Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/115333?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/115333?format=api", "purl": "pkg:rpm/redhat/chromium-browser@50.0.2661.94-1?arch=el6", "type": "rpm", "namespace": "redhat", "name": "chromium-browser", "version": "50.0.2661.94-1", "qualifiers": { "arch": "el6" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48261?format=api", "vulnerability_id": "VCID-3gc7-nyyq-vycu", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0707.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0707.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1665.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1665.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1665", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01603", "scoring_system": "epss", "scoring_elements": "0.81776", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01603", "scoring_system": "epss", "scoring_elements": "0.81748", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01603", "scoring_system": "epss", "scoring_elements": "0.81752", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01603", "scoring_system": "epss", "scoring_elements": "0.81648", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01603", "scoring_system": "epss", "scoring_elements": "0.81659", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01603", "scoring_system": "epss", "scoring_elements": "0.81681", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01603", "scoring_system": "epss", "scoring_elements": "0.81679", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01603", "scoring_system": "epss", "scoring_elements": "0.81705", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01603", "scoring_system": "epss", "scoring_elements": "0.8171", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01603", "scoring_system": "epss", "scoring_elements": "0.8173", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01603", "scoring_system": "epss", "scoring_elements": "0.81717", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01603", "scoring_system": "epss", "scoring_elements": "0.81749", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1665" }, { "reference_url": "https://codereview.chromium.org/1925463003", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/1925463003" }, { "reference_url": "https://crbug.com/606181", "reference_id": "", "reference_type": "", "scores": [], "url": "https://crbug.com/606181" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3564", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3564" }, { "reference_url": "http://www.securityfocus.com/bid/89106", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/89106" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2960-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2960-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331640", "reference_id": "1331640", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331640" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1665", "reference_id": "CVE-2016-1665", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1665" }, { "reference_url": "https://security.gentoo.org/glsa/201605-02", "reference_id": "GLSA-201605-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201605-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0707", "reference_id": "RHSA-2016:0707", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0707" }, { "reference_url": "https://usn.ubuntu.com/2960-1/", "reference_id": "USN-2960-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2960-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-1665" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3gc7-nyyq-vycu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48258?format=api", "vulnerability_id": "VCID-5pvd-cdrh-c3gb", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0707.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0707.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1662.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1662.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1662", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.15771", "scoring_system": "epss", "scoring_elements": "0.94748", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.15771", "scoring_system": "epss", "scoring_elements": "0.94742", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.15771", "scoring_system": "epss", "scoring_elements": "0.94744", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.15771", "scoring_system": "epss", "scoring_elements": "0.94696", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.15771", "scoring_system": "epss", "scoring_elements": "0.94704", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.15771", "scoring_system": "epss", "scoring_elements": "0.94708", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.15771", "scoring_system": "epss", "scoring_elements": "0.9471", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.15771", "scoring_system": "epss", "scoring_elements": "0.9472", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.15771", "scoring_system": "epss", "scoring_elements": "0.94724", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.15771", "scoring_system": "epss", "scoring_elements": "0.94728", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.15771", "scoring_system": "epss", "scoring_elements": "0.94732", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.15771", "scoring_system": "epss", "scoring_elements": "0.94733", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1662" }, { "reference_url": "https://codereview.chromium.org/1887423002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/1887423002" }, { "reference_url": "https://crbug.com/603732", "reference_id": "", "reference_type": "", "scores": [], "url": "https://crbug.com/603732" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3564", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3564" }, { "reference_url": "http://www.securityfocus.com/bid/89106", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/89106" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331637", "reference_id": "1331637", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331637" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1662", "reference_id": "CVE-2016-1662", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1662" }, { "reference_url": "https://security.gentoo.org/glsa/201605-02", "reference_id": "GLSA-201605-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201605-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0707", "reference_id": "RHSA-2016:0707", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0707" } ], "fixed_packages": [], "aliases": [ "CVE-2016-1662" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5pvd-cdrh-c3gb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48259?format=api", "vulnerability_id": "VCID-9ypx-d4jg-bkcm", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0707.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0707.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1663.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1663.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1663", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80625", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80597", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.806", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80511", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80517", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.8054", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80531", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.8056", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.8057", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80587", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80574", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80566", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01417", "scoring_system": "epss", "scoring_elements": "0.80595", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1663" }, { "reference_url": "https://codereview.chromium.org/1904913002/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/1904913002/" }, { "reference_url": "https://crbug.com/603987", "reference_id": "", "reference_type": "", "scores": [], "url": "https://crbug.com/603987" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3564", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3564" }, { "reference_url": "http://www.securityfocus.com/bid/89106", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/89106" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2960-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2960-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331638", "reference_id": "1331638", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331638" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1663", "reference_id": "CVE-2016-1663", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1663" }, { "reference_url": "https://security.gentoo.org/glsa/201605-02", "reference_id": "GLSA-201605-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201605-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0707", "reference_id": "RHSA-2016:0707", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0707" }, { "reference_url": "https://usn.ubuntu.com/2960-1/", "reference_id": "USN-2960-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2960-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-1663" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9ypx-d4jg-bkcm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48260?format=api", "vulnerability_id": "VCID-k754-me1v-kye1", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0707.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0707.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1664.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1664.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1664", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01056", "scoring_system": "epss", "scoring_elements": "0.77659", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01056", "scoring_system": "epss", "scoring_elements": "0.77633", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01056", "scoring_system": "epss", "scoring_elements": "0.77627", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01056", "scoring_system": "epss", "scoring_elements": "0.77538", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01056", "scoring_system": "epss", "scoring_elements": "0.77544", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01056", "scoring_system": "epss", "scoring_elements": "0.7757", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01056", "scoring_system": "epss", "scoring_elements": "0.77551", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01056", "scoring_system": "epss", "scoring_elements": "0.77581", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01056", "scoring_system": "epss", "scoring_elements": "0.77587", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01056", "scoring_system": "epss", "scoring_elements": "0.77615", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01056", "scoring_system": "epss", "scoring_elements": "0.77599", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01056", "scoring_system": "epss", "scoring_elements": "0.77597", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01056", "scoring_system": "epss", "scoring_elements": "0.77635", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1664" }, { "reference_url": "https://codereview.chromium.org/1848813005/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/1848813005/" }, { "reference_url": "https://crbug.com/597322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://crbug.com/597322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3564", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3564" }, { "reference_url": "http://www.securityfocus.com/bid/89106", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/89106" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331639", "reference_id": "1331639", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331639" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1664", "reference_id": "CVE-2016-1664", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N" }, { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1664" }, { "reference_url": "https://security.gentoo.org/glsa/201605-02", "reference_id": "GLSA-201605-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201605-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0707", "reference_id": "RHSA-2016:0707", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0707" } ], "fixed_packages": [], "aliases": [ "CVE-2016-1664" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k754-me1v-kye1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48256?format=api", "vulnerability_id": "VCID-rksh-5ywn-kqbv", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0707.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0707.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1660.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1660.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1660", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01238", "scoring_system": "epss", "scoring_elements": "0.79282", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01238", "scoring_system": "epss", "scoring_elements": "0.79246", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01238", "scoring_system": "epss", "scoring_elements": "0.79247", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01238", "scoring_system": "epss", "scoring_elements": "0.79178", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01238", "scoring_system": "epss", "scoring_elements": "0.79185", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01238", "scoring_system": "epss", "scoring_elements": "0.79208", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01238", "scoring_system": "epss", "scoring_elements": "0.79194", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01238", "scoring_system": "epss", "scoring_elements": "0.79219", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01238", "scoring_system": "epss", "scoring_elements": "0.79226", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01238", "scoring_system": "epss", "scoring_elements": "0.7925", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01238", "scoring_system": "epss", "scoring_elements": "0.79235", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01238", "scoring_system": "epss", "scoring_elements": "0.79224", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1660" }, { "reference_url": "https://codereview.chromium.org/1672603002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/1672603002" }, { "reference_url": "https://codereview.chromium.org/1677363002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/1677363002" }, { "reference_url": "https://crbug.com/574802", "reference_id": "", "reference_type": "", "scores": [], "url": "https://crbug.com/574802" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3564", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3564" }, { "reference_url": "http://www.securityfocus.com/bid/89106", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/89106" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2960-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2960-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331635", "reference_id": "1331635", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331635" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1660", "reference_id": "CVE-2016-1660", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1660" }, { "reference_url": "https://security.gentoo.org/glsa/201605-02", "reference_id": "GLSA-201605-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201605-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0707", "reference_id": "RHSA-2016:0707", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0707" }, { "reference_url": "https://usn.ubuntu.com/2960-1/", "reference_id": "USN-2960-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2960-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-1660" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rksh-5ywn-kqbv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48257?format=api", "vulnerability_id": "VCID-vax8-arng-hyhr", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0707.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0707.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1661.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1661.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1661", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00995", "scoring_system": "epss", "scoring_elements": "0.77005", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00995", "scoring_system": "epss", "scoring_elements": "0.76979", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00995", "scoring_system": "epss", "scoring_elements": "0.76971", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00995", "scoring_system": "epss", "scoring_elements": "0.76871", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00995", "scoring_system": "epss", "scoring_elements": "0.76877", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00995", "scoring_system": "epss", "scoring_elements": "0.76908", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00995", "scoring_system": "epss", "scoring_elements": "0.7689", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00995", "scoring_system": "epss", "scoring_elements": "0.76922", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00995", "scoring_system": "epss", "scoring_elements": "0.76932", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00995", "scoring_system": "epss", "scoring_elements": "0.7696", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00995", "scoring_system": "epss", "scoring_elements": "0.7694", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00995", "scoring_system": "epss", "scoring_elements": "0.76935", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00995", "scoring_system": "epss", "scoring_elements": "0.76976", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1661" }, { "reference_url": "https://codereview.chromium.org/1887553002/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/1887553002/" }, { "reference_url": "https://crbug.com/601629", "reference_id": "", "reference_type": "", "scores": [], "url": "https://crbug.com/601629" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3564", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3564" }, { "reference_url": "http://www.securityfocus.com/bid/89106", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/89106" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2960-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2960-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331636", "reference_id": "1331636", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331636" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1661", "reference_id": "CVE-2016-1661", "reference_type": "", "scores": [ { "value": "8.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:C" }, { "value": "8.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1661" }, { "reference_url": "https://security.gentoo.org/glsa/201605-02", "reference_id": "GLSA-201605-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201605-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0707", "reference_id": "RHSA-2016:0707", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0707" }, { "reference_url": "https://usn.ubuntu.com/2960-1/", "reference_id": "USN-2960-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2960-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-1661" ], "risk_score": 3.8, "exploitability": "0.5", "weighted_severity": "7.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vax8-arng-hyhr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48262?format=api", "vulnerability_id": "VCID-z9hd-cdnj-mbfm", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0707.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0707.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1666.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1666.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1666", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.73703", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.7367", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.73679", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.73576", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.73585", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.73608", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.73581", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.73617", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.7363", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.73652", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.73635", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00777", "scoring_system": "epss", "scoring_elements": "0.73626", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1666" }, { "reference_url": "https://bugs.chromium.org/p/chromium/issues/detail?id=601001", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.chromium.org/p/chromium/issues/detail?id=601001" }, { "reference_url": "https://bugs.chromium.org/p/chromium/issues/detail?id=605491", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.chromium.org/p/chromium/issues/detail?id=605491" }, { "reference_url": "https://crbug.com/607652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://crbug.com/607652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3564", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3564" }, { "reference_url": "http://www.securityfocus.com/bid/89106", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/89106" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2960-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2960-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331642", "reference_id": "1331642", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331642" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1666", "reference_id": "CVE-2016-1666", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1666" }, { "reference_url": "https://security.gentoo.org/glsa/201605-02", "reference_id": "GLSA-201605-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201605-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0707", "reference_id": "RHSA-2016:0707", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0707" }, { "reference_url": "https://usn.ubuntu.com/2960-1/", "reference_id": "USN-2960-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2960-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-1666" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z9hd-cdnj-mbfm" } ], "fixing_vulnerabilities": [], "risk_score": "4.5", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/chromium-browser@50.0.2661.94-1%3Farch=el6" }