Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/116171?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/116171?format=api", "purl": "pkg:rpm/redhat/chromium-browser@48.0.2564.109-1?arch=el6", "type": "rpm", "namespace": "redhat", "name": "chromium-browser", "version": "48.0.2564.109-1", "qualifiers": { "arch": "el6" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62145?format=api", "vulnerability_id": "VCID-5k7n-7c84-gkfx", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_9.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_9.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00104.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00104.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00119.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00119.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0241.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0241.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1624.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1624.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1624", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01418", "scoring_system": "epss", "scoring_elements": "0.80651", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01418", "scoring_system": "epss", "scoring_elements": "0.80633", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01418", "scoring_system": "epss", "scoring_elements": "0.80636", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01418", "scoring_system": "epss", "scoring_elements": "0.80519", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01418", "scoring_system": "epss", "scoring_elements": "0.80525", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01418", "scoring_system": "epss", "scoring_elements": "0.80547", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01418", "scoring_system": "epss", "scoring_elements": "0.80539", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01418", "scoring_system": "epss", "scoring_elements": "0.80568", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01418", "scoring_system": "epss", "scoring_elements": "0.80578", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01418", "scoring_system": "epss", "scoring_elements": "0.80595", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01418", "scoring_system": "epss", "scoring_elements": "0.80581", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01418", "scoring_system": "epss", "scoring_elements": "0.80574", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01418", "scoring_system": "epss", "scoring_elements": "0.80602", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01418", "scoring_system": "epss", "scoring_elements": "0.80604", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01418", "scoring_system": "epss", "scoring_elements": "0.80608", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1624" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=583607", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=583607" }, { "reference_url": "https://codereview.chromium.org/1662313002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/1662313002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1625", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1625" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1627", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1627" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1629", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1629" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3486", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3486" }, { "reference_url": "http://www.securityfocus.com/bid/83125", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/83125" }, { "reference_url": "http://www.securitytracker.com/id/1035183", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035183" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2895-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2895-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1306154", "reference_id": "1306154", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1306154" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=817233", "reference_id": "817233", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=817233" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1624", "reference_id": "CVE-2016-1624", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1624" }, { "reference_url": "https://security.gentoo.org/glsa/201603-09", "reference_id": "GLSA-201603-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0241", "reference_id": "RHSA-2016:0241", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0241" }, { "reference_url": "https://usn.ubuntu.com/2895-1/", "reference_id": "USN-2895-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2895-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-1624" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5k7n-7c84-gkfx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62143?format=api", "vulnerability_id": "VCID-9p6d-rw2j-n7h5", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_9.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_9.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00104.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00104.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00119.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00119.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0241.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0241.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1622.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1622.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1622", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01496", "scoring_system": "epss", "scoring_elements": "0.81183", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01496", "scoring_system": "epss", "scoring_elements": "0.81177", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01496", "scoring_system": "epss", "scoring_elements": "0.81045", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01496", "scoring_system": "epss", "scoring_elements": "0.81054", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01496", "scoring_system": "epss", "scoring_elements": "0.81078", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01496", "scoring_system": "epss", "scoring_elements": "0.81106", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01496", "scoring_system": "epss", "scoring_elements": "0.81113", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01496", "scoring_system": "epss", "scoring_elements": "0.8113", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01496", "scoring_system": "epss", "scoring_elements": "0.81116", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01496", "scoring_system": "epss", "scoring_elements": "0.8111", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01496", "scoring_system": "epss", "scoring_elements": "0.81147", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01496", "scoring_system": "epss", "scoring_elements": "0.81149", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01496", "scoring_system": "epss", "scoring_elements": "0.81146", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01496", "scoring_system": "epss", "scoring_elements": "0.81169", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1622" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=546677", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=546677" }, { "reference_url": "https://codereview.chromium.org/1417513003", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/1417513003" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1625", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1625" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1627", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1627" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1629", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1629" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3486", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3486" }, { "reference_url": "http://www.securityfocus.com/bid/83125", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/83125" }, { "reference_url": "http://www.securitytracker.com/id/1035183", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035183" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1306152", "reference_id": "1306152", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1306152" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1622", "reference_id": "CVE-2016-1622", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1622" }, { "reference_url": "https://security.gentoo.org/glsa/201603-09", "reference_id": "GLSA-201603-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0241", "reference_id": "RHSA-2016:0241", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0241" } ], "fixed_packages": [], "aliases": [ "CVE-2016-1622" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9p6d-rw2j-n7h5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62146?format=api", "vulnerability_id": "VCID-dbx9-zfat-43ca", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_9.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_9.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00104.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00104.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00119.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00119.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0241.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0241.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1625.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1625.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1625", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70582", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70573", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70428", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70442", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70459", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70437", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70482", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70498", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70521", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70506", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70492", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70535", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70543", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70522", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1625" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=509313", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=509313" }, { "reference_url": "https://codereview.chromium.org/1669723002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/1669723002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1625", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1625" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1627", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1627" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1629", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1629" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3486", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3486" }, { "reference_url": "http://www.securityfocus.com/bid/83125", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/83125" }, { "reference_url": "http://www.securitytracker.com/id/1035183", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035183" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1306155", "reference_id": "1306155", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1306155" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1625", "reference_id": "CVE-2016-1625", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" }, { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1625" }, { "reference_url": "https://security.gentoo.org/glsa/201603-09", "reference_id": "GLSA-201603-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0241", "reference_id": "RHSA-2016:0241", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0241" } ], "fixed_packages": [], "aliases": [ "CVE-2016-1625" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dbx9-zfat-43ca" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60046?format=api", "vulnerability_id": "VCID-e76r-pz11-yfhu", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which may allow remote attackers to execute arbitrary code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_9.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_9.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00104.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00104.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00119.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00119.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0241.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0241.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1626.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1626.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1626", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70577", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70568", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70423", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70436", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70454", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70432", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70477", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70492", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70516", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70501", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70487", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.7053", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70538", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70517", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1626" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=571480", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=571480" }, { "reference_url": "https://codereview.chromium.org/1583233008", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/1583233008" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1625", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1625" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1627", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1627" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1629", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1629" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3486", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3486" }, { "reference_url": "http://www.securityfocus.com/bid/83125", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/83125" }, { "reference_url": "http://www.securitytracker.com/id/1035183", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035183" }, { "reference_url": "http://www.zerodayinitiative.com/advisories/ZDI-16-171", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.zerodayinitiative.com/advisories/ZDI-16-171" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1306156", "reference_id": "1306156", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1306156" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:48.0.2564.103:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:48.0.2564.103:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:48.0.2564.103:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1626", "reference_id": "CVE-2016-1626", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" }, { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1626" }, { "reference_url": "https://security.gentoo.org/glsa/201603-09", "reference_id": "GLSA-201603-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-09" }, { "reference_url": "https://security.gentoo.org/glsa/201710-26", "reference_id": "GLSA-201710-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201710-26" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0241", "reference_id": "RHSA-2016:0241", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0241" } ], "fixed_packages": [], "aliases": [ "CVE-2016-1626" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e76r-pz11-yfhu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60047?format=api", "vulnerability_id": "VCID-jqup-3gmb-mqbh", "summary": "Multiple vulnerabilities have been found in OpenJPEG, the worst of\n which may allow remote attackers to execute arbitrary code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_9.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_9.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0241.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0241.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1628.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1628.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1628", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.7586", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75849", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75715", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75718", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75749", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75727", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75761", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75773", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75797", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75778", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75772", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.7581", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75814", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75799", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00908", "scoring_system": "epss", "scoring_elements": "0.75839", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1628" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=571479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=571479" }, { "reference_url": "https://codereview.chromium.org/1590593002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/1590593002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1625", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1625" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1627", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1627" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1629", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1629" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3486", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3486" }, { "reference_url": "http://www.debian.org/security/2017/dsa-4013", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2017/dsa-4013" }, { "reference_url": "http://www.securityfocus.com/bid/83125", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/83125" }, { "reference_url": "http://www.securitytracker.com/id/1035183", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035183" }, { "reference_url": "http://www.zerodayinitiative.com/advisories/ZDI-16-172/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.zerodayinitiative.com/advisories/ZDI-16-172/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1310577", "reference_id": "1310577", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1310577" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1628", "reference_id": "CVE-2016-1628", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1628" }, { "reference_url": "https://security.gentoo.org/glsa/201603-09", "reference_id": "GLSA-201603-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-09" }, { "reference_url": "https://security.gentoo.org/glsa/201710-26", "reference_id": "GLSA-201710-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201710-26" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0241", "reference_id": "RHSA-2016:0241", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0241" } ], "fixed_packages": [], "aliases": [ "CVE-2016-1628" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jqup-3gmb-mqbh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62144?format=api", "vulnerability_id": "VCID-kmf6-62y1-gke1", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_9.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_9.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00104.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00104.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00119.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00119.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0241.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0241.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1623.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1623.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1623", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0153", "scoring_system": "epss", "scoring_elements": "0.8138", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0153", "scoring_system": "epss", "scoring_elements": "0.81375", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0153", "scoring_system": "epss", "scoring_elements": "0.81243", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0153", "scoring_system": "epss", "scoring_elements": "0.81252", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0153", "scoring_system": "epss", "scoring_elements": "0.81275", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0153", "scoring_system": "epss", "scoring_elements": "0.81274", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0153", "scoring_system": "epss", "scoring_elements": "0.81302", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0153", "scoring_system": "epss", "scoring_elements": "0.81307", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0153", "scoring_system": "epss", "scoring_elements": "0.81328", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0153", "scoring_system": "epss", "scoring_elements": "0.81314", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0153", "scoring_system": "epss", "scoring_elements": "0.81344", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0153", "scoring_system": "epss", "scoring_elements": "0.81346", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0153", "scoring_system": "epss", "scoring_elements": "0.81368", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1623" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=577105", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=577105" }, { "reference_url": "https://codereview.chromium.org/1659013003", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/1659013003" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1625", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1625" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1627", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1627" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1629", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1629" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3486", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3486" }, { "reference_url": "http://www.securityfocus.com/bid/83125", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/83125" }, { "reference_url": "http://www.securitytracker.com/id/1035183", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035183" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2895-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2895-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1306153", "reference_id": "1306153", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1306153" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1623", "reference_id": "CVE-2016-1623", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1623" }, { "reference_url": "https://security.gentoo.org/glsa/201603-09", "reference_id": "GLSA-201603-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0241", "reference_id": "RHSA-2016:0241", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0241" }, { "reference_url": "https://usn.ubuntu.com/2895-1/", "reference_id": "USN-2895-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2895-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-1623" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kmf6-62y1-gke1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62147?format=api", "vulnerability_id": "VCID-kn3r-wudh-h7hc", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_9.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_9.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00104.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00104.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00119.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00119.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0241.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0241.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1627.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1627.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1627", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01244", "scoring_system": "epss", "scoring_elements": "0.79358", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01244", "scoring_system": "epss", "scoring_elements": "0.7934", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01244", "scoring_system": "epss", "scoring_elements": "0.7923", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01244", "scoring_system": "epss", "scoring_elements": "0.79237", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01244", "scoring_system": "epss", "scoring_elements": "0.7926", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01244", "scoring_system": "epss", "scoring_elements": "0.79245", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01244", "scoring_system": "epss", "scoring_elements": "0.79271", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01244", "scoring_system": "epss", "scoring_elements": "0.79278", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01244", "scoring_system": "epss", "scoring_elements": "0.79302", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01244", "scoring_system": "epss", "scoring_elements": "0.79287", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01244", "scoring_system": "epss", "scoring_elements": "0.79276", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01244", "scoring_system": "epss", "scoring_elements": "0.79303", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01244", "scoring_system": "epss", "scoring_elements": "0.79299", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01244", "scoring_system": "epss", "scoring_elements": "0.79301", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01244", "scoring_system": "epss", "scoring_elements": "0.79335", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1627" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=571121", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=571121" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=585517", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=585517" }, { "reference_url": "https://codereview.chromium.org/1586903002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/1586903002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1625", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1625" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1627", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1627" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1629", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1629" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3486", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3486" }, { "reference_url": "http://www.securityfocus.com/bid/83125", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/83125" }, { "reference_url": "http://www.securitytracker.com/id/1035183", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035183" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1306157", "reference_id": "1306157", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1306157" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1627", "reference_id": "CVE-2016-1627", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1627" }, { "reference_url": "https://security.gentoo.org/glsa/201603-09", "reference_id": "GLSA-201603-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0241", "reference_id": "RHSA-2016:0241", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0241" } ], "fixed_packages": [], "aliases": [ "CVE-2016-1627" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kn3r-wudh-h7hc" } ], "fixing_vulnerabilities": [], "risk_score": "4.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/chromium-browser@48.0.2564.109-1%3Farch=el6" }