Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/114505?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/114505?format=api", "purl": "pkg:rpm/redhat/chromium-browser@52.0.2743.82-1?arch=el6", "type": "rpm", "namespace": "redhat", "name": "chromium-browser", "version": "52.0.2743.82-1", "qualifiers": { "arch": "el6" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81416?format=api", "vulnerability_id": "VCID-3k8j-c39d-r3ee", "summary": "security update", "references": [ { "reference_url": "http://crbug.com/590619", "reference_id": "", "reference_type": "", "scores": [], "url": "http://crbug.com/590619" }, { "reference_url": "http://crbug.com/599458", "reference_id": "", "reference_type": "", "scores": [], "url": "http://crbug.com/599458" }, { "reference_url": "http://crbug.com/600953", "reference_id": "", "reference_type": "", "scores": [], "url": "http://crbug.com/600953" }, { "reference_url": "http://crbug.com/609286", "reference_id": "", "reference_type": "", "scores": [], "url": "http://crbug.com/609286" }, { "reference_url": "http://crbug.com/611959", "reference_id": "", "reference_type": "", "scores": [], "url": "http://crbug.com/611959" }, { "reference_url": "http://crbug.com/612939", "reference_id": "", "reference_type": "", "scores": [], "url": "http://crbug.com/612939" }, { "reference_url": "http://crbug.com/613869", "reference_id": "", "reference_type": "", "scores": [], "url": "http://crbug.com/613869" }, { "reference_url": "http://crbug.com/613971", "reference_id": "", "reference_type": "", "scores": [], "url": "http://crbug.com/613971" }, { "reference_url": "http://crbug.com/614405", "reference_id": "", "reference_type": "", "scores": [], "url": "http://crbug.com/614405" }, { "reference_url": "http://crbug.com/614701", "reference_id": "", "reference_type": "", "scores": [], "url": "http://crbug.com/614701" }, { "reference_url": "http://crbug.com/614989", "reference_id": "", "reference_type": "", "scores": [], "url": "http://crbug.com/614989" }, { "reference_url": "http://crbug.com/615820", "reference_id": "", "reference_type": "", "scores": [], "url": "http://crbug.com/615820" }, { "reference_url": "http://crbug.com/619378", "reference_id": "", "reference_type": "", "scores": [], "url": "http://crbug.com/619378" }, { "reference_url": "http://crbug.com/619382", "reference_id": "", "reference_type": "", "scores": [], "url": "http://crbug.com/619382" }, { "reference_url": "http://crbug.com/620694", "reference_id": "", "reference_type": "", "scores": [], "url": "http://crbug.com/620694" }, { "reference_url": "http://crbug.com/620737", "reference_id": "", "reference_type": "", "scores": [], "url": "http://crbug.com/620737" }, { "reference_url": "http://crbug.com/620858", "reference_id": "", "reference_type": "", "scores": [], "url": "http://crbug.com/620858" }, { "reference_url": "http://crbug.com/620952", "reference_id": "", "reference_type": "", "scores": [], "url": "http://crbug.com/620952" }, { "reference_url": "http://crbug.com/621843", "reference_id": "", "reference_type": "", "scores": [], "url": "http://crbug.com/621843" }, { "reference_url": "http://crbug.com/622522", "reference_id": "", "reference_type": "", "scores": [], "url": "http://crbug.com/622522" }, { "reference_url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1705.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1705.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1705", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00621", "scoring_system": "epss", "scoring_elements": "0.70002", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00621", "scoring_system": "epss", "scoring_elements": "0.70108", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00621", "scoring_system": "epss", "scoring_elements": "0.70078", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00621", "scoring_system": "epss", "scoring_elements": "0.70065", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00621", "scoring_system": "epss", "scoring_elements": "0.70015", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00621", "scoring_system": "epss", "scoring_elements": "0.70029", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00621", "scoring_system": "epss", "scoring_elements": "0.70006", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00621", "scoring_system": "epss", "scoring_elements": "0.70054", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00621", "scoring_system": "epss", "scoring_elements": "0.7007", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00621", "scoring_system": "epss", "scoring_elements": "0.70093", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1705" }, { "reference_url": "https://crbug.com/629852", "reference_id": "", "reference_type": "", "scores": [], "url": "https://crbug.com/629852" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3637", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3637" }, { "reference_url": "http://www.securityfocus.com/bid/92053", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/92053" }, { "reference_url": "http://www.securitytracker.com/id/1036428", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1036428" }, { "reference_url": "http://www.ubuntu.com/usn/USN-3041-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-3041-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358649", "reference_id": "1358649", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358649" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1705", "reference_id": "CVE-2016-1705", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1705" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1485", "reference_id": "RHSA-2016:1485", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1485" }, { "reference_url": "https://usn.ubuntu.com/3041-1/", "reference_id": "USN-3041-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3041-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-1705" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3k8j-c39d-r3ee" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58947?format=api", "vulnerability_id": "VCID-4nqh-txx3-6qd5", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5136.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5136.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5136", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01987", "scoring_system": "epss", "scoring_elements": "0.83531", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01987", "scoring_system": "epss", "scoring_elements": "0.83631", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01987", "scoring_system": "epss", "scoring_elements": "0.836", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01987", "scoring_system": "epss", "scoring_elements": "0.83596", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01987", "scoring_system": "epss", "scoring_elements": "0.83543", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01987", "scoring_system": "epss", "scoring_elements": "0.83558", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01987", "scoring_system": "epss", "scoring_elements": "0.83559", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01987", "scoring_system": "epss", "scoring_elements": "0.83583", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01987", "scoring_system": "epss", "scoring_elements": "0.83592", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01987", "scoring_system": "epss", "scoring_elements": "0.83607", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5136" }, { "reference_url": "https://codereview.chromium.org/2116923002/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/2116923002/" }, { "reference_url": "https://codereview.chromium.org/2134613002/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/2134613002/" }, { "reference_url": "https://crbug.com/625393", "reference_id": "", "reference_type": "", "scores": [], "url": "https://crbug.com/625393" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3637", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3637" }, { "reference_url": "http://www.securityfocus.com/bid/92053", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/92053" }, { "reference_url": "http://www.securitytracker.com/id/1036428", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1036428" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358647", "reference_id": "1358647", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358647" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5136", "reference_id": "CVE-2016-5136", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5136" }, { "reference_url": "https://security.gentoo.org/glsa/201610-09", "reference_id": "GLSA-201610-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201610-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1485", "reference_id": "RHSA-2016:1485", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1485" } ], "fixed_packages": [], "aliases": [ "CVE-2016-5136" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4nqh-txx3-6qd5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58945?format=api", "vulnerability_id": "VCID-5yqp-z394-9bgg", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5135.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5135.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5135", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00431", "scoring_system": "epss", "scoring_elements": "0.62472", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00431", "scoring_system": "epss", "scoring_elements": "0.6262", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00431", "scoring_system": "epss", "scoring_elements": "0.62613", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00431", "scoring_system": "epss", "scoring_elements": "0.62601", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00431", "scoring_system": "epss", "scoring_elements": "0.6253", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00431", "scoring_system": "epss", "scoring_elements": "0.62562", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00431", "scoring_system": "epss", "scoring_elements": "0.62529", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00431", "scoring_system": "epss", "scoring_elements": "0.62579", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00431", "scoring_system": "epss", "scoring_elements": "0.62595", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5135" }, { "reference_url": "https://codereview.chromium.org/1913983002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/1913983002" }, { "reference_url": "https://crbug.com/605451", "reference_id": "", "reference_type": "", "scores": [], "url": "https://crbug.com/605451" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3637", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3637" }, { "reference_url": "http://www.securityfocus.com/bid/92053", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/92053" }, { "reference_url": "http://www.securitytracker.com/id/1036428", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1036428" }, { "reference_url": "http://www.ubuntu.com/usn/USN-3041-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-3041-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358646", "reference_id": "1358646", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358646" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5135", "reference_id": "CVE-2016-5135", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5135" }, { "reference_url": "https://security.gentoo.org/glsa/201610-09", "reference_id": "GLSA-201610-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201610-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1485", "reference_id": "RHSA-2016:1485", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1485" }, { "reference_url": "https://usn.ubuntu.com/3041-1/", "reference_id": "USN-3041-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3041-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-5135" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5yqp-z394-9bgg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81419?format=api", "vulnerability_id": "VCID-8v3j-utvs-eugu", "summary": "security update", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1708.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1708.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1708", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81196", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81296", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81267", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.8126", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81205", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81228", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81256", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81261", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01522", "scoring_system": "epss", "scoring_elements": "0.81281", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1708" }, { "reference_url": "https://codereview.chromium.org/2103663002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/2103663002" }, { "reference_url": "https://crbug.com/613949", "reference_id": "", "reference_type": "", "scores": [], "url": "https://crbug.com/613949" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3637", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3637" }, { "reference_url": "http://www.securityfocus.com/bid/92053", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/92053" }, { "reference_url": "http://www.securitytracker.com/id/1036428", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1036428" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358632", "reference_id": "1358632", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358632" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1708", "reference_id": "CVE-2016-1708", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1708" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1485", "reference_id": "RHSA-2016:1485", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1485" } ], "fixed_packages": [], "aliases": [ "CVE-2016-1708" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8v3j-utvs-eugu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/7463?format=api", "vulnerability_id": "VCID-9q49-2srz-rkg7", "summary": "Use After Free\nUse-after-free vulnerability in libxml2, as used in Google Chrome, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the XPointer range-to function.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:49:18Z/" } ], "url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:49:18Z/" } ], "url": "http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:49:18Z/" } ], "url": "http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2016/Sep/msg00010.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:49:18Z/" } ], "url": "http://lists.apple.com/archives/security-announce/2016/Sep/msg00010.html" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:49:18Z/" } ], "url": "http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:49:18Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:49:18Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:49:18Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:49:18Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:49:18Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5131.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5131.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5131", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03868", "scoring_system": "epss", "scoring_elements": "0.88223", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03868", "scoring_system": "epss", "scoring_elements": "0.8824", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03868", "scoring_system": "epss", "scoring_elements": "0.88198", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03868", "scoring_system": "epss", "scoring_elements": "0.88217", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03868", "scoring_system": "epss", "scoring_elements": "0.88226", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03868", "scoring_system": "epss", "scoring_elements": "0.88227", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03868", "scoring_system": "epss", "scoring_elements": "0.88234", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03971", "scoring_system": "epss", "scoring_elements": "0.8833", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03971", "scoring_system": "epss", "scoring_elements": "0.88352", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03971", "scoring_system": "epss", "scoring_elements": "0.88338", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5131" }, { "reference_url": "https://codereview.chromium.org/2127493002", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:49:18Z/" } ], "url": "https://codereview.chromium.org/2127493002" }, { "reference_url": "https://crbug.com/623378", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:49:18Z/" } ], "url": "https://crbug.com/623378" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4658", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4658" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://source.android.com/security/bulletin/2017-05-01", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:49:18Z/" } ], "url": "https://source.android.com/security/bulletin/2017-05-01" }, { "reference_url": "https://support.apple.com/HT207141", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:49:18Z/" } ], "url": "https://support.apple.com/HT207141" }, { "reference_url": "https://support.apple.com/HT207142", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:49:18Z/" } ], "url": "https://support.apple.com/HT207142" }, { "reference_url": "https://support.apple.com/HT207143", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:49:18Z/" } ], "url": "https://support.apple.com/HT207143" }, { "reference_url": "https://support.apple.com/HT207170", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:49:18Z/" } ], "url": "https://support.apple.com/HT207170" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3637", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:49:18Z/" } ], "url": "http://www.debian.org/security/2016/dsa-3637" }, { "reference_url": "http://www.securityfocus.com/bid/92053", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:49:18Z/" } ], "url": "http://www.securityfocus.com/bid/92053" }, { "reference_url": "http://www.securitytracker.com/id/1036428", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:49:18Z/" } ], "url": "http://www.securitytracker.com/id/1036428" }, { "reference_url": "http://www.securitytracker.com/id/1038623", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:49:18Z/" } ], "url": "http://www.securitytracker.com/id/1038623" }, { "reference_url": "http://www.ubuntu.com/usn/USN-3041-1", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:49:18Z/" } ], "url": "http://www.ubuntu.com/usn/USN-3041-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358641", "reference_id": "1358641", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:49:18Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358641" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840554", "reference_id": "840554", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840554" }, { "reference_url": "https://security.archlinux.org/ASA-201611-2", "reference_id": "ASA-201611-2", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-2" }, { "reference_url": "https://security.archlinux.org/AVG-56", "reference_id": "AVG-56", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-56" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5131", "reference_id": "CVE-2016-5131", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5131" }, { "reference_url": "https://security.gentoo.org/glsa/201610-09", "reference_id": "GLSA-201610-09", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:49:18Z/" } ], "url": "https://security.gentoo.org/glsa/201610-09" }, { "reference_url": "https://security.gentoo.org/glsa/201701-37", "reference_id": "GLSA-201701-37", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:49:18Z/" } ], "url": "https://security.gentoo.org/glsa/201701-37" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1485", "reference_id": "RHSA-2016:1485", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1485" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1190", "reference_id": "RHSA-2020:1190", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1190" }, { "reference_url": "https://usn.ubuntu.com/3041-1/", "reference_id": "USN-3041-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3041-1/" }, { "reference_url": "https://usn.ubuntu.com/3235-1/", "reference_id": "USN-3235-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3235-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-5131" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9q49-2srz-rkg7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58944?format=api", "vulnerability_id": "VCID-acym-9xwr-mqh9", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5134.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5134.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5134", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01192", "scoring_system": "epss", "scoring_elements": "0.78796", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01192", "scoring_system": "epss", "scoring_elements": "0.78872", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01192", "scoring_system": "epss", "scoring_elements": "0.78854", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01192", "scoring_system": "epss", "scoring_elements": "0.78844", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01192", "scoring_system": "epss", "scoring_elements": "0.78803", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01192", "scoring_system": "epss", "scoring_elements": "0.78832", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01192", "scoring_system": "epss", "scoring_elements": "0.78816", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01192", "scoring_system": "epss", "scoring_elements": "0.78841", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01192", "scoring_system": "epss", "scoring_elements": "0.78847", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01192", "scoring_system": "epss", "scoring_elements": "0.78871", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5134" }, { "reference_url": "https://codereview.chromium.org/1996773002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/1996773002" }, { "reference_url": "https://crbug.com/593759", "reference_id": "", "reference_type": "", "scores": [], "url": "https://crbug.com/593759" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137" }, { "reference_url": "https://www.kb.cert.org/vuls/id/877625", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.kb.cert.org/vuls/id/877625" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3637", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3637" }, { "reference_url": "http://www.securityfocus.com/bid/92053", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/92053" }, { "reference_url": "http://www.securitytracker.com/id/1036428", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1036428" }, { "reference_url": "http://www.ubuntu.com/usn/USN-3041-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-3041-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358645", "reference_id": "1358645", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358645" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5134", "reference_id": "CVE-2016-5134", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5134" }, { "reference_url": "https://security.gentoo.org/glsa/201610-09", "reference_id": "GLSA-201610-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201610-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1485", "reference_id": "RHSA-2016:1485", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1485" }, { "reference_url": "https://usn.ubuntu.com/3041-1/", "reference_id": "USN-3041-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3041-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-5134" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-acym-9xwr-mqh9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81421?format=api", "vulnerability_id": "VCID-aytz-4fva-muhr", "summary": "security update", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1710.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1710.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1710", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01281", "scoring_system": "epss", "scoring_elements": "0.79536", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01281", "scoring_system": "epss", "scoring_elements": "0.79615", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01281", "scoring_system": "epss", "scoring_elements": "0.79593", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01281", "scoring_system": "epss", "scoring_elements": "0.79585", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01281", "scoring_system": "epss", "scoring_elements": "0.79542", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01281", "scoring_system": "epss", "scoring_elements": "0.79564", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01281", "scoring_system": "epss", "scoring_elements": "0.79552", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01281", "scoring_system": "epss", "scoring_elements": "0.7958", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01281", "scoring_system": "epss", "scoring_elements": "0.79587", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01281", "scoring_system": "epss", "scoring_elements": "0.79609", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1710" }, { "reference_url": "https://codereview.chromium.org/2035973002/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/2035973002/" }, { "reference_url": "https://crbug.com/616907", "reference_id": "", "reference_type": "", "scores": [], "url": "https://crbug.com/616907" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3637", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3637" }, { "reference_url": "http://www.securityfocus.com/bid/92053", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/92053" }, { "reference_url": "http://www.securitytracker.com/id/1036428", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1036428" }, { "reference_url": "http://www.ubuntu.com/usn/USN-3041-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-3041-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358634", "reference_id": "1358634", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358634" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1710", "reference_id": "CVE-2016-1710", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1710" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1485", "reference_id": "RHSA-2016:1485", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1485" }, { "reference_url": "https://usn.ubuntu.com/3041-1/", "reference_id": "USN-3041-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3041-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-1710" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-aytz-4fva-muhr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58939?format=api", "vulnerability_id": "VCID-b322-8vgh-pkbv", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5128.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5128.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5128", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01456", "scoring_system": "epss", "scoring_elements": "0.80759", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01456", "scoring_system": "epss", "scoring_elements": "0.80852", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01456", "scoring_system": "epss", "scoring_elements": "0.80823", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01456", "scoring_system": "epss", "scoring_elements": "0.80815", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01456", "scoring_system": "epss", "scoring_elements": "0.80768", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01456", "scoring_system": "epss", "scoring_elements": "0.80788", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01456", "scoring_system": "epss", "scoring_elements": "0.80786", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01456", "scoring_system": "epss", "scoring_elements": "0.80812", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01456", "scoring_system": "epss", "scoring_elements": "0.80821", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01456", "scoring_system": "epss", "scoring_elements": "0.80838", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5128" }, { "reference_url": "https://codereview.chromium.org/2082633002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/2082633002" }, { "reference_url": "https://codereview.chromium.org/2084183004", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/2084183004" }, { "reference_url": "https://codereview.chromium.org/2085223002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/2085223002" }, { "reference_url": "https://codereview.chromium.org/2101983002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/2101983002" }, { "reference_url": "https://codereview.chromium.org/2103033002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/2103033002" }, { "reference_url": "https://crbug.com/619166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://crbug.com/619166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3637", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3637" }, { "reference_url": "http://www.securityfocus.com/bid/92053", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/92053" }, { "reference_url": "http://www.securitytracker.com/id/1036428", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1036428" }, { "reference_url": "http://www.ubuntu.com/usn/USN-3041-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-3041-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358638", "reference_id": "1358638", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358638" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:v8:5.2.360:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:v8:5.2.360:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:v8:5.2.360:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5128", "reference_id": "CVE-2016-5128", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5128" }, { "reference_url": "https://security.gentoo.org/glsa/201610-09", "reference_id": "GLSA-201610-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201610-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1485", "reference_id": "RHSA-2016:1485", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1485" }, { "reference_url": "https://usn.ubuntu.com/3041-1/", "reference_id": "USN-3041-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3041-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-5128" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b322-8vgh-pkbv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81422?format=api", "vulnerability_id": "VCID-desf-tjau-5bcv", "summary": "security update", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1711.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1711.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1711", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01777", "scoring_system": "epss", "scoring_elements": "0.82616", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01777", "scoring_system": "epss", "scoring_elements": "0.8272", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01777", "scoring_system": "epss", "scoring_elements": "0.82686", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01777", "scoring_system": "epss", "scoring_elements": "0.82682", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01777", "scoring_system": "epss", "scoring_elements": "0.82631", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01777", "scoring_system": "epss", "scoring_elements": "0.82646", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01777", "scoring_system": "epss", "scoring_elements": "0.82642", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01777", "scoring_system": "epss", "scoring_elements": "0.82668", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01777", "scoring_system": "epss", "scoring_elements": "0.82674", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01777", "scoring_system": "epss", "scoring_elements": "0.82692", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1711" }, { "reference_url": "https://codereview.chromium.org/2079473002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/2079473002" }, { "reference_url": "https://crbug.com/617495", "reference_id": "", "reference_type": "", "scores": [], "url": "https://crbug.com/617495" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3637", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3637" }, { "reference_url": "http://www.securityfocus.com/bid/92053", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/92053" }, { "reference_url": "http://www.securitytracker.com/id/1036428", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1036428" }, { "reference_url": "http://www.ubuntu.com/usn/USN-3041-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-3041-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358636", "reference_id": "1358636", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358636" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1711", "reference_id": "CVE-2016-1711", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1711" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1485", "reference_id": "RHSA-2016:1485", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1485" }, { "reference_url": "https://usn.ubuntu.com/3041-1/", "reference_id": "USN-3041-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3041-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-1711" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-desf-tjau-5bcv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58942?format=api", "vulnerability_id": "VCID-p2ua-m5px-uka1", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5132.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5132.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5132", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01594", "scoring_system": "epss", "scoring_elements": "0.81601", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01594", "scoring_system": "epss", "scoring_elements": "0.81703", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01594", "scoring_system": "epss", "scoring_elements": "0.81671", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01594", "scoring_system": "epss", "scoring_elements": "0.81664", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01594", "scoring_system": "epss", "scoring_elements": "0.81612", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01594", "scoring_system": "epss", "scoring_elements": "0.81633", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01594", "scoring_system": "epss", "scoring_elements": "0.8163", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01594", "scoring_system": "epss", "scoring_elements": "0.81658", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01594", "scoring_system": "epss", "scoring_elements": "0.81663", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01594", "scoring_system": "epss", "scoring_elements": "0.81683", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5132" }, { "reference_url": "https://codereview.chromium.org/2009453002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/2009453002" }, { "reference_url": "https://codereview.chromium.org/2061203002/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/2061203002/" }, { "reference_url": "https://codereview.chromium.org/2071433003", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/2071433003" }, { "reference_url": "https://codereview.chromium.org/2082493002/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/2082493002/" }, { "reference_url": "https://codereview.chromium.org/2085923002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/2085923002" }, { "reference_url": "https://crbug.com/607543", "reference_id": "", "reference_type": "", "scores": [], "url": "https://crbug.com/607543" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3637", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3637" }, { "reference_url": "http://www.securityfocus.com/bid/92053", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/92053" }, { "reference_url": "http://www.securitytracker.com/id/1036428", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1036428" }, { "reference_url": "http://www.ubuntu.com/usn/USN-3041-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-3041-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358642", "reference_id": "1358642", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358642" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5132", "reference_id": "CVE-2016-5132", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5132" }, { "reference_url": "https://security.gentoo.org/glsa/201610-09", "reference_id": "GLSA-201610-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201610-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1485", "reference_id": "RHSA-2016:1485", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1485" }, { "reference_url": "https://usn.ubuntu.com/3041-1/", "reference_id": "USN-3041-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3041-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-5132" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p2ua-m5px-uka1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58941?format=api", "vulnerability_id": "VCID-s79f-rab8-33ez", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5130.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5130.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5130", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0113", "scoring_system": "epss", "scoring_elements": "0.78255", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0113", "scoring_system": "epss", "scoring_elements": "0.78339", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0113", "scoring_system": "epss", "scoring_elements": "0.78316", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0113", "scoring_system": "epss", "scoring_elements": "0.7831", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0113", "scoring_system": "epss", "scoring_elements": "0.78263", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0113", "scoring_system": "epss", "scoring_elements": "0.78294", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0113", "scoring_system": "epss", "scoring_elements": "0.78275", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0113", "scoring_system": "epss", "scoring_elements": "0.78301", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0113", "scoring_system": "epss", "scoring_elements": "0.78307", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0113", "scoring_system": "epss", "scoring_elements": "0.78333", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5130" }, { "reference_url": "https://bugs.chromium.org/p/chromium/issues/detail?id=626838", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.chromium.org/p/chromium/issues/detail?id=626838" }, { "reference_url": "https://codereview.chromium.org/2134493002/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/2134493002/" }, { "reference_url": "https://codereview.chromium.org/2144823002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/2144823002" }, { "reference_url": "https://crbug.com/623319", "reference_id": "", "reference_type": "", "scores": [], "url": "https://crbug.com/623319" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3637", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3637" }, { "reference_url": "http://www.securityfocus.com/bid/92053", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/92053" }, { "reference_url": "http://www.securitytracker.com/id/1036428", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1036428" }, { "reference_url": "http://www.ubuntu.com/usn/USN-3041-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-3041-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358640", "reference_id": "1358640", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358640" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5130", "reference_id": "CVE-2016-5130", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5130" }, { "reference_url": "https://security.gentoo.org/glsa/201610-09", "reference_id": "GLSA-201610-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201610-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1485", "reference_id": "RHSA-2016:1485", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1485" }, { "reference_url": "https://usn.ubuntu.com/3041-1/", "reference_id": "USN-3041-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3041-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-5130" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s79f-rab8-33ez" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58938?format=api", "vulnerability_id": "VCID-svnc-qkzm-9bhc", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5127.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5127.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5127", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02184", "scoring_system": "epss", "scoring_elements": "0.84295", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02184", "scoring_system": "epss", "scoring_elements": "0.84387", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02184", "scoring_system": "epss", "scoring_elements": "0.84369", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02184", "scoring_system": "epss", "scoring_elements": "0.84365", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02184", "scoring_system": "epss", "scoring_elements": "0.84308", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02184", "scoring_system": "epss", "scoring_elements": "0.84328", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02184", "scoring_system": "epss", "scoring_elements": "0.84331", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02184", "scoring_system": "epss", "scoring_elements": "0.84353", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02184", "scoring_system": "epss", "scoring_elements": "0.84358", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02184", "scoring_system": "epss", "scoring_elements": "0.84376", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5127" }, { "reference_url": "https://codereview.chromium.org/2082893005/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/2082893005/" }, { "reference_url": "https://codereview.chromium.org/2091633002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/2091633002" }, { "reference_url": "https://crbug.com/618237", "reference_id": "", "reference_type": "", "scores": [], "url": "https://crbug.com/618237" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3637", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3637" }, { "reference_url": "http://www.securityfocus.com/bid/92053", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/92053" }, { "reference_url": "http://www.securitytracker.com/id/1036428", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1036428" }, { "reference_url": "http://www.ubuntu.com/usn/USN-3041-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-3041-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358637", "reference_id": "1358637", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358637" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5127", "reference_id": "CVE-2016-5127", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5127" }, { "reference_url": "https://security.gentoo.org/glsa/201610-09", "reference_id": "GLSA-201610-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201610-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1485", "reference_id": "RHSA-2016:1485", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1485" }, { "reference_url": "https://usn.ubuntu.com/3041-1/", "reference_id": "USN-3041-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3041-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-5127" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-svnc-qkzm-9bhc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58940?format=api", "vulnerability_id": "VCID-tb3n-qup4-6kfh", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5129.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5129.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5129", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02468", "scoring_system": "epss", "scoring_elements": "0.85192", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02468", "scoring_system": "epss", "scoring_elements": "0.85283", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02468", "scoring_system": "epss", "scoring_elements": "0.85266", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02468", "scoring_system": "epss", "scoring_elements": "0.85263", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02468", "scoring_system": "epss", "scoring_elements": "0.85203", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02468", "scoring_system": "epss", "scoring_elements": "0.85221", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02468", "scoring_system": "epss", "scoring_elements": "0.85224", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02468", "scoring_system": "epss", "scoring_elements": "0.85246", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02468", "scoring_system": "epss", "scoring_elements": "0.85254", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02468", "scoring_system": "epss", "scoring_elements": "0.85269", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5129" }, { "reference_url": "https://codereview.chromium.org/2078403002/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/2078403002/" }, { "reference_url": "https://codereview.chromium.org/2102243002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/2102243002" }, { "reference_url": "https://codereview.chromium.org/2111133002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/2111133002" }, { "reference_url": "https://crbug.com/620553", "reference_id": "", "reference_type": "", "scores": [], "url": "https://crbug.com/620553" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137" }, { "reference_url": "https://source.android.com/security/bulletin/2017-04-01", "reference_id": "", "reference_type": "", "scores": [], "url": "https://source.android.com/security/bulletin/2017-04-01" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3637", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3637" }, { "reference_url": "http://www.securityfocus.com/bid/92053", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/92053" }, { "reference_url": "http://www.securitytracker.com/id/1036428", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1036428" }, { "reference_url": "http://www.securitytracker.com/id/1038201", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1038201" }, { "reference_url": "http://www.ubuntu.com/usn/USN-3041-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-3041-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358639", "reference_id": "1358639", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358639" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:51.0.2704.106:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:51.0.2704.106:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:51.0.2704.106:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5129", "reference_id": "CVE-2016-5129", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5129" }, { "reference_url": "https://security.gentoo.org/glsa/201610-09", "reference_id": "GLSA-201610-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201610-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1485", "reference_id": "RHSA-2016:1485", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1485" }, { "reference_url": "https://usn.ubuntu.com/3041-1/", "reference_id": "USN-3041-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3041-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-5129" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tb3n-qup4-6kfh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58943?format=api", "vulnerability_id": "VCID-ur4s-afsc-nua7", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5133.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5133.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5133", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00653", "scoring_system": "epss", "scoring_elements": "0.70842", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00653", "scoring_system": "epss", "scoring_elements": "0.70947", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00653", "scoring_system": "epss", "scoring_elements": "0.70916", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00653", "scoring_system": "epss", "scoring_elements": "0.709", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00653", "scoring_system": "epss", "scoring_elements": "0.70856", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00653", "scoring_system": "epss", "scoring_elements": "0.70875", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00653", "scoring_system": "epss", "scoring_elements": "0.7085", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00653", "scoring_system": "epss", "scoring_elements": "0.70893", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00653", "scoring_system": "epss", "scoring_elements": "0.70909", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00653", "scoring_system": "epss", "scoring_elements": "0.70932", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5133" }, { "reference_url": "https://codereview.chromium.org/2067933002/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/2067933002/" }, { "reference_url": "https://crbug.com/613626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://crbug.com/613626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3637", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3637" }, { "reference_url": "http://www.securityfocus.com/bid/92053", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/92053" }, { "reference_url": "http://www.securitytracker.com/id/1036428", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1036428" }, { "reference_url": "http://www.ubuntu.com/usn/USN-3041-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-3041-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358643", "reference_id": "1358643", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358643" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5133", "reference_id": "CVE-2016-5133", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5133" }, { "reference_url": "https://security.gentoo.org/glsa/201610-09", "reference_id": "GLSA-201610-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201610-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1485", "reference_id": "RHSA-2016:1485", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1485" }, { "reference_url": "https://usn.ubuntu.com/3041-1/", "reference_id": "USN-3041-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3041-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-5133" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ur4s-afsc-nua7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81420?format=api", "vulnerability_id": "VCID-w6s7-6f5e-7ufz", "summary": "security update", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1709.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1709.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1709", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0155", "scoring_system": "epss", "scoring_elements": "0.81349", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0155", "scoring_system": "epss", "scoring_elements": "0.8145", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0155", "scoring_system": "epss", "scoring_elements": "0.8142", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0155", "scoring_system": "epss", "scoring_elements": "0.81413", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0155", "scoring_system": "epss", "scoring_elements": "0.81358", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0155", "scoring_system": "epss", "scoring_elements": "0.8138", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0155", "scoring_system": "epss", "scoring_elements": "0.81378", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0155", "scoring_system": "epss", "scoring_elements": "0.81406", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0155", "scoring_system": "epss", "scoring_elements": "0.81411", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0155", "scoring_system": "epss", "scoring_elements": "0.81433", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1709" }, { "reference_url": "https://crbug.com/614934", "reference_id": "", "reference_type": "", "scores": [], "url": "https://crbug.com/614934" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137" }, { "reference_url": "https://github.com/googlei18n/sfntly/commit/468cad540fa1b0027cad60456f53feabecdce2bc", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/googlei18n/sfntly/commit/468cad540fa1b0027cad60456f53feabecdce2bc" }, { "reference_url": "https://github.com/googlei18n/sfntly/commit/c56b85408bab232efd7e650f0994272a174e3b92", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/googlei18n/sfntly/commit/c56b85408bab232efd7e650f0994272a174e3b92" }, { "reference_url": "https://github.com/googlei18n/sfntly/pull/56", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/googlei18n/sfntly/pull/56" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3637", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3637" }, { "reference_url": "http://www.securityfocus.com/bid/92053", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/92053" }, { "reference_url": "http://www.securitytracker.com/id/1036428", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1036428" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358633", "reference_id": "1358633", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358633" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:sfntly:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:sfntly:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:sfntly:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1709", "reference_id": "CVE-2016-1709", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1709" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1485", "reference_id": "RHSA-2016:1485", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1485" } ], "fixed_packages": [], "aliases": [ "CVE-2016-1709" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w6s7-6f5e-7ufz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58948?format=api", "vulnerability_id": "VCID-wf48-qk32-tqcc", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5137.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5137.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5137", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01011", "scoring_system": "epss", "scoring_elements": "0.77052", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01011", "scoring_system": "epss", "scoring_elements": "0.77153", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01011", "scoring_system": "epss", "scoring_elements": "0.77117", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01011", "scoring_system": "epss", "scoring_elements": "0.77112", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01011", "scoring_system": "epss", "scoring_elements": "0.77058", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01011", "scoring_system": "epss", "scoring_elements": "0.77086", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01011", "scoring_system": "epss", "scoring_elements": "0.77068", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01011", "scoring_system": "epss", "scoring_elements": "0.77101", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01011", "scoring_system": "epss", "scoring_elements": "0.77111", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01011", "scoring_system": "epss", "scoring_elements": "0.77138", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5137" }, { "reference_url": "https://codereview.chromium.org/2125873003", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/2125873003" }, { "reference_url": "https://crbug.com/625945", "reference_id": "", "reference_type": "", "scores": [], "url": "https://crbug.com/625945" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3637", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3637" }, { "reference_url": "http://www.securityfocus.com/bid/92053", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/92053" }, { "reference_url": "http://www.securitytracker.com/id/1036428", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1036428" }, { "reference_url": "http://www.ubuntu.com/usn/USN-3041-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-3041-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358648", "reference_id": "1358648", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358648" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5137", "reference_id": "CVE-2016-5137", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" }, { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5137" }, { "reference_url": "https://security.gentoo.org/glsa/201610-09", "reference_id": "GLSA-201610-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201610-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1485", "reference_id": "RHSA-2016:1485", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1485" }, { "reference_url": "https://usn.ubuntu.com/3041-1/", "reference_id": "USN-3041-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3041-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-5137" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wf48-qk32-tqcc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81417?format=api", "vulnerability_id": "VCID-yq6t-qf82-vfa5", "summary": "security update", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-1485.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1706.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1706.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1706", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01438", "scoring_system": "epss", "scoring_elements": "0.80646", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01438", "scoring_system": "epss", "scoring_elements": "0.8074", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01438", "scoring_system": "epss", "scoring_elements": "0.80713", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01438", "scoring_system": "epss", "scoring_elements": "0.80705", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01438", "scoring_system": "epss", "scoring_elements": "0.80655", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01438", "scoring_system": "epss", "scoring_elements": "0.80677", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01438", "scoring_system": "epss", "scoring_elements": "0.80672", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01438", "scoring_system": "epss", "scoring_elements": "0.807", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01438", "scoring_system": "epss", "scoring_elements": "0.8071", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01438", "scoring_system": "epss", "scoring_elements": "0.80726", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1706" }, { "reference_url": "https://codereview.chromium.org/2069853002/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/2069853002/" }, { "reference_url": "https://crbug.com/610600", "reference_id": "", "reference_type": "", "scores": [], "url": "https://crbug.com/610600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3637", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3637" }, { "reference_url": "http://www.securitytracker.com/id/1036428", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1036428" }, { "reference_url": "http://www.ubuntu.com/usn/USN-3041-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-3041-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358630", "reference_id": "1358630", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358630" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1706", "reference_id": "CVE-2016-1706", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" }, { "value": "9.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1706" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1485", "reference_id": "RHSA-2016:1485", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1485" }, { "reference_url": "https://usn.ubuntu.com/3041-1/", "reference_id": "USN-3041-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3041-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-1706" ], "risk_score": 4.3, "exploitability": "0.5", "weighted_severity": "8.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yq6t-qf82-vfa5" } ], "fixing_vulnerabilities": [], "risk_score": "4.5", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/chromium-browser@52.0.2743.82-1%3Farch=el6" }