Lookup for vulnerable packages by Package URL.

GET /api/packages/371551?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/371551?format=api",
    "purl": "pkg:alpm/archlinux/chromium@58.0.3029.110-1",
    "type": "alpm",
    "namespace": "archlinux",
    "name": "chromium",
    "version": "58.0.3029.110-1",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": "59.0.3071.104-1",
    "latest_non_vulnerable_version": "102.0.5005.61-1",
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56225?format=api",
            "vulnerability_id": "VCID-1r7m-ska1-bfaa",
            "summary": "Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5080.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5080.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5080",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00911",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75766",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00911",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75909",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00911",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7585",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00911",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75888",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00911",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75897",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00911",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75769",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00911",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75802",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00911",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75781",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00911",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75813",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00911",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75825",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00911",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75849",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00911",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7583",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00911",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75824",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00911",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75861",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00911",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75865",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5080"
                },
                {
                    "reference_url": "https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html"
                },
                {
                    "reference_url": "https://crbug.com/708819",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://crbug.com/708819"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/98861",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/98861"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1038622"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459033",
                    "reference_id": "1459033",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459033"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201706-8",
                    "reference_id": "ASA-201706-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201706-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-289",
                    "reference_id": "AVG-289",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-289"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5080",
                    "reference_id": "CVE-2017-5080",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5080"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201706-20",
                    "reference_id": "GLSA-201706-20",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201706-20"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1399",
                    "reference_id": "RHSA-2017:1399",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1399"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371552?format=api",
                    "purl": "pkg:alpm/archlinux/chromium@59.0.3071.86-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hsuj-ffh4-33f3"
                        },
                        {
                            "vulnerability": "VCID-qn3a-kdx8-n3hm"
                        },
                        {
                            "vulnerability": "VCID-usgw-gqnq-dfb3"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@59.0.3071.86-1"
                }
            ],
            "aliases": [
                "CVE-2017-5080"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1r7m-ska1-bfaa"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56219?format=api",
            "vulnerability_id": "VCID-52ha-efrd-bkbu",
            "summary": "Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5074.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5074.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5074",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62086",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62256",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62236",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62246",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62263",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62147",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62178",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62146",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62196",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62214",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62231",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62221",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.622",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62245",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62252",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5074"
                },
                {
                    "reference_url": "https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html"
                },
                {
                    "reference_url": "https://crbug.com/700040",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://crbug.com/700040"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/98861",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/98861"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1038622"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459025",
                    "reference_id": "1459025",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459025"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201706-8",
                    "reference_id": "ASA-201706-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201706-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-289",
                    "reference_id": "AVG-289",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-289"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5074",
                    "reference_id": "CVE-2017-5074",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:A/AC:M/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "8.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5074"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201706-20",
                    "reference_id": "GLSA-201706-20",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201706-20"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1399",
                    "reference_id": "RHSA-2017:1399",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1399"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371552?format=api",
                    "purl": "pkg:alpm/archlinux/chromium@59.0.3071.86-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hsuj-ffh4-33f3"
                        },
                        {
                            "vulnerability": "VCID-qn3a-kdx8-n3hm"
                        },
                        {
                            "vulnerability": "VCID-usgw-gqnq-dfb3"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@59.0.3071.86-1"
                }
            ],
            "aliases": [
                "CVE-2017-5074"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-52ha-efrd-bkbu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56222?format=api",
            "vulnerability_id": "VCID-5xy6-dfr2-f3gq",
            "summary": "Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5077.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5077.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5077",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74955",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75077",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75031",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75069",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75074",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74958",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74987",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74962",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74996",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75008",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7503",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75009",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74998",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75034",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75042",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5077"
                },
                {
                    "reference_url": "https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html"
                },
                {
                    "reference_url": "https://crbug.com/716311",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://crbug.com/716311"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/98861",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/98861"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1038622"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459030",
                    "reference_id": "1459030",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459030"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201706-8",
                    "reference_id": "ASA-201706-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201706-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-289",
                    "reference_id": "AVG-289",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-289"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5077",
                    "reference_id": "CVE-2017-5077",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5077"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201706-20",
                    "reference_id": "GLSA-201706-20",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201706-20"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1399",
                    "reference_id": "RHSA-2017:1399",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1399"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371552?format=api",
                    "purl": "pkg:alpm/archlinux/chromium@59.0.3071.86-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hsuj-ffh4-33f3"
                        },
                        {
                            "vulnerability": "VCID-qn3a-kdx8-n3hm"
                        },
                        {
                            "vulnerability": "VCID-usgw-gqnq-dfb3"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@59.0.3071.86-1"
                }
            ],
            "aliases": [
                "CVE-2017-5077"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5xy6-dfr2-f3gq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56221?format=api",
            "vulnerability_id": "VCID-7add-jzbk-cba6",
            "summary": "Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5076.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5076.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5076",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71215",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71357",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71294",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71347",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71353",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71224",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71242",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71216",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71258",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71273",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71295",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7128",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71264",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7131",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71316",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5076"
                },
                {
                    "reference_url": "https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html"
                },
                {
                    "reference_url": "https://crbug.com/719199",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://crbug.com/719199"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/98861",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/98861"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1038622"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459029",
                    "reference_id": "1459029",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459029"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201706-8",
                    "reference_id": "ASA-201706-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201706-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-289",
                    "reference_id": "AVG-289",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-289"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5076",
                    "reference_id": "CVE-2017-5076",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5076"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201706-20",
                    "reference_id": "GLSA-201706-20",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201706-20"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1399",
                    "reference_id": "RHSA-2017:1399",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1399"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371552?format=api",
                    "purl": "pkg:alpm/archlinux/chromium@59.0.3071.86-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hsuj-ffh4-33f3"
                        },
                        {
                            "vulnerability": "VCID-qn3a-kdx8-n3hm"
                        },
                        {
                            "vulnerability": "VCID-usgw-gqnq-dfb3"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@59.0.3071.86-1"
                }
            ],
            "aliases": [
                "CVE-2017-5076"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7add-jzbk-cba6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56226?format=api",
            "vulnerability_id": "VCID-89ws-643e-ayd1",
            "summary": "Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5081.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5081.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5081",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0679",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0699",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07041",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07024",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07026",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06872",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06922",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06905",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0696",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06992",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06996",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06988",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06983",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06921",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5081"
                },
                {
                    "reference_url": "https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html"
                },
                {
                    "reference_url": "https://crbug.com/672008",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://crbug.com/672008"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/98861",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/98861"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1038622"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459034",
                    "reference_id": "1459034",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459034"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201706-8",
                    "reference_id": "ASA-201706-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201706-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-289",
                    "reference_id": "AVG-289",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-289"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5081",
                    "reference_id": "CVE-2017-5081",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:P/A:N"
                        },
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5081"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201706-20",
                    "reference_id": "GLSA-201706-20",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201706-20"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1399",
                    "reference_id": "RHSA-2017:1399",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1399"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371552?format=api",
                    "purl": "pkg:alpm/archlinux/chromium@59.0.3071.86-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hsuj-ffh4-33f3"
                        },
                        {
                            "vulnerability": "VCID-qn3a-kdx8-n3hm"
                        },
                        {
                            "vulnerability": "VCID-usgw-gqnq-dfb3"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@59.0.3071.86-1"
                }
            ],
            "aliases": [
                "CVE-2017-5081"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-89ws-643e-ayd1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56217?format=api",
            "vulnerability_id": "VCID-b75z-83fg-vyea",
            "summary": "Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5072.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5072.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5072",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00524",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66852",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00524",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66989",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00524",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66956",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00524",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66978",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00524",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66991",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00524",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6689",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00524",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66916",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00524",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66938",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00524",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66952",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00524",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66972",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00524",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66958",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00524",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66927",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00524",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6696",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00524",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66974",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5072"
                },
                {
                    "reference_url": "https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html"
                },
                {
                    "reference_url": "https://crbug.com/709417",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://crbug.com/709417"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/98861",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/98861"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1038622"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459023",
                    "reference_id": "1459023",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459023"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201706-8",
                    "reference_id": "ASA-201706-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201706-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-289",
                    "reference_id": "AVG-289",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-289"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5072",
                    "reference_id": "CVE-2017-5072",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5072"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201706-20",
                    "reference_id": "GLSA-201706-20",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201706-20"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1399",
                    "reference_id": "RHSA-2017:1399",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1399"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371552?format=api",
                    "purl": "pkg:alpm/archlinux/chromium@59.0.3071.86-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hsuj-ffh4-33f3"
                        },
                        {
                            "vulnerability": "VCID-qn3a-kdx8-n3hm"
                        },
                        {
                            "vulnerability": "VCID-usgw-gqnq-dfb3"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@59.0.3071.86-1"
                }
            ],
            "aliases": [
                "CVE-2017-5072"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b75z-83fg-vyea"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56215?format=api",
            "vulnerability_id": "VCID-kzw1-g1pw-bug3",
            "summary": "Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5070.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5070.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5070",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.71096",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98711",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.71096",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98697",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.71096",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98701",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.71096",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98708",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.71096",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98705",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.71096",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98704",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.71096",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98709",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.71096",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98696",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.71096",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98713",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.74378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98857",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.74378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98858",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5070"
                },
                {
                    "reference_url": "https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:17:23Z/"
                        }
                    ],
                    "url": "https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html"
                },
                {
                    "reference_url": "https://crbug.com/722756",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:17:23Z/"
                        }
                    ],
                    "url": "https://crbug.com/722756"
                },
                {
                    "reference_url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-5070",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-5070"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/98861",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:17:23Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/98861"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:17:23Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1038622"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459021",
                    "reference_id": "1459021",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459021"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201706-8",
                    "reference_id": "ASA-201706-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201706-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-289",
                    "reference_id": "AVG-289",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-289"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5070",
                    "reference_id": "CVE-2017-5070",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5070"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201706-20",
                    "reference_id": "GLSA-201706-20",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:17:23Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201706-20"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1399",
                    "reference_id": "RHSA-2017:1399",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:17:23Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1399"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371552?format=api",
                    "purl": "pkg:alpm/archlinux/chromium@59.0.3071.86-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hsuj-ffh4-33f3"
                        },
                        {
                            "vulnerability": "VCID-qn3a-kdx8-n3hm"
                        },
                        {
                            "vulnerability": "VCID-usgw-gqnq-dfb3"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@59.0.3071.86-1"
                }
            ],
            "aliases": [
                "CVE-2017-5070"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kzw1-g1pw-bug3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56230?format=api",
            "vulnerability_id": "VCID-pmhx-wy5d-buaz",
            "summary": "Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5085.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5085.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5085",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63243",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63378",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63348",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63367",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6338",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63302",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63329",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63295",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63346",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63364",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63381",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63365",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63328",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63363",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00443",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6337",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5085"
                },
                {
                    "reference_url": "https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html"
                },
                {
                    "reference_url": "https://crbug.com/692378",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://crbug.com/692378"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/98861",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/98861"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1038622"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459037",
                    "reference_id": "1459037",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459037"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201706-8",
                    "reference_id": "ASA-201706-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201706-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-289",
                    "reference_id": "AVG-289",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-289"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:chrome:58.0.3029:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:google:chrome:58.0.3029:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:chrome:58.0.3029:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5085",
                    "reference_id": "CVE-2017-5085",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N"
                        },
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5085"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201706-20",
                    "reference_id": "GLSA-201706-20",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201706-20"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1399",
                    "reference_id": "RHSA-2017:1399",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1399"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371552?format=api",
                    "purl": "pkg:alpm/archlinux/chromium@59.0.3071.86-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hsuj-ffh4-33f3"
                        },
                        {
                            "vulnerability": "VCID-qn3a-kdx8-n3hm"
                        },
                        {
                            "vulnerability": "VCID-usgw-gqnq-dfb3"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@59.0.3071.86-1"
                }
            ],
            "aliases": [
                "CVE-2017-5085"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pmhx-wy5d-buaz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56231?format=api",
            "vulnerability_id": "VCID-ppke-xzq1-nyac",
            "summary": "Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5086.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5086.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5086",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71215",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71357",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71294",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71347",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71353",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71224",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71242",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71216",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71258",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71273",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71295",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7128",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71264",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7131",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71316",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5086"
                },
                {
                    "reference_url": "https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html"
                },
                {
                    "reference_url": "https://crbug.com/722639",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://crbug.com/722639"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/98861",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/98861"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1038622"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459028",
                    "reference_id": "1459028",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459028"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201706-8",
                    "reference_id": "ASA-201706-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201706-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-289",
                    "reference_id": "AVG-289",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-289"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5086",
                    "reference_id": "CVE-2017-5086",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5086"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201706-20",
                    "reference_id": "GLSA-201706-20",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201706-20"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1399",
                    "reference_id": "RHSA-2017:1399",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1399"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371552?format=api",
                    "purl": "pkg:alpm/archlinux/chromium@59.0.3071.86-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hsuj-ffh4-33f3"
                        },
                        {
                            "vulnerability": "VCID-qn3a-kdx8-n3hm"
                        },
                        {
                            "vulnerability": "VCID-usgw-gqnq-dfb3"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@59.0.3071.86-1"
                }
            ],
            "aliases": [
                "CVE-2017-5086"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ppke-xzq1-nyac"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56223?format=api",
            "vulnerability_id": "VCID-qdh5-dwpk-13bp",
            "summary": "Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5078.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5078.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5078",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85811",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85925",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85894",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85915",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85924",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85822",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8584",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85844",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85862",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85872",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85887",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85884",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85879",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85898",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85902",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5078"
                },
                {
                    "reference_url": "https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html"
                },
                {
                    "reference_url": "https://crbug.com/711020",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://crbug.com/711020"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/98861",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/98861"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1038622"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459031",
                    "reference_id": "1459031",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459031"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201706-8",
                    "reference_id": "ASA-201706-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201706-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-289",
                    "reference_id": "AVG-289",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-289"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5078",
                    "reference_id": "CVE-2017-5078",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5078"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201706-20",
                    "reference_id": "GLSA-201706-20",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201706-20"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1399",
                    "reference_id": "RHSA-2017:1399",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1399"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371552?format=api",
                    "purl": "pkg:alpm/archlinux/chromium@59.0.3071.86-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hsuj-ffh4-33f3"
                        },
                        {
                            "vulnerability": "VCID-qn3a-kdx8-n3hm"
                        },
                        {
                            "vulnerability": "VCID-usgw-gqnq-dfb3"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@59.0.3071.86-1"
                }
            ],
            "aliases": [
                "CVE-2017-5078"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qdh5-dwpk-13bp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56227?format=api",
            "vulnerability_id": "VCID-qetz-xrku-87fe",
            "summary": "Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5082.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5082.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5082",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12948",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1279",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12907",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12931",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12896",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1304",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13092",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12894",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12974",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13025",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12987",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1295",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12905",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12806",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12808",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5082"
                },
                {
                    "reference_url": "https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html"
                },
                {
                    "reference_url": "https://crbug.com/721579",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://crbug.com/721579"
                },
                {
                    "reference_url": "https://wwws.nightwatchcybersecurity.com/2017/07/27/chrome-for-android-didnt-use-flag_secure-for-credit-card-prefill-settings-cve-2017-5082/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://wwws.nightwatchcybersecurity.com/2017/07/27/chrome-for-android-didnt-use-flag_secure-for-credit-card-prefill-settings-cve-2017-5082/"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/98861",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/98861"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1038622"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459035",
                    "reference_id": "1459035",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459035"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201706-8",
                    "reference_id": "ASA-201706-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201706-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-289",
                    "reference_id": "AVG-289",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-289"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5082",
                    "reference_id": "CVE-2017-5082",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:N/A:N"
                        },
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5082"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201706-20",
                    "reference_id": "GLSA-201706-20",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201706-20"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1399",
                    "reference_id": "RHSA-2017:1399",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1399"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371552?format=api",
                    "purl": "pkg:alpm/archlinux/chromium@59.0.3071.86-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hsuj-ffh4-33f3"
                        },
                        {
                            "vulnerability": "VCID-qn3a-kdx8-n3hm"
                        },
                        {
                            "vulnerability": "VCID-usgw-gqnq-dfb3"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@59.0.3071.86-1"
                }
            ],
            "aliases": [
                "CVE-2017-5082"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qetz-xrku-87fe"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56216?format=api",
            "vulnerability_id": "VCID-qqm4-enbx-sqas",
            "summary": "Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5071.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5071.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5071",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00736",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7276",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00736",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72909",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00736",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72859",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00736",
                            "scoring_system": "epss",
                            "scoring_elements": "0.729",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00736",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7291",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00736",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72768",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00736",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72788",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00736",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72764",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00736",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72802",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00736",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72816",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00736",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72841",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00736",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72824",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00736",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72815",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00736",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72857",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00736",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72867",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5071"
                },
                {
                    "reference_url": "https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html"
                },
                {
                    "reference_url": "https://crbug.com/715582",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://crbug.com/715582"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/98861",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/98861"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1038622"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459022",
                    "reference_id": "1459022",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459022"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201706-8",
                    "reference_id": "ASA-201706-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201706-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-289",
                    "reference_id": "AVG-289",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-289"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5071",
                    "reference_id": "CVE-2017-5071",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5071"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201706-20",
                    "reference_id": "GLSA-201706-20",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201706-20"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1399",
                    "reference_id": "RHSA-2017:1399",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1399"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371552?format=api",
                    "purl": "pkg:alpm/archlinux/chromium@59.0.3071.86-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hsuj-ffh4-33f3"
                        },
                        {
                            "vulnerability": "VCID-qn3a-kdx8-n3hm"
                        },
                        {
                            "vulnerability": "VCID-usgw-gqnq-dfb3"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@59.0.3071.86-1"
                }
            ],
            "aliases": [
                "CVE-2017-5071"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qqm4-enbx-sqas"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56220?format=api",
            "vulnerability_id": "VCID-tjyu-bwcu-jbbu",
            "summary": "Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5075.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5075.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5075",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71205",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71348",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71285",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71338",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71344",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71214",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71233",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71208",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7125",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71264",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71287",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71271",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71255",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71301",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71307",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5075"
                },
                {
                    "reference_url": "https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html"
                },
                {
                    "reference_url": "https://crbug.com/678776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://crbug.com/678776"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/98861",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/98861"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1038622"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459027",
                    "reference_id": "1459027",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459027"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201706-8",
                    "reference_id": "ASA-201706-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201706-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-289",
                    "reference_id": "AVG-289",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-289"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5075",
                    "reference_id": "CVE-2017-5075",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N"
                        },
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5075"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201706-20",
                    "reference_id": "GLSA-201706-20",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201706-20"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1399",
                    "reference_id": "RHSA-2017:1399",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1399"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371552?format=api",
                    "purl": "pkg:alpm/archlinux/chromium@59.0.3071.86-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hsuj-ffh4-33f3"
                        },
                        {
                            "vulnerability": "VCID-qn3a-kdx8-n3hm"
                        },
                        {
                            "vulnerability": "VCID-usgw-gqnq-dfb3"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@59.0.3071.86-1"
                }
            ],
            "aliases": [
                "CVE-2017-5075"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tjyu-bwcu-jbbu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56228?format=api",
            "vulnerability_id": "VCID-vjp1-xjzc-fbh7",
            "summary": "Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5083.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5083.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5083",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71215",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71357",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71294",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71347",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71353",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71224",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71242",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71216",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71258",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71273",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71295",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7128",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71264",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7131",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71316",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5083"
                },
                {
                    "reference_url": "https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html"
                },
                {
                    "reference_url": "https://crbug.com/714849",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://crbug.com/714849"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/98861",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/98861"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1038622"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459036",
                    "reference_id": "1459036",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459036"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201706-8",
                    "reference_id": "ASA-201706-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201706-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-289",
                    "reference_id": "AVG-289",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-289"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5083",
                    "reference_id": "CVE-2017-5083",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N"
                        },
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5083"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201706-20",
                    "reference_id": "GLSA-201706-20",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201706-20"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1399",
                    "reference_id": "RHSA-2017:1399",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1399"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371552?format=api",
                    "purl": "pkg:alpm/archlinux/chromium@59.0.3071.86-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hsuj-ffh4-33f3"
                        },
                        {
                            "vulnerability": "VCID-qn3a-kdx8-n3hm"
                        },
                        {
                            "vulnerability": "VCID-usgw-gqnq-dfb3"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@59.0.3071.86-1"
                }
            ],
            "aliases": [
                "CVE-2017-5083"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vjp1-xjzc-fbh7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56224?format=api",
            "vulnerability_id": "VCID-wd3v-zk8f-5fgh",
            "summary": "Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5079.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5079.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5079",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71215",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71357",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71294",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71347",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71353",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71224",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71242",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71216",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71258",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71273",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71295",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7128",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71264",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7131",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00667",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71316",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5079"
                },
                {
                    "reference_url": "https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html"
                },
                {
                    "reference_url": "https://crbug.com/713686",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://crbug.com/713686"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/98861",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/98861"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1038622"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459032",
                    "reference_id": "1459032",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459032"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201706-8",
                    "reference_id": "ASA-201706-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201706-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-289",
                    "reference_id": "AVG-289",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-289"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5079",
                    "reference_id": "CVE-2017-5079",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N"
                        },
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5079"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201706-20",
                    "reference_id": "GLSA-201706-20",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201706-20"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1399",
                    "reference_id": "RHSA-2017:1399",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1399"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371552?format=api",
                    "purl": "pkg:alpm/archlinux/chromium@59.0.3071.86-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hsuj-ffh4-33f3"
                        },
                        {
                            "vulnerability": "VCID-qn3a-kdx8-n3hm"
                        },
                        {
                            "vulnerability": "VCID-usgw-gqnq-dfb3"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@59.0.3071.86-1"
                }
            ],
            "aliases": [
                "CVE-2017-5079"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wd3v-zk8f-5fgh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56218?format=api",
            "vulnerability_id": "VCID-yz5a-929h-jufn",
            "summary": "Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5073.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5073.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5073",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74955",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75077",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75031",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75069",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75074",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74958",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74987",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74962",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74996",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75008",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7503",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75009",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74998",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75034",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75042",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5073"
                },
                {
                    "reference_url": "https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html"
                },
                {
                    "reference_url": "https://crbug.com/716474",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://crbug.com/716474"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/98861",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/98861"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1038622"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459024",
                    "reference_id": "1459024",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459024"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201706-8",
                    "reference_id": "ASA-201706-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201706-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-289",
                    "reference_id": "AVG-289",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-289"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5073",
                    "reference_id": "CVE-2017-5073",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5073"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201706-20",
                    "reference_id": "GLSA-201706-20",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201706-20"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1399",
                    "reference_id": "RHSA-2017:1399",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1399"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/371552?format=api",
                    "purl": "pkg:alpm/archlinux/chromium@59.0.3071.86-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hsuj-ffh4-33f3"
                        },
                        {
                            "vulnerability": "VCID-qn3a-kdx8-n3hm"
                        },
                        {
                            "vulnerability": "VCID-usgw-gqnq-dfb3"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@59.0.3071.86-1"
                }
            ],
            "aliases": [
                "CVE-2017-5073"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yz5a-929h-jufn"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "10.0",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/chromium@58.0.3029.110-1"
}