Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/chromium-browser@50.0.2661.75-1?arch=el6
Typerpm
Namespaceredhat
Namechromium-browser
Version50.0.2661.75-1
Qualifiers
arch el6
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-4ypa-zvcs-xuhh
vulnerability_id VCID-4ypa-zvcs-xuhh
summary
Multiple vulnerabilities have been found in the Chromium web
    browser, the worst of which allows remote attackers to execute arbitrary
    code.
references
0
reference_url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0638.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0638.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1659.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1659.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1659
reference_id
reference_type
scores
0
value 0.02455
scoring_system epss
scoring_elements 0.85261
published_at 2026-04-24T12:55:00Z
1
value 0.02455
scoring_system epss
scoring_elements 0.85237
published_at 2026-04-18T12:55:00Z
2
value 0.02455
scoring_system epss
scoring_elements 0.85147
published_at 2026-04-01T12:55:00Z
3
value 0.02455
scoring_system epss
scoring_elements 0.85158
published_at 2026-04-02T12:55:00Z
4
value 0.02455
scoring_system epss
scoring_elements 0.85176
published_at 2026-04-04T12:55:00Z
5
value 0.02455
scoring_system epss
scoring_elements 0.85178
published_at 2026-04-07T12:55:00Z
6
value 0.02455
scoring_system epss
scoring_elements 0.852
published_at 2026-04-08T12:55:00Z
7
value 0.02455
scoring_system epss
scoring_elements 0.85208
published_at 2026-04-09T12:55:00Z
8
value 0.02455
scoring_system epss
scoring_elements 0.85222
published_at 2026-04-11T12:55:00Z
9
value 0.02455
scoring_system epss
scoring_elements 0.85219
published_at 2026-04-12T12:55:00Z
10
value 0.02455
scoring_system epss
scoring_elements 0.85216
published_at 2026-04-13T12:55:00Z
11
value 0.02455
scoring_system epss
scoring_elements 0.85236
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1659
8
reference_url https://crbug.com/602697
reference_id
reference_type
scores
url https://crbug.com/602697
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1651
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1652
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1653
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1654
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1655
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1657
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1657
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1658
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1659
17
reference_url http://www.debian.org/security/2016/dsa-3549
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3549
18
reference_url http://www.ubuntu.com/usn/USN-2955-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2955-1
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1327120
reference_id 1327120
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1327120
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1659
reference_id CVE-2016-1659
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-1659
28
reference_url https://security.gentoo.org/glsa/201605-02
reference_id GLSA-201605-02
reference_type
scores
url https://security.gentoo.org/glsa/201605-02
29
reference_url https://access.redhat.com/errata/RHSA-2016:0638
reference_id RHSA-2016:0638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0638
30
reference_url https://usn.ubuntu.com/2955-1/
reference_id USN-2955-1
reference_type
scores
url https://usn.ubuntu.com/2955-1/
fixed_packages
aliases CVE-2016-1659
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4ypa-zvcs-xuhh
1
url VCID-7k4q-jnya-gyhp
vulnerability_id VCID-7k4q-jnya-gyhp
summary
Multiple vulnerabilities have been found in the Chromium web
    browser, the worst of which allows remote attackers to execute arbitrary
    code.
references
0
reference_url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0638.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0638.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1653.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1653.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1653
reference_id
reference_type
scores
0
value 0.01518
scoring_system epss
scoring_elements 0.81298
published_at 2026-04-24T12:55:00Z
1
value 0.01518
scoring_system epss
scoring_elements 0.81276
published_at 2026-04-21T12:55:00Z
2
value 0.01518
scoring_system epss
scoring_elements 0.81175
published_at 2026-04-01T12:55:00Z
3
value 0.01518
scoring_system epss
scoring_elements 0.81183
published_at 2026-04-02T12:55:00Z
4
value 0.01518
scoring_system epss
scoring_elements 0.81207
published_at 2026-04-07T12:55:00Z
5
value 0.01518
scoring_system epss
scoring_elements 0.81234
published_at 2026-04-08T12:55:00Z
6
value 0.01518
scoring_system epss
scoring_elements 0.8124
published_at 2026-04-09T12:55:00Z
7
value 0.01518
scoring_system epss
scoring_elements 0.8126
published_at 2026-04-11T12:55:00Z
8
value 0.01518
scoring_system epss
scoring_elements 0.81246
published_at 2026-04-12T12:55:00Z
9
value 0.01518
scoring_system epss
scoring_elements 0.81238
published_at 2026-04-13T12:55:00Z
10
value 0.01518
scoring_system epss
scoring_elements 0.81275
published_at 2026-04-16T12:55:00Z
11
value 0.01518
scoring_system epss
scoring_elements 0.81277
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1653
8
reference_url https://codereview.chromium.org/1740123002
reference_id
reference_type
scores
url https://codereview.chromium.org/1740123002
9
reference_url https://crbug.com/589792
reference_id
reference_type
scores
url https://crbug.com/589792
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1651
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1652
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1653
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1654
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1655
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1657
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1657
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1658
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1659
18
reference_url http://www.debian.org/security/2016/dsa-3549
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3549
19
reference_url http://www.ubuntu.com/usn/USN-2955-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2955-1
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1327110
reference_id 1327110
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1327110
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1653
reference_id CVE-2016-1653
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-1653
29
reference_url https://security.gentoo.org/glsa/201605-02
reference_id GLSA-201605-02
reference_type
scores
url https://security.gentoo.org/glsa/201605-02
30
reference_url https://access.redhat.com/errata/RHSA-2016:0638
reference_id RHSA-2016:0638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0638
31
reference_url https://usn.ubuntu.com/2955-1/
reference_id USN-2955-1
reference_type
scores
url https://usn.ubuntu.com/2955-1/
fixed_packages
aliases CVE-2016-1653
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7k4q-jnya-gyhp
2
url VCID-ccvx-hz83-kyaw
vulnerability_id VCID-ccvx-hz83-kyaw
summary
Multiple vulnerabilities have been found in the Chromium web
    browser, the worst of which allows remote attackers to execute arbitrary
    code.
references
0
reference_url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0638.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0638.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1654.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1654.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1654
reference_id
reference_type
scores
0
value 0.0249
scoring_system epss
scoring_elements 0.85357
published_at 2026-04-24T12:55:00Z
1
value 0.0249
scoring_system epss
scoring_elements 0.85334
published_at 2026-04-21T12:55:00Z
2
value 0.0249
scoring_system epss
scoring_elements 0.85243
published_at 2026-04-01T12:55:00Z
3
value 0.0249
scoring_system epss
scoring_elements 0.85255
published_at 2026-04-02T12:55:00Z
4
value 0.0249
scoring_system epss
scoring_elements 0.85274
published_at 2026-04-04T12:55:00Z
5
value 0.0249
scoring_system epss
scoring_elements 0.85276
published_at 2026-04-07T12:55:00Z
6
value 0.0249
scoring_system epss
scoring_elements 0.85298
published_at 2026-04-08T12:55:00Z
7
value 0.0249
scoring_system epss
scoring_elements 0.85306
published_at 2026-04-09T12:55:00Z
8
value 0.0249
scoring_system epss
scoring_elements 0.85321
published_at 2026-04-11T12:55:00Z
9
value 0.0249
scoring_system epss
scoring_elements 0.85319
published_at 2026-04-12T12:55:00Z
10
value 0.0249
scoring_system epss
scoring_elements 0.85316
published_at 2026-04-13T12:55:00Z
11
value 0.0249
scoring_system epss
scoring_elements 0.85336
published_at 2026-04-16T12:55:00Z
12
value 0.0249
scoring_system epss
scoring_elements 0.85337
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1654
8
reference_url https://crbug.com/589512
reference_id
reference_type
scores
url https://crbug.com/589512
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1651
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1652
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1653
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1654
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1655
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1657
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1657
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1658
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1659
17
reference_url http://www.debian.org/security/2016/dsa-3549
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3549
18
reference_url http://www.ubuntu.com/usn/USN-2955-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2955-1
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1327112
reference_id 1327112
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1327112
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1654
reference_id CVE-2016-1654
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-1654
28
reference_url https://security.gentoo.org/glsa/201605-02
reference_id GLSA-201605-02
reference_type
scores
url https://security.gentoo.org/glsa/201605-02
29
reference_url https://access.redhat.com/errata/RHSA-2016:0638
reference_id RHSA-2016:0638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0638
30
reference_url https://usn.ubuntu.com/2955-1/
reference_id USN-2955-1
reference_type
scores
url https://usn.ubuntu.com/2955-1/
fixed_packages
aliases CVE-2016-1654
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ccvx-hz83-kyaw
3
url VCID-dt8r-g6xf-3uhj
vulnerability_id VCID-dt8r-g6xf-3uhj
summary
Multiple vulnerabilities have been found in the Chromium web
    browser, the worst of which allows remote attackers to execute arbitrary
    code.
references
0
reference_url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0638.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0638.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1652.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1652.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1652
reference_id
reference_type
scores
0
value 0.00411
scoring_system epss
scoring_elements 0.61396
published_at 2026-04-21T12:55:00Z
1
value 0.00411
scoring_system epss
scoring_elements 0.61414
published_at 2026-04-18T12:55:00Z
2
value 0.00411
scoring_system epss
scoring_elements 0.61245
published_at 2026-04-01T12:55:00Z
3
value 0.00411
scoring_system epss
scoring_elements 0.61324
published_at 2026-04-02T12:55:00Z
4
value 0.00411
scoring_system epss
scoring_elements 0.61354
published_at 2026-04-04T12:55:00Z
5
value 0.00411
scoring_system epss
scoring_elements 0.61323
published_at 2026-04-07T12:55:00Z
6
value 0.00411
scoring_system epss
scoring_elements 0.6137
published_at 2026-04-08T12:55:00Z
7
value 0.00411
scoring_system epss
scoring_elements 0.61385
published_at 2026-04-24T12:55:00Z
8
value 0.00411
scoring_system epss
scoring_elements 0.61406
published_at 2026-04-11T12:55:00Z
9
value 0.00411
scoring_system epss
scoring_elements 0.61391
published_at 2026-04-12T12:55:00Z
10
value 0.00411
scoring_system epss
scoring_elements 0.61372
published_at 2026-04-13T12:55:00Z
11
value 0.00411
scoring_system epss
scoring_elements 0.6141
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1652
8
reference_url https://codereview.chromium.org/1748943002/
reference_id
reference_type
scores
url https://codereview.chromium.org/1748943002/
9
reference_url https://crbug.com/590275
reference_id
reference_type
scores
url https://crbug.com/590275
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1651
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1652
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1653
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1654
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1655
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1657
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1657
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1658
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1659
18
reference_url http://www.debian.org/security/2016/dsa-3549
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3549
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1327109
reference_id 1327109
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1327109
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1652
reference_id CVE-2016-1652
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-1652
25
reference_url https://security.gentoo.org/glsa/201605-02
reference_id GLSA-201605-02
reference_type
scores
url https://security.gentoo.org/glsa/201605-02
26
reference_url https://access.redhat.com/errata/RHSA-2016:0638
reference_id RHSA-2016:0638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0638
fixed_packages
aliases CVE-2016-1652
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dt8r-g6xf-3uhj
4
url VCID-k9aj-xsjv-bbfk
vulnerability_id VCID-k9aj-xsjv-bbfk
summary
Multiple vulnerabilities have been found in the Chromium web
    browser, the worst of which allows remote attackers to execute arbitrary
    code.
references
0
reference_url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0638.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0638.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1655.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1655.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1655
reference_id
reference_type
scores
0
value 0.03027
scoring_system epss
scoring_elements 0.86678
published_at 2026-04-24T12:55:00Z
1
value 0.03027
scoring_system epss
scoring_elements 0.86666
published_at 2026-04-18T12:55:00Z
2
value 0.03027
scoring_system epss
scoring_elements 0.86585
published_at 2026-04-01T12:55:00Z
3
value 0.03027
scoring_system epss
scoring_elements 0.86595
published_at 2026-04-02T12:55:00Z
4
value 0.03027
scoring_system epss
scoring_elements 0.86614
published_at 2026-04-07T12:55:00Z
5
value 0.03027
scoring_system epss
scoring_elements 0.86634
published_at 2026-04-08T12:55:00Z
6
value 0.03027
scoring_system epss
scoring_elements 0.86643
published_at 2026-04-09T12:55:00Z
7
value 0.03027
scoring_system epss
scoring_elements 0.86657
published_at 2026-04-11T12:55:00Z
8
value 0.03027
scoring_system epss
scoring_elements 0.86654
published_at 2026-04-12T12:55:00Z
9
value 0.03027
scoring_system epss
scoring_elements 0.86647
published_at 2026-04-13T12:55:00Z
10
value 0.03027
scoring_system epss
scoring_elements 0.8666
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1655
8
reference_url https://codereview.chromium.org/1642283002
reference_id
reference_type
scores
url https://codereview.chromium.org/1642283002
9
reference_url https://crbug.com/582008
reference_id
reference_type
scores
url https://crbug.com/582008
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1651
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1652
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1653
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1654
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1655
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1657
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1657
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1658
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1659
18
reference_url http://www.debian.org/security/2016/dsa-3549
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3549
19
reference_url http://www.ubuntu.com/usn/USN-2955-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2955-1
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1327113
reference_id 1327113
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1327113
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1655
reference_id CVE-2016-1655
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-1655
29
reference_url https://security.gentoo.org/glsa/201605-02
reference_id GLSA-201605-02
reference_type
scores
url https://security.gentoo.org/glsa/201605-02
30
reference_url https://access.redhat.com/errata/RHSA-2016:0638
reference_id RHSA-2016:0638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0638
31
reference_url https://usn.ubuntu.com/2955-1/
reference_id USN-2955-1
reference_type
scores
url https://usn.ubuntu.com/2955-1/
fixed_packages
aliases CVE-2016-1655
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k9aj-xsjv-bbfk
5
url VCID-mz2v-rfmy-6uhp
vulnerability_id VCID-mz2v-rfmy-6uhp
summary
Multiple vulnerabilities have been found in the Chromium web
    browser, the worst of which allows remote attackers to execute arbitrary
    code.
references
0
reference_url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0638.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0638.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1657.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1657.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1657
reference_id
reference_type
scores
0
value 0.02176
scoring_system epss
scoring_elements 0.84387
published_at 2026-04-24T12:55:00Z
1
value 0.02176
scoring_system epss
scoring_elements 0.8436
published_at 2026-04-21T12:55:00Z
2
value 0.02176
scoring_system epss
scoring_elements 0.84268
published_at 2026-04-01T12:55:00Z
3
value 0.02176
scoring_system epss
scoring_elements 0.8428
published_at 2026-04-02T12:55:00Z
4
value 0.02176
scoring_system epss
scoring_elements 0.84299
published_at 2026-04-04T12:55:00Z
5
value 0.02176
scoring_system epss
scoring_elements 0.84301
published_at 2026-04-07T12:55:00Z
6
value 0.02176
scoring_system epss
scoring_elements 0.84322
published_at 2026-04-08T12:55:00Z
7
value 0.02176
scoring_system epss
scoring_elements 0.84328
published_at 2026-04-09T12:55:00Z
8
value 0.02176
scoring_system epss
scoring_elements 0.84346
published_at 2026-04-11T12:55:00Z
9
value 0.02176
scoring_system epss
scoring_elements 0.84338
published_at 2026-04-12T12:55:00Z
10
value 0.02176
scoring_system epss
scoring_elements 0.84335
published_at 2026-04-13T12:55:00Z
11
value 0.02176
scoring_system epss
scoring_elements 0.84357
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1657
8
reference_url https://codereview.chromium.org/1678233003/
reference_id
reference_type
scores
url https://codereview.chromium.org/1678233003/
9
reference_url https://crbug.com/567445
reference_id
reference_type
scores
url https://crbug.com/567445
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1651
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1652
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1653
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1654
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1655
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1657
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1657
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1658
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1659
18
reference_url http://www.debian.org/security/2016/dsa-3549
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3549
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1327115
reference_id 1327115
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1327115
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_package_hub_for_suse_linux_enterprise:12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:novell:suse_package_hub_for_suse_linux_enterprise:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_package_hub_for_suse_linux_enterprise:12:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1657
reference_id CVE-2016-1657
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-1657
25
reference_url https://security.gentoo.org/glsa/201605-02
reference_id GLSA-201605-02
reference_type
scores
url https://security.gentoo.org/glsa/201605-02
26
reference_url https://access.redhat.com/errata/RHSA-2016:0638
reference_id RHSA-2016:0638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0638
fixed_packages
aliases CVE-2016-1657
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mz2v-rfmy-6uhp
6
url VCID-qu3h-aycb-2qb1
vulnerability_id VCID-qu3h-aycb-2qb1
summary
Multiple vulnerabilities have been found in the Chromium web
    browser, the worst of which allows remote attackers to execute arbitrary
    code.
references
0
reference_url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0638.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0638.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1658.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1658.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1658
reference_id
reference_type
scores
0
value 0.00882
scoring_system epss
scoring_elements 0.75458
published_at 2026-04-24T12:55:00Z
1
value 0.00882
scoring_system epss
scoring_elements 0.75423
published_at 2026-04-21T12:55:00Z
2
value 0.00882
scoring_system epss
scoring_elements 0.75331
published_at 2026-04-01T12:55:00Z
3
value 0.00882
scoring_system epss
scoring_elements 0.75334
published_at 2026-04-02T12:55:00Z
4
value 0.00882
scoring_system epss
scoring_elements 0.75367
published_at 2026-04-04T12:55:00Z
5
value 0.00882
scoring_system epss
scoring_elements 0.75346
published_at 2026-04-07T12:55:00Z
6
value 0.00882
scoring_system epss
scoring_elements 0.7539
published_at 2026-04-08T12:55:00Z
7
value 0.00882
scoring_system epss
scoring_elements 0.75399
published_at 2026-04-09T12:55:00Z
8
value 0.00882
scoring_system epss
scoring_elements 0.75419
published_at 2026-04-11T12:55:00Z
9
value 0.00882
scoring_system epss
scoring_elements 0.75398
published_at 2026-04-12T12:55:00Z
10
value 0.00882
scoring_system epss
scoring_elements 0.75386
published_at 2026-04-13T12:55:00Z
11
value 0.00882
scoring_system epss
scoring_elements 0.75428
published_at 2026-04-16T12:55:00Z
12
value 0.00882
scoring_system epss
scoring_elements 0.75434
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1658
8
reference_url https://codereview.chromium.org/1658913002
reference_id
reference_type
scores
url https://codereview.chromium.org/1658913002
9
reference_url https://crbug.com/573317
reference_id
reference_type
scores
url https://crbug.com/573317
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1651
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1652
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1653
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1654
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1655
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1657
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1657
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1658
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1659
18
reference_url http://www.debian.org/security/2016/dsa-3549
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3549
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1327117
reference_id 1327117
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1327117
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_package_hub_for_suse_linux_enterprise:12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:novell:suse_package_hub_for_suse_linux_enterprise:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_package_hub_for_suse_linux_enterprise:12:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1658
reference_id CVE-2016-1658
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-1658
25
reference_url https://security.gentoo.org/glsa/201605-02
reference_id GLSA-201605-02
reference_type
scores
url https://security.gentoo.org/glsa/201605-02
26
reference_url https://access.redhat.com/errata/RHSA-2016:0638
reference_id RHSA-2016:0638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0638
fixed_packages
aliases CVE-2016-1658
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qu3h-aycb-2qb1
7
url VCID-tbp1-4ah8-nqft
vulnerability_id VCID-tbp1-4ah8-nqft
summary
Multiple vulnerabilities have been found in the Chromium web
    browser, the worst of which allows remote attackers to execute arbitrary
    code.
references
0
reference_url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0638.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0638.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1656.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1656.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1656
reference_id
reference_type
scores
0
value 0.00404
scoring_system epss
scoring_elements 0.61002
published_at 2026-04-24T12:55:00Z
1
value 0.00404
scoring_system epss
scoring_elements 0.61012
published_at 2026-04-21T12:55:00Z
2
value 0.00404
scoring_system epss
scoring_elements 0.6086
published_at 2026-04-01T12:55:00Z
3
value 0.00404
scoring_system epss
scoring_elements 0.60932
published_at 2026-04-02T12:55:00Z
4
value 0.00404
scoring_system epss
scoring_elements 0.60961
published_at 2026-04-04T12:55:00Z
5
value 0.00404
scoring_system epss
scoring_elements 0.60927
published_at 2026-04-07T12:55:00Z
6
value 0.00404
scoring_system epss
scoring_elements 0.60976
published_at 2026-04-08T12:55:00Z
7
value 0.00404
scoring_system epss
scoring_elements 0.60992
published_at 2026-04-09T12:55:00Z
8
value 0.00404
scoring_system epss
scoring_elements 0.61013
published_at 2026-04-11T12:55:00Z
9
value 0.00404
scoring_system epss
scoring_elements 0.60999
published_at 2026-04-12T12:55:00Z
10
value 0.00404
scoring_system epss
scoring_elements 0.60979
published_at 2026-04-13T12:55:00Z
11
value 0.00404
scoring_system epss
scoring_elements 0.61021
published_at 2026-04-16T12:55:00Z
12
value 0.00404
scoring_system epss
scoring_elements 0.61027
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1656
8
reference_url https://crbug.com/570750
reference_id
reference_type
scores
url https://crbug.com/570750
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1327114
reference_id 1327114
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1327114
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1656
reference_id CVE-2016-1656
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-1656
15
reference_url https://security.gentoo.org/glsa/201605-02
reference_id GLSA-201605-02
reference_type
scores
url https://security.gentoo.org/glsa/201605-02
16
reference_url https://access.redhat.com/errata/RHSA-2016:0638
reference_id RHSA-2016:0638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0638
fixed_packages
aliases CVE-2016-1656
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tbp1-4ah8-nqft
8
url VCID-uw67-r9p5-j7bj
vulnerability_id VCID-uw67-r9p5-j7bj
summary
Multiple vulnerabilities have been found in the Chromium web
    browser, the worst of which allows remote attackers to execute arbitrary
    code.
references
0
reference_url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0638.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0638.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1651.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1651.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1651
reference_id
reference_type
scores
0
value 0.01385
scoring_system epss
scoring_elements 0.8038
published_at 2026-04-24T12:55:00Z
1
value 0.01385
scoring_system epss
scoring_elements 0.80354
published_at 2026-04-21T12:55:00Z
2
value 0.01385
scoring_system epss
scoring_elements 0.80265
published_at 2026-04-01T12:55:00Z
3
value 0.01385
scoring_system epss
scoring_elements 0.80272
published_at 2026-04-02T12:55:00Z
4
value 0.01385
scoring_system epss
scoring_elements 0.80293
published_at 2026-04-04T12:55:00Z
5
value 0.01385
scoring_system epss
scoring_elements 0.80281
published_at 2026-04-07T12:55:00Z
6
value 0.01385
scoring_system epss
scoring_elements 0.80309
published_at 2026-04-08T12:55:00Z
7
value 0.01385
scoring_system epss
scoring_elements 0.80319
published_at 2026-04-09T12:55:00Z
8
value 0.01385
scoring_system epss
scoring_elements 0.80338
published_at 2026-04-11T12:55:00Z
9
value 0.01385
scoring_system epss
scoring_elements 0.80324
published_at 2026-04-12T12:55:00Z
10
value 0.01385
scoring_system epss
scoring_elements 0.80317
published_at 2026-04-13T12:55:00Z
11
value 0.01385
scoring_system epss
scoring_elements 0.80347
published_at 2026-04-16T12:55:00Z
12
value 0.01385
scoring_system epss
scoring_elements 0.80349
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1651
8
reference_url https://codereview.chromium.org/1837383011
reference_id
reference_type
scores
url https://codereview.chromium.org/1837383011
9
reference_url https://crbug.com/591785
reference_id
reference_type
scores
url https://crbug.com/591785
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1651
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1652
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1653
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1654
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1655
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1657
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1657
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1658
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1659
18
reference_url http://www.debian.org/security/2016/dsa-3549
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3549
19
reference_url http://zerodayinitiative.com/advisories/ZDI-16-243/
reference_id
reference_type
scores
url http://zerodayinitiative.com/advisories/ZDI-16-243/
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1327111
reference_id 1327111
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1327111
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1651
reference_id CVE-2016-1651
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:P
1
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-1651
26
reference_url https://security.gentoo.org/glsa/201605-02
reference_id GLSA-201605-02
reference_type
scores
url https://security.gentoo.org/glsa/201605-02
27
reference_url https://access.redhat.com/errata/RHSA-2016:0638
reference_id RHSA-2016:0638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0638
fixed_packages
aliases CVE-2016-1651
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uw67-r9p5-j7bj
Fixing_vulnerabilities
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/chromium-browser@50.0.2661.75-1%3Farch=el6