Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/chromium-browser@50.0.2661.94-1?arch=el6
Typerpm
Namespaceredhat
Namechromium-browser
Version50.0.2661.94-1
Qualifiers
arch el6
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-3gc7-nyyq-vycu
vulnerability_id VCID-3gc7-nyyq-vycu
summary
Multiple vulnerabilities have been found in the Chromium web
    browser, the worst of which allows remote attackers to execute arbitrary
    code.
references
0
reference_url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0707.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0707.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1665.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1665.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1665
reference_id
reference_type
scores
0
value 0.01603
scoring_system epss
scoring_elements 0.81776
published_at 2026-04-24T12:55:00Z
1
value 0.01603
scoring_system epss
scoring_elements 0.81748
published_at 2026-04-18T12:55:00Z
2
value 0.01603
scoring_system epss
scoring_elements 0.81752
published_at 2026-04-21T12:55:00Z
3
value 0.01603
scoring_system epss
scoring_elements 0.81648
published_at 2026-04-01T12:55:00Z
4
value 0.01603
scoring_system epss
scoring_elements 0.81659
published_at 2026-04-02T12:55:00Z
5
value 0.01603
scoring_system epss
scoring_elements 0.81681
published_at 2026-04-04T12:55:00Z
6
value 0.01603
scoring_system epss
scoring_elements 0.81679
published_at 2026-04-07T12:55:00Z
7
value 0.01603
scoring_system epss
scoring_elements 0.81705
published_at 2026-04-08T12:55:00Z
8
value 0.01603
scoring_system epss
scoring_elements 0.8171
published_at 2026-04-13T12:55:00Z
9
value 0.01603
scoring_system epss
scoring_elements 0.8173
published_at 2026-04-11T12:55:00Z
10
value 0.01603
scoring_system epss
scoring_elements 0.81717
published_at 2026-04-12T12:55:00Z
11
value 0.01603
scoring_system epss
scoring_elements 0.81749
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1665
8
reference_url https://codereview.chromium.org/1925463003
reference_id
reference_type
scores
url https://codereview.chromium.org/1925463003
9
reference_url https://crbug.com/606181
reference_id
reference_type
scores
url https://crbug.com/606181
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url http://www.debian.org/security/2016/dsa-3564
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3564
19
reference_url http://www.securityfocus.com/bid/89106
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/89106
20
reference_url http://www.ubuntu.com/usn/USN-2960-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2960-1
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1331640
reference_id 1331640
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1331640
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1665
reference_id CVE-2016-1665
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-1665
29
reference_url https://security.gentoo.org/glsa/201605-02
reference_id GLSA-201605-02
reference_type
scores
url https://security.gentoo.org/glsa/201605-02
30
reference_url https://access.redhat.com/errata/RHSA-2016:0707
reference_id RHSA-2016:0707
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0707
31
reference_url https://usn.ubuntu.com/2960-1/
reference_id USN-2960-1
reference_type
scores
url https://usn.ubuntu.com/2960-1/
fixed_packages
aliases CVE-2016-1665
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3gc7-nyyq-vycu
1
url VCID-5pvd-cdrh-c3gb
vulnerability_id VCID-5pvd-cdrh-c3gb
summary
Multiple vulnerabilities have been found in the Chromium web
    browser, the worst of which allows remote attackers to execute arbitrary
    code.
references
0
reference_url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0707.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0707.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1662.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1662.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1662
reference_id
reference_type
scores
0
value 0.15771
scoring_system epss
scoring_elements 0.94748
published_at 2026-04-24T12:55:00Z
1
value 0.15771
scoring_system epss
scoring_elements 0.94742
published_at 2026-04-16T12:55:00Z
2
value 0.15771
scoring_system epss
scoring_elements 0.94744
published_at 2026-04-18T12:55:00Z
3
value 0.15771
scoring_system epss
scoring_elements 0.94696
published_at 2026-04-01T12:55:00Z
4
value 0.15771
scoring_system epss
scoring_elements 0.94704
published_at 2026-04-02T12:55:00Z
5
value 0.15771
scoring_system epss
scoring_elements 0.94708
published_at 2026-04-04T12:55:00Z
6
value 0.15771
scoring_system epss
scoring_elements 0.9471
published_at 2026-04-07T12:55:00Z
7
value 0.15771
scoring_system epss
scoring_elements 0.9472
published_at 2026-04-08T12:55:00Z
8
value 0.15771
scoring_system epss
scoring_elements 0.94724
published_at 2026-04-09T12:55:00Z
9
value 0.15771
scoring_system epss
scoring_elements 0.94728
published_at 2026-04-11T12:55:00Z
10
value 0.15771
scoring_system epss
scoring_elements 0.94732
published_at 2026-04-12T12:55:00Z
11
value 0.15771
scoring_system epss
scoring_elements 0.94733
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1662
8
reference_url https://codereview.chromium.org/1887423002
reference_id
reference_type
scores
url https://codereview.chromium.org/1887423002
9
reference_url https://crbug.com/603732
reference_id
reference_type
scores
url https://crbug.com/603732
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url http://www.debian.org/security/2016/dsa-3564
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3564
19
reference_url http://www.securityfocus.com/bid/89106
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/89106
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1331637
reference_id 1331637
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1331637
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1662
reference_id CVE-2016-1662
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-1662
28
reference_url https://security.gentoo.org/glsa/201605-02
reference_id GLSA-201605-02
reference_type
scores
url https://security.gentoo.org/glsa/201605-02
29
reference_url https://access.redhat.com/errata/RHSA-2016:0707
reference_id RHSA-2016:0707
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0707
fixed_packages
aliases CVE-2016-1662
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5pvd-cdrh-c3gb
2
url VCID-9ypx-d4jg-bkcm
vulnerability_id VCID-9ypx-d4jg-bkcm
summary
Multiple vulnerabilities have been found in the Chromium web
    browser, the worst of which allows remote attackers to execute arbitrary
    code.
references
0
reference_url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0707.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0707.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1663.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1663.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1663
reference_id
reference_type
scores
0
value 0.01417
scoring_system epss
scoring_elements 0.80625
published_at 2026-04-24T12:55:00Z
1
value 0.01417
scoring_system epss
scoring_elements 0.80597
published_at 2026-04-18T12:55:00Z
2
value 0.01417
scoring_system epss
scoring_elements 0.806
published_at 2026-04-21T12:55:00Z
3
value 0.01417
scoring_system epss
scoring_elements 0.80511
published_at 2026-04-01T12:55:00Z
4
value 0.01417
scoring_system epss
scoring_elements 0.80517
published_at 2026-04-02T12:55:00Z
5
value 0.01417
scoring_system epss
scoring_elements 0.8054
published_at 2026-04-04T12:55:00Z
6
value 0.01417
scoring_system epss
scoring_elements 0.80531
published_at 2026-04-07T12:55:00Z
7
value 0.01417
scoring_system epss
scoring_elements 0.8056
published_at 2026-04-08T12:55:00Z
8
value 0.01417
scoring_system epss
scoring_elements 0.8057
published_at 2026-04-09T12:55:00Z
9
value 0.01417
scoring_system epss
scoring_elements 0.80587
published_at 2026-04-11T12:55:00Z
10
value 0.01417
scoring_system epss
scoring_elements 0.80574
published_at 2026-04-12T12:55:00Z
11
value 0.01417
scoring_system epss
scoring_elements 0.80566
published_at 2026-04-13T12:55:00Z
12
value 0.01417
scoring_system epss
scoring_elements 0.80595
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1663
8
reference_url https://codereview.chromium.org/1904913002/
reference_id
reference_type
scores
url https://codereview.chromium.org/1904913002/
9
reference_url https://crbug.com/603987
reference_id
reference_type
scores
url https://crbug.com/603987
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url http://www.debian.org/security/2016/dsa-3564
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3564
19
reference_url http://www.securityfocus.com/bid/89106
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/89106
20
reference_url http://www.ubuntu.com/usn/USN-2960-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2960-1
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1331638
reference_id 1331638
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1331638
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1663
reference_id CVE-2016-1663
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-1663
29
reference_url https://security.gentoo.org/glsa/201605-02
reference_id GLSA-201605-02
reference_type
scores
url https://security.gentoo.org/glsa/201605-02
30
reference_url https://access.redhat.com/errata/RHSA-2016:0707
reference_id RHSA-2016:0707
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0707
31
reference_url https://usn.ubuntu.com/2960-1/
reference_id USN-2960-1
reference_type
scores
url https://usn.ubuntu.com/2960-1/
fixed_packages
aliases CVE-2016-1663
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9ypx-d4jg-bkcm
3
url VCID-k754-me1v-kye1
vulnerability_id VCID-k754-me1v-kye1
summary
Multiple vulnerabilities have been found in the Chromium web
    browser, the worst of which allows remote attackers to execute arbitrary
    code.
references
0
reference_url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0707.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0707.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1664.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1664.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1664
reference_id
reference_type
scores
0
value 0.01056
scoring_system epss
scoring_elements 0.77659
published_at 2026-04-24T12:55:00Z
1
value 0.01056
scoring_system epss
scoring_elements 0.77633
published_at 2026-04-18T12:55:00Z
2
value 0.01056
scoring_system epss
scoring_elements 0.77627
published_at 2026-04-21T12:55:00Z
3
value 0.01056
scoring_system epss
scoring_elements 0.77538
published_at 2026-04-01T12:55:00Z
4
value 0.01056
scoring_system epss
scoring_elements 0.77544
published_at 2026-04-02T12:55:00Z
5
value 0.01056
scoring_system epss
scoring_elements 0.7757
published_at 2026-04-04T12:55:00Z
6
value 0.01056
scoring_system epss
scoring_elements 0.77551
published_at 2026-04-07T12:55:00Z
7
value 0.01056
scoring_system epss
scoring_elements 0.77581
published_at 2026-04-08T12:55:00Z
8
value 0.01056
scoring_system epss
scoring_elements 0.77587
published_at 2026-04-09T12:55:00Z
9
value 0.01056
scoring_system epss
scoring_elements 0.77615
published_at 2026-04-11T12:55:00Z
10
value 0.01056
scoring_system epss
scoring_elements 0.77599
published_at 2026-04-12T12:55:00Z
11
value 0.01056
scoring_system epss
scoring_elements 0.77597
published_at 2026-04-13T12:55:00Z
12
value 0.01056
scoring_system epss
scoring_elements 0.77635
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1664
8
reference_url https://codereview.chromium.org/1848813005/
reference_id
reference_type
scores
url https://codereview.chromium.org/1848813005/
9
reference_url https://crbug.com/597322
reference_id
reference_type
scores
url https://crbug.com/597322
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url http://www.debian.org/security/2016/dsa-3564
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3564
19
reference_url http://www.securityfocus.com/bid/89106
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/89106
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1331639
reference_id 1331639
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1331639
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1664
reference_id CVE-2016-1664
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-1664
28
reference_url https://security.gentoo.org/glsa/201605-02
reference_id GLSA-201605-02
reference_type
scores
url https://security.gentoo.org/glsa/201605-02
29
reference_url https://access.redhat.com/errata/RHSA-2016:0707
reference_id RHSA-2016:0707
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0707
fixed_packages
aliases CVE-2016-1664
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k754-me1v-kye1
4
url VCID-rksh-5ywn-kqbv
vulnerability_id VCID-rksh-5ywn-kqbv
summary
Multiple vulnerabilities have been found in the Chromium web
    browser, the worst of which allows remote attackers to execute arbitrary
    code.
references
0
reference_url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0707.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0707.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1660.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1660.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1660
reference_id
reference_type
scores
0
value 0.01238
scoring_system epss
scoring_elements 0.79282
published_at 2026-04-24T12:55:00Z
1
value 0.01238
scoring_system epss
scoring_elements 0.79246
published_at 2026-04-18T12:55:00Z
2
value 0.01238
scoring_system epss
scoring_elements 0.79247
published_at 2026-04-21T12:55:00Z
3
value 0.01238
scoring_system epss
scoring_elements 0.79178
published_at 2026-04-01T12:55:00Z
4
value 0.01238
scoring_system epss
scoring_elements 0.79185
published_at 2026-04-02T12:55:00Z
5
value 0.01238
scoring_system epss
scoring_elements 0.79208
published_at 2026-04-04T12:55:00Z
6
value 0.01238
scoring_system epss
scoring_elements 0.79194
published_at 2026-04-07T12:55:00Z
7
value 0.01238
scoring_system epss
scoring_elements 0.79219
published_at 2026-04-08T12:55:00Z
8
value 0.01238
scoring_system epss
scoring_elements 0.79226
published_at 2026-04-09T12:55:00Z
9
value 0.01238
scoring_system epss
scoring_elements 0.7925
published_at 2026-04-16T12:55:00Z
10
value 0.01238
scoring_system epss
scoring_elements 0.79235
published_at 2026-04-12T12:55:00Z
11
value 0.01238
scoring_system epss
scoring_elements 0.79224
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1660
8
reference_url https://codereview.chromium.org/1672603002
reference_id
reference_type
scores
url https://codereview.chromium.org/1672603002
9
reference_url https://codereview.chromium.org/1677363002
reference_id
reference_type
scores
url https://codereview.chromium.org/1677363002
10
reference_url https://crbug.com/574802
reference_id
reference_type
scores
url https://crbug.com/574802
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url http://www.debian.org/security/2016/dsa-3564
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3564
20
reference_url http://www.securityfocus.com/bid/89106
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/89106
21
reference_url http://www.ubuntu.com/usn/USN-2960-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2960-1
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1331635
reference_id 1331635
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1331635
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1660
reference_id CVE-2016-1660
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-1660
30
reference_url https://security.gentoo.org/glsa/201605-02
reference_id GLSA-201605-02
reference_type
scores
url https://security.gentoo.org/glsa/201605-02
31
reference_url https://access.redhat.com/errata/RHSA-2016:0707
reference_id RHSA-2016:0707
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0707
32
reference_url https://usn.ubuntu.com/2960-1/
reference_id USN-2960-1
reference_type
scores
url https://usn.ubuntu.com/2960-1/
fixed_packages
aliases CVE-2016-1660
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rksh-5ywn-kqbv
5
url VCID-vax8-arng-hyhr
vulnerability_id VCID-vax8-arng-hyhr
summary
Multiple vulnerabilities have been found in the Chromium web
    browser, the worst of which allows remote attackers to execute arbitrary
    code.
references
0
reference_url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0707.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0707.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1661.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1661.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1661
reference_id
reference_type
scores
0
value 0.00995
scoring_system epss
scoring_elements 0.77005
published_at 2026-04-24T12:55:00Z
1
value 0.00995
scoring_system epss
scoring_elements 0.76979
published_at 2026-04-18T12:55:00Z
2
value 0.00995
scoring_system epss
scoring_elements 0.76971
published_at 2026-04-21T12:55:00Z
3
value 0.00995
scoring_system epss
scoring_elements 0.76871
published_at 2026-04-01T12:55:00Z
4
value 0.00995
scoring_system epss
scoring_elements 0.76877
published_at 2026-04-02T12:55:00Z
5
value 0.00995
scoring_system epss
scoring_elements 0.76908
published_at 2026-04-04T12:55:00Z
6
value 0.00995
scoring_system epss
scoring_elements 0.7689
published_at 2026-04-07T12:55:00Z
7
value 0.00995
scoring_system epss
scoring_elements 0.76922
published_at 2026-04-08T12:55:00Z
8
value 0.00995
scoring_system epss
scoring_elements 0.76932
published_at 2026-04-09T12:55:00Z
9
value 0.00995
scoring_system epss
scoring_elements 0.7696
published_at 2026-04-11T12:55:00Z
10
value 0.00995
scoring_system epss
scoring_elements 0.7694
published_at 2026-04-12T12:55:00Z
11
value 0.00995
scoring_system epss
scoring_elements 0.76935
published_at 2026-04-13T12:55:00Z
12
value 0.00995
scoring_system epss
scoring_elements 0.76976
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1661
8
reference_url https://codereview.chromium.org/1887553002/
reference_id
reference_type
scores
url https://codereview.chromium.org/1887553002/
9
reference_url https://crbug.com/601629
reference_id
reference_type
scores
url https://crbug.com/601629
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url http://www.debian.org/security/2016/dsa-3564
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3564
19
reference_url http://www.securityfocus.com/bid/89106
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/89106
20
reference_url http://www.ubuntu.com/usn/USN-2960-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2960-1
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1331636
reference_id 1331636
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1331636
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1661
reference_id CVE-2016-1661
reference_type
scores
0
value 8.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:C
1
value 8.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-1661
29
reference_url https://security.gentoo.org/glsa/201605-02
reference_id GLSA-201605-02
reference_type
scores
url https://security.gentoo.org/glsa/201605-02
30
reference_url https://access.redhat.com/errata/RHSA-2016:0707
reference_id RHSA-2016:0707
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0707
31
reference_url https://usn.ubuntu.com/2960-1/
reference_id USN-2960-1
reference_type
scores
url https://usn.ubuntu.com/2960-1/
fixed_packages
aliases CVE-2016-1661
risk_score 3.8
exploitability 0.5
weighted_severity 7.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vax8-arng-hyhr
6
url VCID-z9hd-cdnj-mbfm
vulnerability_id VCID-z9hd-cdnj-mbfm
summary
Multiple vulnerabilities have been found in the Chromium web
    browser, the worst of which allows remote attackers to execute arbitrary
    code.
references
0
reference_url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0707.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0707.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1666.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1666.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1666
reference_id
reference_type
scores
0
value 0.00777
scoring_system epss
scoring_elements 0.73703
published_at 2026-04-24T12:55:00Z
1
value 0.00777
scoring_system epss
scoring_elements 0.7367
published_at 2026-04-21T12:55:00Z
2
value 0.00777
scoring_system epss
scoring_elements 0.73679
published_at 2026-04-18T12:55:00Z
3
value 0.00777
scoring_system epss
scoring_elements 0.73576
published_at 2026-04-01T12:55:00Z
4
value 0.00777
scoring_system epss
scoring_elements 0.73585
published_at 2026-04-02T12:55:00Z
5
value 0.00777
scoring_system epss
scoring_elements 0.73608
published_at 2026-04-04T12:55:00Z
6
value 0.00777
scoring_system epss
scoring_elements 0.73581
published_at 2026-04-07T12:55:00Z
7
value 0.00777
scoring_system epss
scoring_elements 0.73617
published_at 2026-04-08T12:55:00Z
8
value 0.00777
scoring_system epss
scoring_elements 0.7363
published_at 2026-04-09T12:55:00Z
9
value 0.00777
scoring_system epss
scoring_elements 0.73652
published_at 2026-04-11T12:55:00Z
10
value 0.00777
scoring_system epss
scoring_elements 0.73635
published_at 2026-04-12T12:55:00Z
11
value 0.00777
scoring_system epss
scoring_elements 0.73626
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1666
8
reference_url https://bugs.chromium.org/p/chromium/issues/detail?id=601001
reference_id
reference_type
scores
url https://bugs.chromium.org/p/chromium/issues/detail?id=601001
9
reference_url https://bugs.chromium.org/p/chromium/issues/detail?id=605491
reference_id
reference_type
scores
url https://bugs.chromium.org/p/chromium/issues/detail?id=605491
10
reference_url https://crbug.com/607652
reference_id
reference_type
scores
url https://crbug.com/607652
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url http://www.debian.org/security/2016/dsa-3564
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3564
20
reference_url http://www.securityfocus.com/bid/89106
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/89106
21
reference_url http://www.ubuntu.com/usn/USN-2960-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2960-1
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1331642
reference_id 1331642
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1331642
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1666
reference_id CVE-2016-1666
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-1666
30
reference_url https://security.gentoo.org/glsa/201605-02
reference_id GLSA-201605-02
reference_type
scores
url https://security.gentoo.org/glsa/201605-02
31
reference_url https://access.redhat.com/errata/RHSA-2016:0707
reference_id RHSA-2016:0707
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0707
32
reference_url https://usn.ubuntu.com/2960-1/
reference_id USN-2960-1
reference_type
scores
url https://usn.ubuntu.com/2960-1/
fixed_packages
aliases CVE-2016-1666
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z9hd-cdnj-mbfm
Fixing_vulnerabilities
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/chromium-browser@50.0.2661.94-1%3Farch=el6