"https://security.gentoo.org/glsa/202003-02","reference_id":"GLSA-202003-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-02"},{"reference_url":"https://security.gentoo.org/glsa/202003-10","reference_id":"GLSA-202003-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-08","reference_id":"mfsa2020-08","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-09","reference_id":"mfsa2020-09","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-09"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-10","reference_id":"mfsa2020-10","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-10"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0815","reference_id":"RHSA-2020:0815","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0815"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0816","reference_id":"RHSA-2020:0816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0816"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0819","reference_id":"RHSA-2020:0819","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0819"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0820","reference_id":"RHSA-2020:0820","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0820"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0905","reference_id":"RHSA-2020:0905","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0905"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0914","reference_id":"RHSA-2020:0914","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0914"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0918","reference_id":"RHSA-2020:0918","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0918"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0919","reference_id":"RHSA-2020:0919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0919"},{"reference_url":"https://usn.ubuntu.com/4299-1/","reference_id":"USN-4299-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4299-1/"},{"reference_url":"https://usn.ubuntu.com/4328-1/","reference_id":"USN-4328-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4328-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79132?format=json","purl":"pkg:ebuild/www-client/firefox-bin@68.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@68.6.0"}],"aliases":["CVE-2020-6806"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x4vq-y6b6-dqf6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31939?format=json","vulnerability_id":"VCID-y8vr-48q8-a3aj","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6800.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6800.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6800","reference_id":"","reference_type":"","scores":[{"value":"0.0125","scoring_system":"epss","scoring_elements":"0.79516","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0125","scoring_system":"epss","scoring_elements":"0.79393","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0125","scoring_system":"epss","scoring_elements":"0.79409","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0125","scoring_system":"epss","scoring_elements":"0.79418","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0125","scoring_system":"epss","scoring_elements":"0.79439","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0125","scoring_system":"epss","scoring_elements":"0.79458","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0125","scoring_system":"epss","scoring_elements":"0.79477","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0125","scoring_system":"epss","scoring_elements":"0.79281","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0125","scoring_system":"epss","scoring_elements":"0.79288","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0125","scoring_system":"epss","scoring_elements":"0.79312","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0125","scoring_system":"epss","scoring_elements":"0.79298","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0125","scoring_system":"epss","scoring_elements":"0.79323","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0125","scoring_system":"epss","scoring_elements":"0.79333","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0125","scoring_system":"epss","scoring_elements":"0.79357","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0125","scoring_system":"epss","scoring_elements":"0.79341","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0125","scoring_system":"epss","scoring_elements":"0.7933","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0125","scoring_system":"epss","scoring_elements":"0.79353","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0125","scoring_system":"epss","scoring_elements":"0.79354","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0125","scoring_system":"epss","scoring_elements":"0.79387","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6800"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6793","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6793"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6794","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6794"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6796","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6796"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1801920","reference_id":"1801920","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1801920"},{"reference_url":"https://security.archlinux.org/ASA-202002-5","reference_id":"ASA-202002-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202002-5"},{"reference_url":"https://security.archlinux.org/ASA-202002-9","reference_id":"ASA-202002-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202002-9"},{"reference_url":"https://security.archlinux.org/AVG-1096","reference_id":"AVG-1096","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1096"},{"reference_url":"https://security.archlinux.org/AVG-1099","reference_id":"AVG-1099","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1099"},{"reference_url":"https://security.gentoo.org/glsa/202003-02","reference_id":"GLSA-202003-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-02"},{"reference_url":"https://security.gentoo.org/glsa/202003-10","reference_id":"GLSA-202003-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-05","reference_id":"mfsa2020-05","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-05"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-06","reference_id":"mfsa2020-06","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-07","reference_id":"mfsa2020-07","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0512","reference_id":"RHSA-2020:0512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0512"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0519","reference_id":"RHSA-2020:0519","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0519"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0520","reference_id":"RHSA-2020:0520","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0520"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0521","reference_id":"RHSA-2020:0521","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0521"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0565","reference_id":"RHSA-2020:0565","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0565"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0574","reference_id":"RHSA-2020:0574","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0574"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0576","reference_id":"RHSA-2020:0576","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0576"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0577","reference_id":"RHSA-2020:0577","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0577"},{"reference_url":"https://usn.ubuntu.com/4278-1/","reference_id":"USN-4278-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4278-1/"},{"reference_url":"https://usn.ubuntu.com/4278-2/","reference_id":"USN-4278-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4278-2/"},{"reference_url":"https://usn.ubuntu.com/4328-1/","reference_id":"USN-4328-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4328-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79132?format=json","purl":"pkg:ebuild/www-client/firefox-bin@68.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@68.6.0"}],"aliases":["CVE-2020-6800"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y8vr-48q8-a3aj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31945?format=json","vulnerability_id":"VCID-yr3c-1cqv-n3bw","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6812.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6812.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6812","reference_id":"","reference_type":"","scores":[{"value":"0.00581","scoring_system":"epss","scoring_elements":"0.69103","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00581","scoring_system":"epss","scoring_elements":"0.6899","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00581","scoring_system":"epss","scoring_elements":"0.68996","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00581","scoring_system":"epss","scoring_elements":"0.69002","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00581","scoring_system":"epss","scoring_elements":"0.68982","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00581","scoring_system":"epss","scoring_elements":"0.69026","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00581","scoring_system":"epss","scoring_elements":"0.6906","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00581","scoring_system":"epss","scoring_elements":"0.69027","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00581","scoring_system":"epss","scoring_elements":"0.69052","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00581","scoring_system":"epss","scoring_elements":"0.68842","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00581","scoring_system":"epss","scoring_elements":"0.68859","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00581","scoring_system":"epss","scoring_elements":"0.6888","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00581","scoring_system":"epss","scoring_elements":"0.6886","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00581","scoring_system":"epss","scoring_elements":"0.6891","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00581","scoring_system":"epss","scoring_elements":"0.68929","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00581","scoring_system":"epss","scoring_elements":"0.68951","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00581","scoring_system":"epss","scoring_elements":"0.68937","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00581","scoring_system":"epss","scoring_elements":"0.68908","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00581","scoring_system":"epss","scoring_elements":"0.68949","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00581","scoring_system":"epss","scoring_elements":"0.68959","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00581","scoring_system":"epss","scoring_elements":"0.68939","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6812"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1616661","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1616661"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2020-08/","reference_id":"","reference_type":"","scores":[],"url":"https://www.mozilla.org/security/advisories/mfsa2020-08/"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2020-09/","reference_id":"","reference_type":"","scores":[],"url":"https://www.mozilla.org/security/advisories/mfsa2020-09/"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2020-10/","reference_id":"","reference_type":"","scores":[],"url":"https://www.mozilla.org/security/advisories/mfsa2020-10/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1812204","reference_id":"1812204","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1812204"},{"reference_url":"https://security.archlinux.org/ASA-202003-11","reference_id":"ASA-202003-11","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202003-11"},{"reference_url":"https://security.archlinux.org/ASA-202003-8","reference_id":"ASA-202003-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202003-8"},{"reference_url":"https://security.archlinux.org/AVG-1112","reference_id":"AVG-1112","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1112"},{"reference_url":"https://security.archlinux.org/AVG-1115","reference_id":"AVG-1115","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1115"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-6812","reference_id":"CVE-2020-6812","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-6812"},{"reference_url":"https://security.gentoo.org/glsa/202003-02","reference_id":"GLSA-202003-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-02"},{"reference_url":"https://security.gentoo.org/glsa/202003-10","reference_id":"GLSA-202003-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-08","reference_id":"mfsa2020-08","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-09","reference_id":"mfsa2020-09","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-09"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-10","reference_id":"mfsa2020-10","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-10"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0815","reference_id":"RHSA-2020:0815","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0815"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0816","reference_id":"RHSA-2020:0816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0816"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0819","reference_id":"RHSA-2020:0819","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0819"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0820","reference_id":"RHSA-2020:0820","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0820"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0905","reference_id":"RHSA-2020:0905","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0905"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0914","reference_id":"RHSA-2020:0914","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0914"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0918","reference_id":"RHSA-2020:0918","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0918"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0919","reference_id":"RHSA-2020:0919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0919"},{"reference_url":"https://usn.ubuntu.com/4299-1/","reference_id":"USN-4299-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4299-1/"},{"reference_url":"https://usn.ubuntu.com/4328-1/","reference_id":"USN-4328-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4328-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79132?format=json","purl":"pkg:ebuild/www-client/firefox-bin@68.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@68.6.0"}],"aliases":["CVE-2020-6812"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yr3c-1cqv-n3bw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51224?format=json","vulnerability_id":"VCID-zbpq-qcww-6yg1","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the\n    worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17026.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17026.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17026","reference_id":"","reference_type":"","scores":[{"value":"0.55554","scoring_system":"epss","scoring_elements":"0.98104","published_at":"2026-05-14T12:55:00Z"},{"value":"0.5907","scoring_system":"epss","scoring_elements":"0.98235","published_at":"2026-04-18T12:55:00Z"},{"value":"0.5907","scoring_system":"epss","scoring_elements":"0.98244","published_at":"2026-05-11T12:55:00Z"},{"value":"0.5907","scoring_system":"epss","scoring_elements":"0.98247","published_at":"2026-05-12T12:55:00Z"},{"value":"0.5907","scoring_system":"epss","scoring_elements":"0.98243","published_at":"2026-05-07T12:55:00Z"},{"value":"0.5907","scoring_system":"epss","scoring_elements":"0.98233","published_at":"2026-04-21T12:55:00Z"},{"value":"0.59605","scoring_system":"epss","scoring_elements":"0.9826","published_at":"2026-04-24T12:55:00Z"},{"value":"0.59605","scoring_system":"epss","scoring_elements":"0.98262","published_at":"2026-04-29T12:55:00Z"},{"value":"0.64805","scoring_system":"epss","scoring_elements":"0.98464","published_at":"2026-04-12T12:55:00Z"},{"value":"0.64805","scoring_system":"epss","scoring_elements":"0.98451","published_at":"2026-04-01T12:55:00Z"},{"value":"0.64805","scoring_system":"epss","scoring_elements":"0.98456","published_at":"2026-04-04T12:55:00Z"},{"value":"0.64805","scoring_system":"epss","scoring_elements":"0.98457","published_at":"2026-04-07T12:55:00Z"},{"value":"0.64805","scoring_system":"epss","scoring_elements":"0.98461","published_at":"2026-04-08T12:55:00Z"},{"value":"0.64805","scoring_system":"epss","scoring_elements":"0.98453","published_at":"2026-04-02T12:55:00Z"},{"value":"0.64805","scoring_system":"epss","scoring_elements":"0.98462","published_at":"2026-04-09T12:55:00Z"},{"value":"0.64805","scoring_system":"epss","scoring_elements":"0.98465","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17026"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17016","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17016"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17017","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17017"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17022","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17022"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17024","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17024"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17026","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17026"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1789214","reference_id":"1789214","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1789214"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=948452","reference_id":"948452","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=948452"},{"reference_url":"https://security.archlinux.org/ASA-202001-3","reference_id":"ASA-202001-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202001-3"},{"reference_url":"https://security.archlinux.org/ASA-202001-4","reference_id":"ASA-202001-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202001-4"},{"reference_url":"https://security.archlinux.org/AVG-1085","reference_id":"AVG-1085","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1085"},{"reference_url":"https://security.archlinux.org/AVG-1086","reference_id":"AVG-1086","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1086"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows_x86-64/local/49864.js","reference_id":"CVE-2019-17026","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows_x86-64/local/49864.js"},{"reference_url":"http://packetstormsecurity.com/files/162568/Firefox-72-IonMonkey-JIT-Type-Confusion.html","reference_id":"Firefox-72-IonMonkey-JIT-Type-Confusion.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:48:51Z/"}],"url":"http://packetstormsecurity.com/files/162568/Firefox-72-IonMonkey-JIT-Type-Confusion.html"},{"reference_url":"https://security.gentoo.org/glsa/202003-02","reference_id":"GLSA-202003-02","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:48:51Z/"}],"url":"https://security.gentoo.org/glsa/202003-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-03","reference_id":"mfsa2020-03","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-03"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2020-03/","reference_id":"mfsa2020-03","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:48:51Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2020-03/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-04","reference_id":"mfsa2020-04","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-04"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2020-04/","reference_id":"mfsa2020-04","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:48:51Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2020-04/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0085","reference_id":"RHSA-2020:0085","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0085"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0086","reference_id":"RHSA-2020:0086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0111","reference_id":"RHSA-2020:0111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0120","reference_id":"RHSA-2020:0120","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0120"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0123","reference_id":"RHSA-2020:0123","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0123"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0127","reference_id":"RHSA-2020:0127","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0127"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0292","reference_id":"RHSA-2020:0292","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0292"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0295","reference_id":"RHSA-2020:0295","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0295"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1607443","reference_id":"show_bug.cgi?id=1607443","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:48:51Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1607443"},{"reference_url":"https://usn.ubuntu.com/4234-1/","reference_id":"USN-4234-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4234-1/"},{"reference_url":"https://usn.ubuntu.com/4241-1/","reference_id":"USN-4241-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4241-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:48:51Z/"}],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79132?format=json","purl":"pkg:ebuild/www-client/firefox-bin@68.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@68.6.0"}],"aliases":["CVE-2019-17026"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zbpq-qcww-6yg1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31931?format=json","vulnerability_id":"VCID-zh2m-qyw5-dkgn","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17011.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17011.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17011","reference_id":"","reference_type":"","scores":[{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.80124","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.8002","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.80033","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.80056","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.80071","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.80067","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.80083","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79891","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79898","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79919","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79907","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79935","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79943","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79963","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79947","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79939","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79967","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.7997","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79998","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.80004","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1779436","reference_id":"1779436","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1779436"},{"reference_url":"https://security.archlinux.org/ASA-201912-1","reference_id":"ASA-201912-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201912-1"},{"reference_url":"https://security.archlinux.org/ASA-201912-2","reference_id":"ASA-201912-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201912-2"},{"reference_url":"https://security.archlinux.org/AVG-1071","reference_id":"AVG-1071","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1071"},{"reference_url":"https://security.archlinux.org/AVG-1072","reference_id":"AVG-1072","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1072"},{"reference_url":"https://security.gentoo.org/glsa/202003-02","reference_id":"GLSA-202003-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-02"},{"reference_url":"https://security.gentoo.org/glsa/202003-10","reference_id":"GLSA-202003-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-36","reference_id":"mfsa2019-36","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-36"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-37","reference_id":"mfsa2019-37","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-37"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-38","reference_id":"mfsa2019-38","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-38"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4107","reference_id":"RHSA-2019:4107","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4108","reference_id":"RHSA-2019:4108","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4111","reference_id":"RHSA-2019:4111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4148","reference_id":"RHSA-2019:4148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4195","reference_id":"RHSA-2019:4195","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4195"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4205","reference_id":"RHSA-2019:4205","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4205"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0292","reference_id":"RHSA-2020:0292","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0292"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0295","reference_id":"RHSA-2020:0295","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0295"},{"reference_url":"https://usn.ubuntu.com/4216-1/","reference_id":"USN-4216-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4216-1/"},{"reference_url":"https://usn.ubuntu.com/4216-2/","reference_id":"USN-4216-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4216-2/"},{"reference_url":"https://usn.ubuntu.com/4241-1/","reference_id":"USN-4241-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4241-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79132?format=json","purl":"pkg:ebuild/www-client/firefox-bin@68.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@68.6.0"}],"aliases":["CVE-2019-17011"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zh2m-qyw5-dkgn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31930?format=json","vulnerability_id":"VCID-zstj-sux9-ubdd","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17010.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17010.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17010","reference_id":"","reference_type":"","scores":[{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.80124","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.8002","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.80033","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.80056","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.80071","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.80067","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.80083","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79891","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79898","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79919","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79907","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79935","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79943","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79963","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79947","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79939","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79967","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.7997","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79998","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.80004","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1779434","reference_id":"1779434","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1779434"},{"reference_url":"https://security.archlinux.org/ASA-201912-1","reference_id":"ASA-201912-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201912-1"},{"reference_url":"https://security.archlinux.org/ASA-201912-2","reference_id":"ASA-201912-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201912-2"},{"reference_url":"https://security.archlinux.org/AVG-1071","reference_id":"AVG-1071","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1071"},{"reference_url":"https://security.archlinux.org/AVG-1072","reference_id":"AVG-1072","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1072"},{"reference_url":"https://security.gentoo.org/glsa/202003-02","reference_id":"GLSA-202003-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-02"},{"reference_url":"https://security.gentoo.org/glsa/202003-10","reference_id":"GLSA-202003-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-36","reference_id":"mfsa2019-36","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-36"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-37","reference_id":"mfsa2019-37","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-37"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-38","reference_id":"mfsa2019-38","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-38"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4107","reference_id":"RHSA-2019:4107","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4108","reference_id":"RHSA-2019:4108","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4111","reference_id":"RHSA-2019:4111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4148","reference_id":"RHSA-2019:4148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4195","reference_id":"RHSA-2019:4195","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4195"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4205","reference_id":"RHSA-2019:4205","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4205"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0292","reference_id":"RHSA-2020:0292","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0292"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0295","reference_id":"RHSA-2020:0295","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0295"},{"reference_url":"https://usn.ubuntu.com/4216-1/","reference_id":"USN-4216-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4216-1/"},{"reference_url":"https://usn.ubuntu.com/4216-2/","reference_id":"USN-4216-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4216-2/"},{"reference_url":"https://usn.ubuntu.com/4241-1/","reference_id":"USN-4241-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4241-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79132?format=json","purl":"pkg:ebuild/www-client/firefox-bin@68.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@68.6.0"}],"aliases":["CVE-2019-17010"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zstj-sux9-ubdd"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@68.6.0"}