Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/www-client/chromium@50.0.2661.102
Typeebuild
Namespacewww-client
Namechromium
Version50.0.2661.102
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version51.0.2704.103
Latest_non_vulnerable_version141.0.7390.107
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-3gc7-nyyq-vycu
vulnerability_id VCID-3gc7-nyyq-vycu
summary
Multiple vulnerabilities have been found in the Chromium web
    browser, the worst of which allows remote attackers to execute arbitrary
    code.
references
0
reference_url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0707.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0707.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1665.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1665.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1665
reference_id
reference_type
scores
0
value 0.01603
scoring_system epss
scoring_elements 0.81752
published_at 2026-04-21T12:55:00Z
1
value 0.01603
scoring_system epss
scoring_elements 0.81749
published_at 2026-04-16T12:55:00Z
2
value 0.01603
scoring_system epss
scoring_elements 0.81748
published_at 2026-04-18T12:55:00Z
3
value 0.01603
scoring_system epss
scoring_elements 0.81648
published_at 2026-04-01T12:55:00Z
4
value 0.01603
scoring_system epss
scoring_elements 0.81659
published_at 2026-04-02T12:55:00Z
5
value 0.01603
scoring_system epss
scoring_elements 0.81681
published_at 2026-04-04T12:55:00Z
6
value 0.01603
scoring_system epss
scoring_elements 0.81679
published_at 2026-04-07T12:55:00Z
7
value 0.01603
scoring_system epss
scoring_elements 0.81705
published_at 2026-04-08T12:55:00Z
8
value 0.01603
scoring_system epss
scoring_elements 0.8171
published_at 2026-04-13T12:55:00Z
9
value 0.01603
scoring_system epss
scoring_elements 0.8173
published_at 2026-04-11T12:55:00Z
10
value 0.01603
scoring_system epss
scoring_elements 0.81717
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1665
8
reference_url https://codereview.chromium.org/1925463003
reference_id
reference_type
scores
url https://codereview.chromium.org/1925463003
9
reference_url https://crbug.com/606181
reference_id
reference_type
scores
url https://crbug.com/606181
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url http://www.debian.org/security/2016/dsa-3564
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3564
19
reference_url http://www.securityfocus.com/bid/89106
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/89106
20
reference_url http://www.ubuntu.com/usn/USN-2960-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2960-1
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1331640
reference_id 1331640
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1331640
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1665
reference_id CVE-2016-1665
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-1665
29
reference_url https://security.gentoo.org/glsa/201605-02
reference_id GLSA-201605-02
reference_type
scores
url https://security.gentoo.org/glsa/201605-02
30
reference_url https://access.redhat.com/errata/RHSA-2016:0707
reference_id RHSA-2016:0707
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0707
31
reference_url https://usn.ubuntu.com/2960-1/
reference_id USN-2960-1
reference_type
scores
url https://usn.ubuntu.com/2960-1/
fixed_packages
0
url pkg:ebuild/www-client/chromium@50.0.2661.102
purl pkg:ebuild/www-client/chromium@50.0.2661.102
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/chromium@50.0.2661.102
aliases CVE-2016-1665
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3gc7-nyyq-vycu
1
url VCID-3v19-sv6s-u3h9
vulnerability_id VCID-3v19-sv6s-u3h9
summary
Multiple vulnerabilities have been found in the Chromium web
    browser, the worst of which allows remote attackers to execute arbitrary
    code.
references
0
reference_url http://googlechromereleases.blogspot.com/2016/05/stable-channel-update.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2016/05/stable-channel-update.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00043.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00043.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00050.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00050.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2016-1080.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1080.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1668.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1668.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1668
reference_id
reference_type
scores
0
value 0.01195
scoring_system epss
scoring_elements 0.789
published_at 2026-04-21T12:55:00Z
1
value 0.01195
scoring_system epss
scoring_elements 0.78905
published_at 2026-04-16T12:55:00Z
2
value 0.01195
scoring_system epss
scoring_elements 0.78903
published_at 2026-04-18T12:55:00Z
3
value 0.01195
scoring_system epss
scoring_elements 0.7883
published_at 2026-04-01T12:55:00Z
4
value 0.01195
scoring_system epss
scoring_elements 0.78836
published_at 2026-04-02T12:55:00Z
5
value 0.01195
scoring_system epss
scoring_elements 0.78865
published_at 2026-04-04T12:55:00Z
6
value 0.01195
scoring_system epss
scoring_elements 0.78847
published_at 2026-04-07T12:55:00Z
7
value 0.01195
scoring_system epss
scoring_elements 0.78872
published_at 2026-04-08T12:55:00Z
8
value 0.01195
scoring_system epss
scoring_elements 0.78879
published_at 2026-04-09T12:55:00Z
9
value 0.01195
scoring_system epss
scoring_elements 0.78902
published_at 2026-04-11T12:55:00Z
10
value 0.01195
scoring_system epss
scoring_elements 0.78886
published_at 2026-04-12T12:55:00Z
11
value 0.01195
scoring_system epss
scoring_elements 0.78877
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1668
7
reference_url https://codereview.chromium.org/1960013002
reference_id
reference_type
scores
url https://codereview.chromium.org/1960013002
8
reference_url https://crbug.com/605910
reference_id
reference_type
scores
url https://crbug.com/605910
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10403
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1667
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1667
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1668
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1669
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1670
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1672
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1673
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1674
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1675
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1676
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1676
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1677
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1677
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1678
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1678
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1679
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1679
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1680
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1680
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1681
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1681
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1682
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1682
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1683
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1683
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1684
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1684
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1685
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1686
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1686
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1687
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1687
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1688
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1688
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1689
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1689
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1690
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1690
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1691
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1692
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1693
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1693
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1694
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1694
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1695
38
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
39
reference_url http://www.debian.org/security/2016/dsa-3590
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3590
40
reference_url http://www.securityfocus.com/bid/90584
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/90584
41
reference_url http://www.securitytracker.com/id/1035872
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035872
42
reference_url http://www.ubuntu.com/usn/USN-2960-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2960-1
43
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1335448
reference_id 1335448
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1335448
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1668
reference_id CVE-2016-1668
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-1668
48
reference_url https://security.gentoo.org/glsa/201605-02
reference_id GLSA-201605-02
reference_type
scores
url https://security.gentoo.org/glsa/201605-02
49
reference_url https://access.redhat.com/errata/RHSA-2016:1080
reference_id RHSA-2016:1080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1080
50
reference_url https://usn.ubuntu.com/2960-1/
reference_id USN-2960-1
reference_type
scores
url https://usn.ubuntu.com/2960-1/
fixed_packages
0
url pkg:ebuild/www-client/chromium@50.0.2661.102
purl pkg:ebuild/www-client/chromium@50.0.2661.102
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/chromium@50.0.2661.102
aliases CVE-2016-1668
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3v19-sv6s-u3h9
2
url VCID-4req-ww89-nfc5
vulnerability_id VCID-4req-ww89-nfc5
summary
Multiple vulnerabilities have been found in the Chromium web
    browser, the worst of which allows remote attackers to execute arbitrary
    code.
references
0
reference_url http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_24.html
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:19:02Z/
url http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_24.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00000.html
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:19:02Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00000.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00001.html
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:19:02Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00001.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00039.html
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:19:02Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00039.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2016-0525.html
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:19:02Z/
url http://rhn.redhat.com/errata/RHSA-2016-0525.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1646.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1646.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1646
reference_id
reference_type
scores
0
value 0.66511
scoring_system epss
scoring_elements 0.98522
published_at 2026-04-01T12:55:00Z
1
value 0.66511
scoring_system epss
scoring_elements 0.98524
published_at 2026-04-02T12:55:00Z
2
value 0.66511
scoring_system epss
scoring_elements 0.98527
published_at 2026-04-07T12:55:00Z
3
value 0.66511
scoring_system epss
scoring_elements 0.98531
published_at 2026-04-08T12:55:00Z
4
value 0.66511
scoring_system epss
scoring_elements 0.98532
published_at 2026-04-09T12:55:00Z
5
value 0.66511
scoring_system epss
scoring_elements 0.98533
published_at 2026-04-12T12:55:00Z
6
value 0.66511
scoring_system epss
scoring_elements 0.98534
published_at 2026-04-13T12:55:00Z
7
value 0.66511
scoring_system epss
scoring_elements 0.98539
published_at 2026-04-18T12:55:00Z
8
value 0.66511
scoring_system epss
scoring_elements 0.9854
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1646
7
reference_url https://code.google.com/p/chromium/issues/detail?id=594574
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:19:02Z/
url https://code.google.com/p/chromium/issues/detail?id=594574
8
reference_url https://codereview.chromium.org/1804963002/
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:19:02Z/
url https://codereview.chromium.org/1804963002/
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1646
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1647
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1648
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1649
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1650
14
reference_url https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2016-1646
reference_id
reference_type
scores
url https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2016-1646
15
reference_url http://www.debian.org/security/2016/dsa-3531
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:19:02Z/
url http://www.debian.org/security/2016/dsa-3531
16
reference_url http://www.securitytracker.com/id/1035423
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:19:02Z/
url http://www.securitytracker.com/id/1035423
17
reference_url http://www.ubuntu.com/usn/USN-2955-1
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:19:02Z/
url http://www.ubuntu.com/usn/USN-2955-1
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1321811
reference_id 1321811
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1321811
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:package_hub:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:package_hub:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:package_hub:-:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1646
reference_id CVE-2016-1646
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
1
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-1646
33
reference_url https://security.gentoo.org/glsa/201605-02
reference_id GLSA-201605-02
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:19:02Z/
url https://security.gentoo.org/glsa/201605-02
34
reference_url https://access.redhat.com/errata/RHSA-2016:0525
reference_id RHSA-2016:0525
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0525
35
reference_url https://usn.ubuntu.com/2955-1/
reference_id USN-2955-1
reference_type
scores
url https://usn.ubuntu.com/2955-1/
fixed_packages
0
url pkg:ebuild/www-client/chromium@50.0.2661.102
purl pkg:ebuild/www-client/chromium@50.0.2661.102
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/chromium@50.0.2661.102
aliases CVE-2016-1646
risk_score 10.0
exploitability 2.0
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4req-ww89-nfc5
3
url VCID-4ypa-zvcs-xuhh
vulnerability_id VCID-4ypa-zvcs-xuhh
summary
Multiple vulnerabilities have been found in the Chromium web
    browser, the worst of which allows remote attackers to execute arbitrary
    code.
references
0
reference_url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0638.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0638.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1659.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1659.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1659
reference_id
reference_type
scores
0
value 0.02455
scoring_system epss
scoring_elements 0.85237
published_at 2026-04-18T12:55:00Z
1
value 0.02455
scoring_system epss
scoring_elements 0.85236
published_at 2026-04-21T12:55:00Z
2
value 0.02455
scoring_system epss
scoring_elements 0.85147
published_at 2026-04-01T12:55:00Z
3
value 0.02455
scoring_system epss
scoring_elements 0.85158
published_at 2026-04-02T12:55:00Z
4
value 0.02455
scoring_system epss
scoring_elements 0.85176
published_at 2026-04-04T12:55:00Z
5
value 0.02455
scoring_system epss
scoring_elements 0.85178
published_at 2026-04-07T12:55:00Z
6
value 0.02455
scoring_system epss
scoring_elements 0.852
published_at 2026-04-08T12:55:00Z
7
value 0.02455
scoring_system epss
scoring_elements 0.85208
published_at 2026-04-09T12:55:00Z
8
value 0.02455
scoring_system epss
scoring_elements 0.85222
published_at 2026-04-11T12:55:00Z
9
value 0.02455
scoring_system epss
scoring_elements 0.85219
published_at 2026-04-12T12:55:00Z
10
value 0.02455
scoring_system epss
scoring_elements 0.85216
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1659
8
reference_url https://crbug.com/602697
reference_id
reference_type
scores
url https://crbug.com/602697
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1651
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1652
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1653
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1654
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1655
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1657
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1657
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1658
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1659
17
reference_url http://www.debian.org/security/2016/dsa-3549
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3549
18
reference_url http://www.ubuntu.com/usn/USN-2955-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2955-1
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1327120
reference_id 1327120
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1327120
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1659
reference_id CVE-2016-1659
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-1659
28
reference_url https://security.gentoo.org/glsa/201605-02
reference_id GLSA-201605-02
reference_type
scores
url https://security.gentoo.org/glsa/201605-02
29
reference_url https://access.redhat.com/errata/RHSA-2016:0638
reference_id RHSA-2016:0638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0638
30
reference_url https://usn.ubuntu.com/2955-1/
reference_id USN-2955-1
reference_type
scores
url https://usn.ubuntu.com/2955-1/
fixed_packages
0
url pkg:ebuild/www-client/chromium@50.0.2661.102
purl pkg:ebuild/www-client/chromium@50.0.2661.102
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/chromium@50.0.2661.102
aliases CVE-2016-1659
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4ypa-zvcs-xuhh
4
url VCID-5pvd-cdrh-c3gb
vulnerability_id VCID-5pvd-cdrh-c3gb
summary
Multiple vulnerabilities have been found in the Chromium web
    browser, the worst of which allows remote attackers to execute arbitrary
    code.
references
0
reference_url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0707.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0707.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1662.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1662.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1662
reference_id
reference_type
scores
0
value 0.15771
scoring_system epss
scoring_elements 0.94748
published_at 2026-04-21T12:55:00Z
1
value 0.15771
scoring_system epss
scoring_elements 0.94742
published_at 2026-04-16T12:55:00Z
2
value 0.15771
scoring_system epss
scoring_elements 0.94744
published_at 2026-04-18T12:55:00Z
3
value 0.15771
scoring_system epss
scoring_elements 0.94696
published_at 2026-04-01T12:55:00Z
4
value 0.15771
scoring_system epss
scoring_elements 0.94704
published_at 2026-04-02T12:55:00Z
5
value 0.15771
scoring_system epss
scoring_elements 0.94708
published_at 2026-04-04T12:55:00Z
6
value 0.15771
scoring_system epss
scoring_elements 0.9471
published_at 2026-04-07T12:55:00Z
7
value 0.15771
scoring_system epss
scoring_elements 0.9472
published_at 2026-04-08T12:55:00Z
8
value 0.15771
scoring_system epss
scoring_elements 0.94724
published_at 2026-04-09T12:55:00Z
9
value 0.15771
scoring_system epss
scoring_elements 0.94728
published_at 2026-04-11T12:55:00Z
10
value 0.15771
scoring_system epss
scoring_elements 0.94732
published_at 2026-04-12T12:55:00Z
11
value 0.15771
scoring_system epss
scoring_elements 0.94733
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1662
8
reference_url https://codereview.chromium.org/1887423002
reference_id
reference_type
scores
url https://codereview.chromium.org/1887423002
9
reference_url https://crbug.com/603732
reference_id
reference_type
scores
url https://crbug.com/603732
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url http://www.debian.org/security/2016/dsa-3564
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3564
19
reference_url http://www.securityfocus.com/bid/89106
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/89106
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1331637
reference_id 1331637
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1331637
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1662
reference_id CVE-2016-1662
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-1662
28
reference_url https://security.gentoo.org/glsa/201605-02
reference_id GLSA-201605-02
reference_type
scores
url https://security.gentoo.org/glsa/201605-02
29
reference_url https://access.redhat.com/errata/RHSA-2016:0707
reference_id RHSA-2016:0707
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0707
fixed_packages
0
url pkg:ebuild/www-client/chromium@50.0.2661.102
purl pkg:ebuild/www-client/chromium@50.0.2661.102
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/chromium@50.0.2661.102
aliases CVE-2016-1662
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5pvd-cdrh-c3gb
5
url VCID-7k4q-jnya-gyhp
vulnerability_id VCID-7k4q-jnya-gyhp
summary
Multiple vulnerabilities have been found in the Chromium web
    browser, the worst of which allows remote attackers to execute arbitrary
    code.
references
0
reference_url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0638.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0638.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1653.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1653.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1653
reference_id
reference_type
scores
0
value 0.01518
scoring_system epss
scoring_elements 0.81276
published_at 2026-04-21T12:55:00Z
1
value 0.01518
scoring_system epss
scoring_elements 0.81277
published_at 2026-04-18T12:55:00Z
2
value 0.01518
scoring_system epss
scoring_elements 0.81175
published_at 2026-04-01T12:55:00Z
3
value 0.01518
scoring_system epss
scoring_elements 0.81183
published_at 2026-04-02T12:55:00Z
4
value 0.01518
scoring_system epss
scoring_elements 0.81207
published_at 2026-04-07T12:55:00Z
5
value 0.01518
scoring_system epss
scoring_elements 0.81234
published_at 2026-04-08T12:55:00Z
6
value 0.01518
scoring_system epss
scoring_elements 0.8124
published_at 2026-04-09T12:55:00Z
7
value 0.01518
scoring_system epss
scoring_elements 0.8126
published_at 2026-04-11T12:55:00Z
8
value 0.01518
scoring_system epss
scoring_elements 0.81246
published_at 2026-04-12T12:55:00Z
9
value 0.01518
scoring_system epss
scoring_elements 0.81238
published_at 2026-04-13T12:55:00Z
10
value 0.01518
scoring_system epss
scoring_elements 0.81275
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1653
8
reference_url https://codereview.chromium.org/1740123002
reference_id
reference_type
scores
url https://codereview.chromium.org/1740123002
9
reference_url https://crbug.com/589792
reference_id
reference_type
scores
url https://crbug.com/589792
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1651
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1652
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1653
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1654
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1655
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1657
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1657
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1658
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1659
18
reference_url http://www.debian.org/security/2016/dsa-3549
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3549
19
reference_url http://www.ubuntu.com/usn/USN-2955-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2955-1
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1327110
reference_id 1327110
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1327110
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1653
reference_id CVE-2016-1653
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-1653
29
reference_url https://security.gentoo.org/glsa/201605-02
reference_id GLSA-201605-02
reference_type
scores
url https://security.gentoo.org/glsa/201605-02
30
reference_url https://access.redhat.com/errata/RHSA-2016:0638
reference_id RHSA-2016:0638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0638
31
reference_url https://usn.ubuntu.com/2955-1/
reference_id USN-2955-1
reference_type
scores
url https://usn.ubuntu.com/2955-1/
fixed_packages
0
url pkg:ebuild/www-client/chromium@50.0.2661.102
purl pkg:ebuild/www-client/chromium@50.0.2661.102
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/chromium@50.0.2661.102
aliases CVE-2016-1653
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7k4q-jnya-gyhp
6
url VCID-874q-kknv-7ug8
vulnerability_id VCID-874q-kknv-7ug8
summary
Multiple vulnerabilities have been found in the Chromium web
    browser, the worst of which allows remote attackers to execute arbitrary
    code.
references
0
reference_url http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_24.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_24.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00000.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00001.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00039.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00039.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2016-0525.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0525.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1649.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1649.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1649
reference_id
reference_type
scores
0
value 0.02814
scoring_system epss
scoring_elements 0.86154
published_at 2026-04-21T12:55:00Z
1
value 0.02814
scoring_system epss
scoring_elements 0.86163
published_at 2026-04-18T12:55:00Z
2
value 0.02814
scoring_system epss
scoring_elements 0.86074
published_at 2026-04-01T12:55:00Z
3
value 0.02814
scoring_system epss
scoring_elements 0.86085
published_at 2026-04-02T12:55:00Z
4
value 0.02814
scoring_system epss
scoring_elements 0.86101
published_at 2026-04-04T12:55:00Z
5
value 0.02814
scoring_system epss
scoring_elements 0.861
published_at 2026-04-07T12:55:00Z
6
value 0.02814
scoring_system epss
scoring_elements 0.86119
published_at 2026-04-08T12:55:00Z
7
value 0.02814
scoring_system epss
scoring_elements 0.86131
published_at 2026-04-09T12:55:00Z
8
value 0.02814
scoring_system epss
scoring_elements 0.86145
published_at 2026-04-11T12:55:00Z
9
value 0.02814
scoring_system epss
scoring_elements 0.86143
published_at 2026-04-12T12:55:00Z
10
value 0.02814
scoring_system epss
scoring_elements 0.8614
published_at 2026-04-13T12:55:00Z
11
value 0.02814
scoring_system epss
scoring_elements 0.86157
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1649
7
reference_url https://chromium-review.googlesource.com/334448
reference_id
reference_type
scores
url https://chromium-review.googlesource.com/334448
8
reference_url https://code.google.com/p/chromium/issues/detail?id=595836
reference_id
reference_type
scores
url https://code.google.com/p/chromium/issues/detail?id=595836
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1646
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1647
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1648
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1649
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1650
14
reference_url http://www.debian.org/security/2016/dsa-3531
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3531
15
reference_url http://www.securitytracker.com/id/1035423
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035423
16
reference_url http://www.ubuntu.com/usn/USN-2955-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2955-1
17
reference_url http://www.zerodayinitiative.com/advisories/ZDI-16-224
reference_id
reference_type
scores
url http://www.zerodayinitiative.com/advisories/ZDI-16-224
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1321815
reference_id 1321815
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1321815
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1649
reference_id CVE-2016-1649
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-1649
26
reference_url https://security.gentoo.org/glsa/201605-02
reference_id GLSA-201605-02
reference_type
scores
url https://security.gentoo.org/glsa/201605-02
27
reference_url https://access.redhat.com/errata/RHSA-2016:0525
reference_id RHSA-2016:0525
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0525
28
reference_url https://usn.ubuntu.com/2955-1/
reference_id USN-2955-1
reference_type
scores
url https://usn.ubuntu.com/2955-1/
fixed_packages
0
url pkg:ebuild/www-client/chromium@50.0.2661.102
purl pkg:ebuild/www-client/chromium@50.0.2661.102
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/chromium@50.0.2661.102
aliases CVE-2016-1649
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-874q-kknv-7ug8
7
url VCID-8hyx-spuu-bbbg
vulnerability_id VCID-8hyx-spuu-bbbg
summary
Multiple vulnerabilities have been found in the Chromium web
    browser, the worst of which allows remote attackers to execute arbitrary
    code.
references
0
reference_url http://googlechromereleases.blogspot.com/2016/05/stable-channel-update.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2016/05/stable-channel-update.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00043.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00043.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00050.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00050.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2016-1080.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1080.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1667.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1667.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1667
reference_id
reference_type
scores
0
value 0.00617
scoring_system epss
scoring_elements 0.69974
published_at 2026-04-21T12:55:00Z
1
value 0.00617
scoring_system epss
scoring_elements 0.69982
published_at 2026-04-16T12:55:00Z
2
value 0.00617
scoring_system epss
scoring_elements 0.69992
published_at 2026-04-18T12:55:00Z
3
value 0.00617
scoring_system epss
scoring_elements 0.69877
published_at 2026-04-01T12:55:00Z
4
value 0.00617
scoring_system epss
scoring_elements 0.69889
published_at 2026-04-02T12:55:00Z
5
value 0.00617
scoring_system epss
scoring_elements 0.69904
published_at 2026-04-04T12:55:00Z
6
value 0.00617
scoring_system epss
scoring_elements 0.69881
published_at 2026-04-07T12:55:00Z
7
value 0.00617
scoring_system epss
scoring_elements 0.69929
published_at 2026-04-08T12:55:00Z
8
value 0.00617
scoring_system epss
scoring_elements 0.69945
published_at 2026-04-09T12:55:00Z
9
value 0.00617
scoring_system epss
scoring_elements 0.69968
published_at 2026-04-11T12:55:00Z
10
value 0.00617
scoring_system epss
scoring_elements 0.69953
published_at 2026-04-12T12:55:00Z
11
value 0.00617
scoring_system epss
scoring_elements 0.69939
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1667
7
reference_url https://codereview.chromium.org/1953323002/
reference_id
reference_type
scores
url https://codereview.chromium.org/1953323002/
8
reference_url https://crbug.com/605766
reference_id
reference_type
scores
url https://crbug.com/605766
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10403
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1667
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1667
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1668
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1669
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1670
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1672
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1673
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1674
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1675
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1676
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1676
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1677
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1677
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1678
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1678
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1679
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1679
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1680
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1680
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1681
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1681
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1682
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1682
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1683
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1683
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1684
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1684
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1685
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1686
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1686
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1687
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1687
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1688
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1688
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1689
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1689
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1690
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1690
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1691
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1692
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1693
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1693
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1694
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1694
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1695
38
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
39
reference_url http://www.debian.org/security/2016/dsa-3590
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3590
40
reference_url http://www.securityfocus.com/bid/90584
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/90584
41
reference_url http://www.securitytracker.com/id/1035872
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035872
42
reference_url http://www.ubuntu.com/usn/USN-2960-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2960-1
43
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1335447
reference_id 1335447
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1335447
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1667
reference_id CVE-2016-1667
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-1667
48
reference_url https://security.gentoo.org/glsa/201605-02
reference_id GLSA-201605-02
reference_type
scores
url https://security.gentoo.org/glsa/201605-02
49
reference_url https://access.redhat.com/errata/RHSA-2016:1080
reference_id RHSA-2016:1080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1080
50
reference_url https://usn.ubuntu.com/2960-1/
reference_id USN-2960-1
reference_type
scores
url https://usn.ubuntu.com/2960-1/
fixed_packages
0
url pkg:ebuild/www-client/chromium@50.0.2661.102
purl pkg:ebuild/www-client/chromium@50.0.2661.102
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/chromium@50.0.2661.102
aliases CVE-2016-1667
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8hyx-spuu-bbbg
8
url VCID-8uxq-mvk3-zkgp
vulnerability_id VCID-8uxq-mvk3-zkgp
summary
Multiple vulnerabilities have been found in the Chromium web
    browser, the worst of which allows remote attackers to execute arbitrary
    code.
references
0
reference_url http://googlechromereleases.blogspot.com/2016/05/stable-channel-update.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2016/05/stable-channel-update.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00043.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00043.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00050.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00050.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2016-1080.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1080.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1670.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1670.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1670
reference_id
reference_type
scores
0
value 0.00682
scoring_system epss
scoring_elements 0.71638
published_at 2026-04-21T12:55:00Z
1
value 0.00682
scoring_system epss
scoring_elements 0.71651
published_at 2026-04-16T12:55:00Z
2
value 0.00682
scoring_system epss
scoring_elements 0.71656
published_at 2026-04-18T12:55:00Z
3
value 0.00682
scoring_system epss
scoring_elements 0.7157
published_at 2026-04-01T12:55:00Z
4
value 0.00682
scoring_system epss
scoring_elements 0.71576
published_at 2026-04-02T12:55:00Z
5
value 0.00682
scoring_system epss
scoring_elements 0.71594
published_at 2026-04-04T12:55:00Z
6
value 0.00682
scoring_system epss
scoring_elements 0.71567
published_at 2026-04-07T12:55:00Z
7
value 0.00682
scoring_system epss
scoring_elements 0.71608
published_at 2026-04-08T12:55:00Z
8
value 0.00682
scoring_system epss
scoring_elements 0.71618
published_at 2026-04-09T12:55:00Z
9
value 0.00682
scoring_system epss
scoring_elements 0.71641
published_at 2026-04-11T12:55:00Z
10
value 0.00682
scoring_system epss
scoring_elements 0.71625
published_at 2026-04-12T12:55:00Z
11
value 0.00682
scoring_system epss
scoring_elements 0.71606
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1670
7
reference_url https://codereview.chromium.org/1608573002
reference_id
reference_type
scores
url https://codereview.chromium.org/1608573002
8
reference_url https://crbug.com/578882
reference_id
reference_type
scores
url https://crbug.com/578882
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10403
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1667
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1667
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1668
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1669
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1670
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1672
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1673
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1674
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1675
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1676
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1676
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1677
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1677
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1678
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1678
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1679
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1679
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1680
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1680
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1681
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1681
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1682
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1682
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1683
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1683
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1684
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1684
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1685
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1686
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1686
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1687
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1687
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1688
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1688
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1689
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1689
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1690
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1690
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1691
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1692
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1693
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1693
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1694
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1694
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1695
38
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
39
reference_url http://www.debian.org/security/2016/dsa-3590
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3590
40
reference_url http://www.securityfocus.com/bid/90584
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/90584
41
reference_url http://www.securitytracker.com/id/1035872
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035872
42
reference_url http://www.ubuntu.com/usn/USN-2960-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2960-1
43
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1335450
reference_id 1335450
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1335450
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1670
reference_id CVE-2016-1670
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:P/A:N
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-1670
48
reference_url https://security.gentoo.org/glsa/201605-02
reference_id GLSA-201605-02
reference_type
scores
url https://security.gentoo.org/glsa/201605-02
49
reference_url https://access.redhat.com/errata/RHSA-2016:1080
reference_id RHSA-2016:1080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1080
50
reference_url https://usn.ubuntu.com/2960-1/
reference_id USN-2960-1
reference_type
scores
url https://usn.ubuntu.com/2960-1/
fixed_packages
0
url pkg:ebuild/www-client/chromium@50.0.2661.102
purl pkg:ebuild/www-client/chromium@50.0.2661.102
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/chromium@50.0.2661.102
aliases CVE-2016-1670
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8uxq-mvk3-zkgp
9
url VCID-9ypx-d4jg-bkcm
vulnerability_id VCID-9ypx-d4jg-bkcm
summary
Multiple vulnerabilities have been found in the Chromium web
    browser, the worst of which allows remote attackers to execute arbitrary
    code.
references
0
reference_url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0707.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0707.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1663.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1663.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1663
reference_id
reference_type
scores
0
value 0.01417
scoring_system epss
scoring_elements 0.806
published_at 2026-04-21T12:55:00Z
1
value 0.01417
scoring_system epss
scoring_elements 0.80595
published_at 2026-04-16T12:55:00Z
2
value 0.01417
scoring_system epss
scoring_elements 0.80597
published_at 2026-04-18T12:55:00Z
3
value 0.01417
scoring_system epss
scoring_elements 0.80511
published_at 2026-04-01T12:55:00Z
4
value 0.01417
scoring_system epss
scoring_elements 0.80517
published_at 2026-04-02T12:55:00Z
5
value 0.01417
scoring_system epss
scoring_elements 0.8054
published_at 2026-04-04T12:55:00Z
6
value 0.01417
scoring_system epss
scoring_elements 0.80531
published_at 2026-04-07T12:55:00Z
7
value 0.01417
scoring_system epss
scoring_elements 0.8056
published_at 2026-04-08T12:55:00Z
8
value 0.01417
scoring_system epss
scoring_elements 0.8057
published_at 2026-04-09T12:55:00Z
9
value 0.01417
scoring_system epss
scoring_elements 0.80587
published_at 2026-04-11T12:55:00Z
10
value 0.01417
scoring_system epss
scoring_elements 0.80574
published_at 2026-04-12T12:55:00Z
11
value 0.01417
scoring_system epss
scoring_elements 0.80566
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1663
8
reference_url https://codereview.chromium.org/1904913002/
reference_id
reference_type
scores
url https://codereview.chromium.org/1904913002/
9
reference_url https://crbug.com/603987
reference_id
reference_type
scores
url https://crbug.com/603987
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url http://www.debian.org/security/2016/dsa-3564
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3564
19
reference_url http://www.securityfocus.com/bid/89106
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/89106
20
reference_url http://www.ubuntu.com/usn/USN-2960-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2960-1
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1331638
reference_id 1331638
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1331638
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1663
reference_id CVE-2016-1663
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-1663
29
reference_url https://security.gentoo.org/glsa/201605-02
reference_id GLSA-201605-02
reference_type
scores
url https://security.gentoo.org/glsa/201605-02
30
reference_url https://access.redhat.com/errata/RHSA-2016:0707
reference_id RHSA-2016:0707
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0707
31
reference_url https://usn.ubuntu.com/2960-1/
reference_id USN-2960-1
reference_type
scores
url https://usn.ubuntu.com/2960-1/
fixed_packages
0
url pkg:ebuild/www-client/chromium@50.0.2661.102
purl pkg:ebuild/www-client/chromium@50.0.2661.102
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/chromium@50.0.2661.102
aliases CVE-2016-1663
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9ypx-d4jg-bkcm
10
url VCID-ccvx-hz83-kyaw
vulnerability_id VCID-ccvx-hz83-kyaw
summary
Multiple vulnerabilities have been found in the Chromium web
    browser, the worst of which allows remote attackers to execute arbitrary
    code.
references
0
reference_url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0638.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0638.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1654.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1654.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1654
reference_id
reference_type
scores
0
value 0.0249
scoring_system epss
scoring_elements 0.85334
published_at 2026-04-21T12:55:00Z
1
value 0.0249
scoring_system epss
scoring_elements 0.85337
published_at 2026-04-18T12:55:00Z
2
value 0.0249
scoring_system epss
scoring_elements 0.85243
published_at 2026-04-01T12:55:00Z
3
value 0.0249
scoring_system epss
scoring_elements 0.85255
published_at 2026-04-02T12:55:00Z
4
value 0.0249
scoring_system epss
scoring_elements 0.85274
published_at 2026-04-04T12:55:00Z
5
value 0.0249
scoring_system epss
scoring_elements 0.85276
published_at 2026-04-07T12:55:00Z
6
value 0.0249
scoring_system epss
scoring_elements 0.85298
published_at 2026-04-08T12:55:00Z
7
value 0.0249
scoring_system epss
scoring_elements 0.85306
published_at 2026-04-09T12:55:00Z
8
value 0.0249
scoring_system epss
scoring_elements 0.85321
published_at 2026-04-11T12:55:00Z
9
value 0.0249
scoring_system epss
scoring_elements 0.85319
published_at 2026-04-12T12:55:00Z
10
value 0.0249
scoring_system epss
scoring_elements 0.85316
published_at 2026-04-13T12:55:00Z
11
value 0.0249
scoring_system epss
scoring_elements 0.85336
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1654
8
reference_url https://crbug.com/589512
reference_id
reference_type
scores
url https://crbug.com/589512
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1651
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1652
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1653
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1654
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1655
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1657
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1657
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1658
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1659
17
reference_url http://www.debian.org/security/2016/dsa-3549
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3549
18
reference_url http://www.ubuntu.com/usn/USN-2955-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2955-1
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1327112
reference_id 1327112
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1327112
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1654
reference_id CVE-2016-1654
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-1654
28
reference_url https://security.gentoo.org/glsa/201605-02
reference_id GLSA-201605-02
reference_type
scores
url https://security.gentoo.org/glsa/201605-02
29
reference_url https://access.redhat.com/errata/RHSA-2016:0638
reference_id RHSA-2016:0638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0638
30
reference_url https://usn.ubuntu.com/2955-1/
reference_id USN-2955-1
reference_type
scores
url https://usn.ubuntu.com/2955-1/
fixed_packages
0
url pkg:ebuild/www-client/chromium@50.0.2661.102
purl pkg:ebuild/www-client/chromium@50.0.2661.102
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/chromium@50.0.2661.102
aliases CVE-2016-1654
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ccvx-hz83-kyaw
11
url VCID-dt8r-g6xf-3uhj
vulnerability_id VCID-dt8r-g6xf-3uhj
summary
Multiple vulnerabilities have been found in the Chromium web
    browser, the worst of which allows remote attackers to execute arbitrary
    code.
references
0
reference_url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0638.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0638.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1652.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1652.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1652
reference_id
reference_type
scores
0
value 0.00411
scoring_system epss
scoring_elements 0.61396
published_at 2026-04-21T12:55:00Z
1
value 0.00411
scoring_system epss
scoring_elements 0.61414
published_at 2026-04-18T12:55:00Z
2
value 0.00411
scoring_system epss
scoring_elements 0.61245
published_at 2026-04-01T12:55:00Z
3
value 0.00411
scoring_system epss
scoring_elements 0.61324
published_at 2026-04-02T12:55:00Z
4
value 0.00411
scoring_system epss
scoring_elements 0.61354
published_at 2026-04-04T12:55:00Z
5
value 0.00411
scoring_system epss
scoring_elements 0.61323
published_at 2026-04-07T12:55:00Z
6
value 0.00411
scoring_system epss
scoring_elements 0.6137
published_at 2026-04-08T12:55:00Z
7
value 0.00411
scoring_system epss
scoring_elements 0.61385
published_at 2026-04-09T12:55:00Z
8
value 0.00411
scoring_system epss
scoring_elements 0.61406
published_at 2026-04-11T12:55:00Z
9
value 0.00411
scoring_system epss
scoring_elements 0.61391
published_at 2026-04-12T12:55:00Z
10
value 0.00411
scoring_system epss
scoring_elements 0.61372
published_at 2026-04-13T12:55:00Z
11
value 0.00411
scoring_system epss
scoring_elements 0.6141
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1652
8
reference_url https://codereview.chromium.org/1748943002/
reference_id
reference_type
scores
url https://codereview.chromium.org/1748943002/
9
reference_url https://crbug.com/590275
reference_id
reference_type
scores
url https://crbug.com/590275
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1651
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1652
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1653
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1654
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1655
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1657
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1657
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1658
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1659
18
reference_url http://www.debian.org/security/2016/dsa-3549
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3549
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1327109
reference_id 1327109
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1327109
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1652
reference_id CVE-2016-1652
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-1652
25
reference_url https://security.gentoo.org/glsa/201605-02
reference_id GLSA-201605-02
reference_type
scores
url https://security.gentoo.org/glsa/201605-02
26
reference_url https://access.redhat.com/errata/RHSA-2016:0638
reference_id RHSA-2016:0638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0638
fixed_packages
0
url pkg:ebuild/www-client/chromium@50.0.2661.102
purl pkg:ebuild/www-client/chromium@50.0.2661.102
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/chromium@50.0.2661.102
aliases CVE-2016-1652
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dt8r-g6xf-3uhj
12
url VCID-fc87-xhhz-kfgh
vulnerability_id VCID-fc87-xhhz-kfgh
summary
Multiple vulnerabilities have been found in the Chromium web
    browser, the worst of which allows remote attackers to execute arbitrary
    code.
references
0
reference_url http://googlechromereleases.blogspot.com/2016/05/stable-channel-update.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2016/05/stable-channel-update.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1671.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1671.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1671
reference_id
reference_type
scores
0
value 0.002
scoring_system epss
scoring_elements 0.42074
published_at 2026-04-21T12:55:00Z
1
value 0.002
scoring_system epss
scoring_elements 0.4217
published_at 2026-04-16T12:55:00Z
2
value 0.002
scoring_system epss
scoring_elements 0.42144
published_at 2026-04-18T12:55:00Z
3
value 0.002
scoring_system epss
scoring_elements 0.42072
published_at 2026-04-01T12:55:00Z
4
value 0.002
scoring_system epss
scoring_elements 0.42132
published_at 2026-04-02T12:55:00Z
5
value 0.002
scoring_system epss
scoring_elements 0.4216
published_at 2026-04-09T12:55:00Z
6
value 0.002
scoring_system epss
scoring_elements 0.42098
published_at 2026-04-07T12:55:00Z
7
value 0.002
scoring_system epss
scoring_elements 0.42149
published_at 2026-04-08T12:55:00Z
8
value 0.002
scoring_system epss
scoring_elements 0.42182
published_at 2026-04-11T12:55:00Z
9
value 0.002
scoring_system epss
scoring_elements 0.42145
published_at 2026-04-12T12:55:00Z
10
value 0.002
scoring_system epss
scoring_elements 0.42119
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1671
3
reference_url https://codereview.chromium.org/1704163003/
reference_id
reference_type
scores
url https://codereview.chromium.org/1704163003/
4
reference_url https://crbug.com/586657
reference_id
reference_type
scores
url https://crbug.com/586657
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://groups.google.com/a/chromium.org/forum/message/raw?msg=chromium-reviews/UkMGbbnTDW8/A4g-6YkfBAAJ
reference_id
reference_type
scores
url https://groups.google.com/a/chromium.org/forum/message/raw?msg=chromium-reviews/UkMGbbnTDW8/A4g-6YkfBAAJ
7
reference_url http://www.securityfocus.com/bid/90584
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/90584
8
reference_url http://www.securitytracker.com/id/1035872
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035872
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1335451
reference_id 1335451
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1335451
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1671
reference_id CVE-2016-1671
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-1671
13
reference_url https://security.gentoo.org/glsa/201605-02
reference_id GLSA-201605-02
reference_type
scores
url https://security.gentoo.org/glsa/201605-02
fixed_packages
0
url pkg:ebuild/www-client/chromium@50.0.2661.102
purl pkg:ebuild/www-client/chromium@50.0.2661.102
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/chromium@50.0.2661.102
aliases CVE-2016-1671
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fc87-xhhz-kfgh
13
url VCID-jj47-7333-bfhc
vulnerability_id VCID-jj47-7333-bfhc
summary
Multiple vulnerabilities have been found in the Chromium web
    browser, the worst of which allows remote attackers to execute arbitrary
    code.
references
0
reference_url http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_24.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_24.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00000.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00001.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00039.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00039.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2016-0525.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0525.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1647.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1647.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1647
reference_id
reference_type
scores
0
value 0.01286
scoring_system epss
scoring_elements 0.7966
published_at 2026-04-21T12:55:00Z
1
value 0.01286
scoring_system epss
scoring_elements 0.79657
published_at 2026-04-18T12:55:00Z
2
value 0.01286
scoring_system epss
scoring_elements 0.79576
published_at 2026-04-01T12:55:00Z
3
value 0.01286
scoring_system epss
scoring_elements 0.79583
published_at 2026-04-02T12:55:00Z
4
value 0.01286
scoring_system epss
scoring_elements 0.79606
published_at 2026-04-04T12:55:00Z
5
value 0.01286
scoring_system epss
scoring_elements 0.79593
published_at 2026-04-07T12:55:00Z
6
value 0.01286
scoring_system epss
scoring_elements 0.79621
published_at 2026-04-08T12:55:00Z
7
value 0.01286
scoring_system epss
scoring_elements 0.79629
published_at 2026-04-09T12:55:00Z
8
value 0.01286
scoring_system epss
scoring_elements 0.79649
published_at 2026-04-11T12:55:00Z
9
value 0.01286
scoring_system epss
scoring_elements 0.79634
published_at 2026-04-12T12:55:00Z
10
value 0.01286
scoring_system epss
scoring_elements 0.79626
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1647
7
reference_url https://code.google.com/p/chromium/issues/detail?id=590284
reference_id
reference_type
scores
url https://code.google.com/p/chromium/issues/detail?id=590284
8
reference_url https://codereview.chromium.org/1747183002/
reference_id
reference_type
scores
url https://codereview.chromium.org/1747183002/
9
reference_url https://codereview.chromium.org/1811783002/
reference_id
reference_type
scores
url https://codereview.chromium.org/1811783002/
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1646
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1647
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1648
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1649
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1650
15
reference_url http://www.debian.org/security/2016/dsa-3531
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3531
16
reference_url http://www.securitytracker.com/id/1035423
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035423
17
reference_url http://www.ubuntu.com/usn/USN-2955-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2955-1
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1321812
reference_id 1321812
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1321812
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1647
reference_id CVE-2016-1647
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-1647
26
reference_url https://security.gentoo.org/glsa/201605-02
reference_id GLSA-201605-02
reference_type
scores
url https://security.gentoo.org/glsa/201605-02
27
reference_url https://access.redhat.com/errata/RHSA-2016:0525
reference_id RHSA-2016:0525
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0525
28
reference_url https://usn.ubuntu.com/2955-1/
reference_id USN-2955-1
reference_type
scores
url https://usn.ubuntu.com/2955-1/
fixed_packages
0
url pkg:ebuild/www-client/chromium@50.0.2661.102
purl pkg:ebuild/www-client/chromium@50.0.2661.102
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/chromium@50.0.2661.102
aliases CVE-2016-1647
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jj47-7333-bfhc
14
url VCID-k754-me1v-kye1
vulnerability_id VCID-k754-me1v-kye1
summary
Multiple vulnerabilities have been found in the Chromium web
    browser, the worst of which allows remote attackers to execute arbitrary
    code.
references
0
reference_url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0707.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0707.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1664.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1664.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1664
reference_id
reference_type
scores
0
value 0.01056
scoring_system epss
scoring_elements 0.77627
published_at 2026-04-21T12:55:00Z
1
value 0.01056
scoring_system epss
scoring_elements 0.77635
published_at 2026-04-16T12:55:00Z
2
value 0.01056
scoring_system epss
scoring_elements 0.77633
published_at 2026-04-18T12:55:00Z
3
value 0.01056
scoring_system epss
scoring_elements 0.77538
published_at 2026-04-01T12:55:00Z
4
value 0.01056
scoring_system epss
scoring_elements 0.77544
published_at 2026-04-02T12:55:00Z
5
value 0.01056
scoring_system epss
scoring_elements 0.7757
published_at 2026-04-04T12:55:00Z
6
value 0.01056
scoring_system epss
scoring_elements 0.77551
published_at 2026-04-07T12:55:00Z
7
value 0.01056
scoring_system epss
scoring_elements 0.77581
published_at 2026-04-08T12:55:00Z
8
value 0.01056
scoring_system epss
scoring_elements 0.77587
published_at 2026-04-09T12:55:00Z
9
value 0.01056
scoring_system epss
scoring_elements 0.77615
published_at 2026-04-11T12:55:00Z
10
value 0.01056
scoring_system epss
scoring_elements 0.77599
published_at 2026-04-12T12:55:00Z
11
value 0.01056
scoring_system epss
scoring_elements 0.77597
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1664
8
reference_url https://codereview.chromium.org/1848813005/
reference_id
reference_type
scores
url https://codereview.chromium.org/1848813005/
9
reference_url https://crbug.com/597322
reference_id
reference_type
scores
url https://crbug.com/597322
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url http://www.debian.org/security/2016/dsa-3564
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3564
19
reference_url http://www.securityfocus.com/bid/89106
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/89106
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1331639
reference_id 1331639
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1331639
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1664
reference_id CVE-2016-1664
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-1664
28
reference_url https://security.gentoo.org/glsa/201605-02
reference_id GLSA-201605-02
reference_type
scores
url https://security.gentoo.org/glsa/201605-02
29
reference_url https://access.redhat.com/errata/RHSA-2016:0707
reference_id RHSA-2016:0707
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0707
fixed_packages
0
url pkg:ebuild/www-client/chromium@50.0.2661.102
purl pkg:ebuild/www-client/chromium@50.0.2661.102
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/chromium@50.0.2661.102
aliases CVE-2016-1664
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k754-me1v-kye1
15
url VCID-k9aj-xsjv-bbfk
vulnerability_id VCID-k9aj-xsjv-bbfk
summary
Multiple vulnerabilities have been found in the Chromium web
    browser, the worst of which allows remote attackers to execute arbitrary
    code.
references
0
reference_url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0638.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0638.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1655.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1655.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1655
reference_id
reference_type
scores
0
value 0.03027
scoring_system epss
scoring_elements 0.86666
published_at 2026-04-18T12:55:00Z
1
value 0.03027
scoring_system epss
scoring_elements 0.8666
published_at 2026-04-21T12:55:00Z
2
value 0.03027
scoring_system epss
scoring_elements 0.86585
published_at 2026-04-01T12:55:00Z
3
value 0.03027
scoring_system epss
scoring_elements 0.86595
published_at 2026-04-02T12:55:00Z
4
value 0.03027
scoring_system epss
scoring_elements 0.86614
published_at 2026-04-07T12:55:00Z
5
value 0.03027
scoring_system epss
scoring_elements 0.86634
published_at 2026-04-08T12:55:00Z
6
value 0.03027
scoring_system epss
scoring_elements 0.86643
published_at 2026-04-09T12:55:00Z
7
value 0.03027
scoring_system epss
scoring_elements 0.86657
published_at 2026-04-11T12:55:00Z
8
value 0.03027
scoring_system epss
scoring_elements 0.86654
published_at 2026-04-12T12:55:00Z
9
value 0.03027
scoring_system epss
scoring_elements 0.86647
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1655
8
reference_url https://codereview.chromium.org/1642283002
reference_id
reference_type
scores
url https://codereview.chromium.org/1642283002
9
reference_url https://crbug.com/582008
reference_id
reference_type
scores
url https://crbug.com/582008
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1651
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1652
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1653
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1654
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1655
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1657
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1657
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1658
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1659
18
reference_url http://www.debian.org/security/2016/dsa-3549
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3549
19
reference_url http://www.ubuntu.com/usn/USN-2955-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2955-1
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1327113
reference_id 1327113
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1327113
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1655
reference_id CVE-2016-1655
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-1655
29
reference_url https://security.gentoo.org/glsa/201605-02
reference_id GLSA-201605-02
reference_type
scores
url https://security.gentoo.org/glsa/201605-02
30
reference_url https://access.redhat.com/errata/RHSA-2016:0638
reference_id RHSA-2016:0638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0638
31
reference_url https://usn.ubuntu.com/2955-1/
reference_id USN-2955-1
reference_type
scores
url https://usn.ubuntu.com/2955-1/
fixed_packages
0
url pkg:ebuild/www-client/chromium@50.0.2661.102
purl pkg:ebuild/www-client/chromium@50.0.2661.102
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/chromium@50.0.2661.102
aliases CVE-2016-1655
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k9aj-xsjv-bbfk
16
url VCID-mz2v-rfmy-6uhp
vulnerability_id VCID-mz2v-rfmy-6uhp
summary
Multiple vulnerabilities have been found in the Chromium web
    browser, the worst of which allows remote attackers to execute arbitrary
    code.
references
0
reference_url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0638.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0638.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1657.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1657.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1657
reference_id
reference_type
scores
0
value 0.02176
scoring_system epss
scoring_elements 0.8436
published_at 2026-04-21T12:55:00Z
1
value 0.02176
scoring_system epss
scoring_elements 0.84357
published_at 2026-04-18T12:55:00Z
2
value 0.02176
scoring_system epss
scoring_elements 0.84268
published_at 2026-04-01T12:55:00Z
3
value 0.02176
scoring_system epss
scoring_elements 0.8428
published_at 2026-04-02T12:55:00Z
4
value 0.02176
scoring_system epss
scoring_elements 0.84299
published_at 2026-04-04T12:55:00Z
5
value 0.02176
scoring_system epss
scoring_elements 0.84301
published_at 2026-04-07T12:55:00Z
6
value 0.02176
scoring_system epss
scoring_elements 0.84322
published_at 2026-04-08T12:55:00Z
7
value 0.02176
scoring_system epss
scoring_elements 0.84328
published_at 2026-04-09T12:55:00Z
8
value 0.02176
scoring_system epss
scoring_elements 0.84346
published_at 2026-04-11T12:55:00Z
9
value 0.02176
scoring_system epss
scoring_elements 0.84338
published_at 2026-04-12T12:55:00Z
10
value 0.02176
scoring_system epss
scoring_elements 0.84335
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1657
8
reference_url https://codereview.chromium.org/1678233003/
reference_id
reference_type
scores
url https://codereview.chromium.org/1678233003/
9
reference_url https://crbug.com/567445
reference_id
reference_type
scores
url https://crbug.com/567445
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1651
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1652
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1653
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1654
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1655
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1657
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1657
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1658
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1659
18
reference_url http://www.debian.org/security/2016/dsa-3549
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3549
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1327115
reference_id 1327115
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1327115
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_package_hub_for_suse_linux_enterprise:12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:novell:suse_package_hub_for_suse_linux_enterprise:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_package_hub_for_suse_linux_enterprise:12:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1657
reference_id CVE-2016-1657
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-1657
25
reference_url https://security.gentoo.org/glsa/201605-02
reference_id GLSA-201605-02
reference_type
scores
url https://security.gentoo.org/glsa/201605-02
26
reference_url https://access.redhat.com/errata/RHSA-2016:0638
reference_id RHSA-2016:0638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0638
fixed_packages
0
url pkg:ebuild/www-client/chromium@50.0.2661.102
purl pkg:ebuild/www-client/chromium@50.0.2661.102
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/chromium@50.0.2661.102
aliases CVE-2016-1657
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mz2v-rfmy-6uhp
17
url VCID-nv23-e39p-3uan
vulnerability_id VCID-nv23-e39p-3uan
summary
Multiple vulnerabilities have been found in the Chromium web
    browser, the worst of which allows remote attackers to execute arbitrary
    code.
references
0
reference_url http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_24.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_24.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00000.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00001.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00039.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00039.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2016-0525.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0525.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1650.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1650.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1650
reference_id
reference_type
scores
0
value 0.01179
scoring_system epss
scoring_elements 0.78758
published_at 2026-04-21T12:55:00Z
1
value 0.01179
scoring_system epss
scoring_elements 0.78764
published_at 2026-04-16T12:55:00Z
2
value 0.01179
scoring_system epss
scoring_elements 0.78686
published_at 2026-04-01T12:55:00Z
3
value 0.01179
scoring_system epss
scoring_elements 0.78693
published_at 2026-04-02T12:55:00Z
4
value 0.01179
scoring_system epss
scoring_elements 0.78724
published_at 2026-04-04T12:55:00Z
5
value 0.01179
scoring_system epss
scoring_elements 0.78705
published_at 2026-04-07T12:55:00Z
6
value 0.01179
scoring_system epss
scoring_elements 0.78731
published_at 2026-04-08T12:55:00Z
7
value 0.01179
scoring_system epss
scoring_elements 0.78737
published_at 2026-04-09T12:55:00Z
8
value 0.01179
scoring_system epss
scoring_elements 0.78762
published_at 2026-04-18T12:55:00Z
9
value 0.01179
scoring_system epss
scoring_elements 0.78744
published_at 2026-04-12T12:55:00Z
10
value 0.01179
scoring_system epss
scoring_elements 0.78736
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1650
7
reference_url https://bugs.chromium.org/p/chromium/issues/detail?id=401364
reference_id
reference_type
scores
url https://bugs.chromium.org/p/chromium/issues/detail?id=401364
8
reference_url https://code.google.com/p/chromium/issues/detail?id=597518
reference_id
reference_type
scores
url https://code.google.com/p/chromium/issues/detail?id=597518
9
reference_url https://codereview.chromium.org/1761303003/
reference_id
reference_type
scores
url https://codereview.chromium.org/1761303003/
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1646
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1647
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1648
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1649
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1650
15
reference_url http://www.debian.org/security/2016/dsa-3531
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3531
16
reference_url http://www.securitytracker.com/id/1035423
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035423
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1321816
reference_id 1321816
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1321816
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1650
reference_id CVE-2016-1650
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-1650
22
reference_url https://security.gentoo.org/glsa/201605-02
reference_id GLSA-201605-02
reference_type
scores
url https://security.gentoo.org/glsa/201605-02
23
reference_url https://access.redhat.com/errata/RHSA-2016:0525
reference_id RHSA-2016:0525
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0525
fixed_packages
0
url pkg:ebuild/www-client/chromium@50.0.2661.102
purl pkg:ebuild/www-client/chromium@50.0.2661.102
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/chromium@50.0.2661.102
aliases CVE-2016-1650
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nv23-e39p-3uan
18
url VCID-p8ab-a4gk-eyd2
vulnerability_id VCID-p8ab-a4gk-eyd2
summary
Multiple vulnerabilities have been found in the Chromium web
    browser, the worst of which allows remote attackers to execute arbitrary
    code.
references
0
reference_url http://googlechromereleases.blogspot.com/2016/05/stable-channel-update.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2016/05/stable-channel-update.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00043.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00043.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00050.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00050.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2016-07/msg00063.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-07/msg00063.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-1080.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1080.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2017-0002.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2017-0002.html
7
reference_url https://access.redhat.com/errata/RHSA-2018:0336
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0336
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1669.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1669.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1669
reference_id
reference_type
scores
0
value 0.01626
scoring_system epss
scoring_elements 0.81796
published_at 2026-04-01T12:55:00Z
1
value 0.01626
scoring_system epss
scoring_elements 0.819
published_at 2026-04-21T12:55:00Z
2
value 0.01626
scoring_system epss
scoring_elements 0.81867
published_at 2026-04-12T12:55:00Z
3
value 0.01626
scoring_system epss
scoring_elements 0.81861
published_at 2026-04-13T12:55:00Z
4
value 0.01626
scoring_system epss
scoring_elements 0.81898
published_at 2026-04-18T12:55:00Z
5
value 0.01626
scoring_system epss
scoring_elements 0.81807
published_at 2026-04-02T12:55:00Z
6
value 0.01626
scoring_system epss
scoring_elements 0.81829
published_at 2026-04-04T12:55:00Z
7
value 0.01626
scoring_system epss
scoring_elements 0.81827
published_at 2026-04-07T12:55:00Z
8
value 0.01626
scoring_system epss
scoring_elements 0.81853
published_at 2026-04-08T12:55:00Z
9
value 0.01626
scoring_system epss
scoring_elements 0.8186
published_at 2026-04-09T12:55:00Z
10
value 0.01626
scoring_system epss
scoring_elements 0.81879
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1669
10
reference_url https://codereview.chromium.org/1945313002
reference_id
reference_type
scores
url https://codereview.chromium.org/1945313002
11
reference_url https://crbug.com/606115
reference_id
reference_type
scores
url https://crbug.com/606115
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10403
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1667
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1667
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1668
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1669
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1670
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1672
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1673
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1674
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1675
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1676
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1676
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1677
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1677
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1678
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1678
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1679
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1679
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1680
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1680
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1681
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1681
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1682
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1682
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1683
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1683
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1684
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1684
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1685
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1686
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1686
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1687
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1687
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1688
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1688
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1689
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1689
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1690
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1690
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1691
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1692
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1693
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1693
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1694
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1694
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1695
41
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
42
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541
43
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CITS5GIUTNWVSUXMSORIAJJLQBEGL2CK/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CITS5GIUTNWVSUXMSORIAJJLQBEGL2CK/
44
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZPTKXI62OPCJCJGCSFMST4HIBQ27J72W/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZPTKXI62OPCJCJGCSFMST4HIBQ27J72W/
45
reference_url http://www.debian.org/security/2016/dsa-3590
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3590
46
reference_url http://www.securityfocus.com/bid/90584
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/90584
47
reference_url http://www.securitytracker.com/id/1035872
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035872
48
reference_url http://www.ubuntu.com/usn/USN-2960-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2960-1
49
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1335449
reference_id 1335449
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1335449
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*
reference_id cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*
reference_id cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1669
reference_id CVE-2016-1669
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
1
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-1669
61
reference_url https://security.gentoo.org/glsa/201605-02
reference_id GLSA-201605-02
reference_type
scores
url https://security.gentoo.org/glsa/201605-02
62
reference_url https://access.redhat.com/errata/RHSA-2016:1080
reference_id RHSA-2016:1080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1080
63
reference_url https://access.redhat.com/errata/RHSA-2017:0002
reference_id RHSA-2017:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0002
64
reference_url https://access.redhat.com/errata/RHSA-2017:0879
reference_id RHSA-2017:0879
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0879
65
reference_url https://access.redhat.com/errata/RHSA-2017:0880
reference_id RHSA-2017:0880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0880
66
reference_url https://access.redhat.com/errata/RHSA-2017:0881
reference_id RHSA-2017:0881
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0881
67
reference_url https://access.redhat.com/errata/RHSA-2017:0882
reference_id RHSA-2017:0882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0882
68
reference_url https://usn.ubuntu.com/2960-1/
reference_id USN-2960-1
reference_type
scores
url https://usn.ubuntu.com/2960-1/
fixed_packages
0
url pkg:ebuild/www-client/chromium@50.0.2661.102
purl pkg:ebuild/www-client/chromium@50.0.2661.102
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/chromium@50.0.2661.102
aliases CVE-2016-1669
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p8ab-a4gk-eyd2
19
url VCID-qu3h-aycb-2qb1
vulnerability_id VCID-qu3h-aycb-2qb1
summary
Multiple vulnerabilities have been found in the Chromium web
    browser, the worst of which allows remote attackers to execute arbitrary
    code.
references
0
reference_url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0638.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0638.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1658.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1658.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1658
reference_id
reference_type
scores
0
value 0.00882
scoring_system epss
scoring_elements 0.75423
published_at 2026-04-21T12:55:00Z
1
value 0.00882
scoring_system epss
scoring_elements 0.75434
published_at 2026-04-18T12:55:00Z
2
value 0.00882
scoring_system epss
scoring_elements 0.75331
published_at 2026-04-01T12:55:00Z
3
value 0.00882
scoring_system epss
scoring_elements 0.75334
published_at 2026-04-02T12:55:00Z
4
value 0.00882
scoring_system epss
scoring_elements 0.75367
published_at 2026-04-04T12:55:00Z
5
value 0.00882
scoring_system epss
scoring_elements 0.75346
published_at 2026-04-07T12:55:00Z
6
value 0.00882
scoring_system epss
scoring_elements 0.7539
published_at 2026-04-08T12:55:00Z
7
value 0.00882
scoring_system epss
scoring_elements 0.75399
published_at 2026-04-09T12:55:00Z
8
value 0.00882
scoring_system epss
scoring_elements 0.75419
published_at 2026-04-11T12:55:00Z
9
value 0.00882
scoring_system epss
scoring_elements 0.75398
published_at 2026-04-12T12:55:00Z
10
value 0.00882
scoring_system epss
scoring_elements 0.75386
published_at 2026-04-13T12:55:00Z
11
value 0.00882
scoring_system epss
scoring_elements 0.75428
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1658
8
reference_url https://codereview.chromium.org/1658913002
reference_id
reference_type
scores
url https://codereview.chromium.org/1658913002
9
reference_url https://crbug.com/573317
reference_id
reference_type
scores
url https://crbug.com/573317
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1651
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1652
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1653
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1654
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1655
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1657
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1657
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1658
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1659
18
reference_url http://www.debian.org/security/2016/dsa-3549
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3549
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1327117
reference_id 1327117
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1327117
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_package_hub_for_suse_linux_enterprise:12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:novell:suse_package_hub_for_suse_linux_enterprise:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_package_hub_for_suse_linux_enterprise:12:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1658
reference_id CVE-2016-1658
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-1658
25
reference_url https://security.gentoo.org/glsa/201605-02
reference_id GLSA-201605-02
reference_type
scores
url https://security.gentoo.org/glsa/201605-02
26
reference_url https://access.redhat.com/errata/RHSA-2016:0638
reference_id RHSA-2016:0638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0638
fixed_packages
0
url pkg:ebuild/www-client/chromium@50.0.2661.102
purl pkg:ebuild/www-client/chromium@50.0.2661.102
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/chromium@50.0.2661.102
aliases CVE-2016-1658
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qu3h-aycb-2qb1
20
url VCID-rksh-5ywn-kqbv
vulnerability_id VCID-rksh-5ywn-kqbv
summary
Multiple vulnerabilities have been found in the Chromium web
    browser, the worst of which allows remote attackers to execute arbitrary
    code.
references
0
reference_url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0707.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0707.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1660.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1660.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1660
reference_id
reference_type
scores
0
value 0.01238
scoring_system epss
scoring_elements 0.79247
published_at 2026-04-21T12:55:00Z
1
value 0.01238
scoring_system epss
scoring_elements 0.79224
published_at 2026-04-13T12:55:00Z
2
value 0.01238
scoring_system epss
scoring_elements 0.79246
published_at 2026-04-18T12:55:00Z
3
value 0.01238
scoring_system epss
scoring_elements 0.79178
published_at 2026-04-01T12:55:00Z
4
value 0.01238
scoring_system epss
scoring_elements 0.79185
published_at 2026-04-02T12:55:00Z
5
value 0.01238
scoring_system epss
scoring_elements 0.79208
published_at 2026-04-04T12:55:00Z
6
value 0.01238
scoring_system epss
scoring_elements 0.79194
published_at 2026-04-07T12:55:00Z
7
value 0.01238
scoring_system epss
scoring_elements 0.79219
published_at 2026-04-08T12:55:00Z
8
value 0.01238
scoring_system epss
scoring_elements 0.79226
published_at 2026-04-09T12:55:00Z
9
value 0.01238
scoring_system epss
scoring_elements 0.7925
published_at 2026-04-16T12:55:00Z
10
value 0.01238
scoring_system epss
scoring_elements 0.79235
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1660
8
reference_url https://codereview.chromium.org/1672603002
reference_id
reference_type
scores
url https://codereview.chromium.org/1672603002
9
reference_url https://codereview.chromium.org/1677363002
reference_id
reference_type
scores
url https://codereview.chromium.org/1677363002
10
reference_url https://crbug.com/574802
reference_id
reference_type
scores
url https://crbug.com/574802
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url http://www.debian.org/security/2016/dsa-3564
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3564
20
reference_url http://www.securityfocus.com/bid/89106
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/89106
21
reference_url http://www.ubuntu.com/usn/USN-2960-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2960-1
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1331635
reference_id 1331635
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1331635
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1660
reference_id CVE-2016-1660
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-1660
30
reference_url https://security.gentoo.org/glsa/201605-02
reference_id GLSA-201605-02
reference_type
scores
url https://security.gentoo.org/glsa/201605-02
31
reference_url https://access.redhat.com/errata/RHSA-2016:0707
reference_id RHSA-2016:0707
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0707
32
reference_url https://usn.ubuntu.com/2960-1/
reference_id USN-2960-1
reference_type
scores
url https://usn.ubuntu.com/2960-1/
fixed_packages
0
url pkg:ebuild/www-client/chromium@50.0.2661.102
purl pkg:ebuild/www-client/chromium@50.0.2661.102
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/chromium@50.0.2661.102
aliases CVE-2016-1660
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rksh-5ywn-kqbv
21
url VCID-tbp1-4ah8-nqft
vulnerability_id VCID-tbp1-4ah8-nqft
summary
Multiple vulnerabilities have been found in the Chromium web
    browser, the worst of which allows remote attackers to execute arbitrary
    code.
references
0
reference_url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0638.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0638.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1656.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1656.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1656
reference_id
reference_type
scores
0
value 0.00404
scoring_system epss
scoring_elements 0.61012
published_at 2026-04-21T12:55:00Z
1
value 0.00404
scoring_system epss
scoring_elements 0.61027
published_at 2026-04-18T12:55:00Z
2
value 0.00404
scoring_system epss
scoring_elements 0.6086
published_at 2026-04-01T12:55:00Z
3
value 0.00404
scoring_system epss
scoring_elements 0.60932
published_at 2026-04-02T12:55:00Z
4
value 0.00404
scoring_system epss
scoring_elements 0.60961
published_at 2026-04-04T12:55:00Z
5
value 0.00404
scoring_system epss
scoring_elements 0.60927
published_at 2026-04-07T12:55:00Z
6
value 0.00404
scoring_system epss
scoring_elements 0.60976
published_at 2026-04-08T12:55:00Z
7
value 0.00404
scoring_system epss
scoring_elements 0.60992
published_at 2026-04-09T12:55:00Z
8
value 0.00404
scoring_system epss
scoring_elements 0.61013
published_at 2026-04-11T12:55:00Z
9
value 0.00404
scoring_system epss
scoring_elements 0.60999
published_at 2026-04-12T12:55:00Z
10
value 0.00404
scoring_system epss
scoring_elements 0.60979
published_at 2026-04-13T12:55:00Z
11
value 0.00404
scoring_system epss
scoring_elements 0.61021
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1656
8
reference_url https://crbug.com/570750
reference_id
reference_type
scores
url https://crbug.com/570750
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1327114
reference_id 1327114
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1327114
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1656
reference_id CVE-2016-1656
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-1656
15
reference_url https://security.gentoo.org/glsa/201605-02
reference_id GLSA-201605-02
reference_type
scores
url https://security.gentoo.org/glsa/201605-02
16
reference_url https://access.redhat.com/errata/RHSA-2016:0638
reference_id RHSA-2016:0638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0638
fixed_packages
0
url pkg:ebuild/www-client/chromium@50.0.2661.102
purl pkg:ebuild/www-client/chromium@50.0.2661.102
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/chromium@50.0.2661.102
aliases CVE-2016-1656
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tbp1-4ah8-nqft
22
url VCID-uw67-r9p5-j7bj
vulnerability_id VCID-uw67-r9p5-j7bj
summary
Multiple vulnerabilities have been found in the Chromium web
    browser, the worst of which allows remote attackers to execute arbitrary
    code.
references
0
reference_url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0638.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0638.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1651.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1651.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1651
reference_id
reference_type
scores
0
value 0.01385
scoring_system epss
scoring_elements 0.80354
published_at 2026-04-21T12:55:00Z
1
value 0.01385
scoring_system epss
scoring_elements 0.80349
published_at 2026-04-18T12:55:00Z
2
value 0.01385
scoring_system epss
scoring_elements 0.80265
published_at 2026-04-01T12:55:00Z
3
value 0.01385
scoring_system epss
scoring_elements 0.80272
published_at 2026-04-02T12:55:00Z
4
value 0.01385
scoring_system epss
scoring_elements 0.80293
published_at 2026-04-04T12:55:00Z
5
value 0.01385
scoring_system epss
scoring_elements 0.80281
published_at 2026-04-07T12:55:00Z
6
value 0.01385
scoring_system epss
scoring_elements 0.80309
published_at 2026-04-08T12:55:00Z
7
value 0.01385
scoring_system epss
scoring_elements 0.80319
published_at 2026-04-09T12:55:00Z
8
value 0.01385
scoring_system epss
scoring_elements 0.80338
published_at 2026-04-11T12:55:00Z
9
value 0.01385
scoring_system epss
scoring_elements 0.80324
published_at 2026-04-12T12:55:00Z
10
value 0.01385
scoring_system epss
scoring_elements 0.80317
published_at 2026-04-13T12:55:00Z
11
value 0.01385
scoring_system epss
scoring_elements 0.80347
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1651
8
reference_url https://codereview.chromium.org/1837383011
reference_id
reference_type
scores
url https://codereview.chromium.org/1837383011
9
reference_url https://crbug.com/591785
reference_id
reference_type
scores
url https://crbug.com/591785
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1651
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1652
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1653
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1654
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1655
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1657
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1657
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1658
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1659
18
reference_url http://www.debian.org/security/2016/dsa-3549
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3549
19
reference_url http://zerodayinitiative.com/advisories/ZDI-16-243/
reference_id
reference_type
scores
url http://zerodayinitiative.com/advisories/ZDI-16-243/
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1327111
reference_id 1327111
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1327111
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1651
reference_id CVE-2016-1651
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:P
1
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-1651
26
reference_url https://security.gentoo.org/glsa/201605-02
reference_id GLSA-201605-02
reference_type
scores
url https://security.gentoo.org/glsa/201605-02
27
reference_url https://access.redhat.com/errata/RHSA-2016:0638
reference_id RHSA-2016:0638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0638
fixed_packages
0
url pkg:ebuild/www-client/chromium@50.0.2661.102
purl pkg:ebuild/www-client/chromium@50.0.2661.102
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/chromium@50.0.2661.102
aliases CVE-2016-1651
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uw67-r9p5-j7bj
23
url VCID-vax8-arng-hyhr
vulnerability_id VCID-vax8-arng-hyhr
summary
Multiple vulnerabilities have been found in the Chromium web
    browser, the worst of which allows remote attackers to execute arbitrary
    code.
references
0
reference_url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0707.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0707.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1661.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1661.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1661
reference_id
reference_type
scores
0
value 0.00995
scoring_system epss
scoring_elements 0.76971
published_at 2026-04-21T12:55:00Z
1
value 0.00995
scoring_system epss
scoring_elements 0.76976
published_at 2026-04-16T12:55:00Z
2
value 0.00995
scoring_system epss
scoring_elements 0.76979
published_at 2026-04-18T12:55:00Z
3
value 0.00995
scoring_system epss
scoring_elements 0.76871
published_at 2026-04-01T12:55:00Z
4
value 0.00995
scoring_system epss
scoring_elements 0.76877
published_at 2026-04-02T12:55:00Z
5
value 0.00995
scoring_system epss
scoring_elements 0.76908
published_at 2026-04-04T12:55:00Z
6
value 0.00995
scoring_system epss
scoring_elements 0.7689
published_at 2026-04-07T12:55:00Z
7
value 0.00995
scoring_system epss
scoring_elements 0.76922
published_at 2026-04-08T12:55:00Z
8
value 0.00995
scoring_system epss
scoring_elements 0.76932
published_at 2026-04-09T12:55:00Z
9
value 0.00995
scoring_system epss
scoring_elements 0.7696
published_at 2026-04-11T12:55:00Z
10
value 0.00995
scoring_system epss
scoring_elements 0.7694
published_at 2026-04-12T12:55:00Z
11
value 0.00995
scoring_system epss
scoring_elements 0.76935
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1661
8
reference_url https://codereview.chromium.org/1887553002/
reference_id
reference_type
scores
url https://codereview.chromium.org/1887553002/
9
reference_url https://crbug.com/601629
reference_id
reference_type
scores
url https://crbug.com/601629
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url http://www.debian.org/security/2016/dsa-3564
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3564
19
reference_url http://www.securityfocus.com/bid/89106
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/89106
20
reference_url http://www.ubuntu.com/usn/USN-2960-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2960-1
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1331636
reference_id 1331636
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1331636
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1661
reference_id CVE-2016-1661
reference_type
scores
0
value 8.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:C
1
value 8.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-1661
29
reference_url https://security.gentoo.org/glsa/201605-02
reference_id GLSA-201605-02
reference_type
scores
url https://security.gentoo.org/glsa/201605-02
30
reference_url https://access.redhat.com/errata/RHSA-2016:0707
reference_id RHSA-2016:0707
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0707
31
reference_url https://usn.ubuntu.com/2960-1/
reference_id USN-2960-1
reference_type
scores
url https://usn.ubuntu.com/2960-1/
fixed_packages
0
url pkg:ebuild/www-client/chromium@50.0.2661.102
purl pkg:ebuild/www-client/chromium@50.0.2661.102
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/chromium@50.0.2661.102
aliases CVE-2016-1661
risk_score 3.8
exploitability 0.5
weighted_severity 7.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vax8-arng-hyhr
24
url VCID-w2mq-dj46-6fah
vulnerability_id VCID-w2mq-dj46-6fah
summary
Multiple vulnerabilities have been found in the Chromium web
    browser, the worst of which allows remote attackers to execute arbitrary
    code.
references
0
reference_url http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_24.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2016/03/stable-channel-update_24.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00000.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00001.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00039.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00039.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2016-0525.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0525.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1648.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1648.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1648
reference_id
reference_type
scores
0
value 0.01948
scoring_system epss
scoring_elements 0.83493
published_at 2026-04-21T12:55:00Z
1
value 0.01948
scoring_system epss
scoring_elements 0.83491
published_at 2026-04-18T12:55:00Z
2
value 0.01948
scoring_system epss
scoring_elements 0.8339
published_at 2026-04-01T12:55:00Z
3
value 0.01948
scoring_system epss
scoring_elements 0.83402
published_at 2026-04-02T12:55:00Z
4
value 0.01948
scoring_system epss
scoring_elements 0.83417
published_at 2026-04-04T12:55:00Z
5
value 0.01948
scoring_system epss
scoring_elements 0.83416
published_at 2026-04-07T12:55:00Z
6
value 0.01948
scoring_system epss
scoring_elements 0.8344
published_at 2026-04-08T12:55:00Z
7
value 0.01948
scoring_system epss
scoring_elements 0.8345
published_at 2026-04-09T12:55:00Z
8
value 0.01948
scoring_system epss
scoring_elements 0.83465
published_at 2026-04-11T12:55:00Z
9
value 0.01948
scoring_system epss
scoring_elements 0.83459
published_at 2026-04-12T12:55:00Z
10
value 0.01948
scoring_system epss
scoring_elements 0.83454
published_at 2026-04-13T12:55:00Z
11
value 0.01948
scoring_system epss
scoring_elements 0.8349
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1648
7
reference_url https://code.google.com/p/chromium/issues/detail?id=590455
reference_id
reference_type
scores
url https://code.google.com/p/chromium/issues/detail?id=590455
8
reference_url https://codereview.chromium.org/1751553002/
reference_id
reference_type
scores
url https://codereview.chromium.org/1751553002/
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1646
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1647
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1647
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1648
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1649
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1650
14
reference_url http://www.debian.org/security/2016/dsa-3531
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3531
15
reference_url http://www.securitytracker.com/id/1035423
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035423
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1321814
reference_id 1321814
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1321814
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1648
reference_id CVE-2016-1648
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-1648
21
reference_url https://security.gentoo.org/glsa/201605-02
reference_id GLSA-201605-02
reference_type
scores
url https://security.gentoo.org/glsa/201605-02
22
reference_url https://access.redhat.com/errata/RHSA-2016:0525
reference_id RHSA-2016:0525
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0525
fixed_packages
0
url pkg:ebuild/www-client/chromium@50.0.2661.102
purl pkg:ebuild/www-client/chromium@50.0.2661.102
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/chromium@50.0.2661.102
aliases CVE-2016-1648
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w2mq-dj46-6fah
25
url VCID-z9hd-cdnj-mbfm
vulnerability_id VCID-z9hd-cdnj-mbfm
summary
Multiple vulnerabilities have been found in the Chromium web
    browser, the worst of which allows remote attackers to execute arbitrary
    code.
references
0
reference_url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-0707.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0707.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1666.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1666.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1666
reference_id
reference_type
scores
0
value 0.00777
scoring_system epss
scoring_elements 0.73679
published_at 2026-04-18T12:55:00Z
1
value 0.00777
scoring_system epss
scoring_elements 0.73626
published_at 2026-04-13T12:55:00Z
2
value 0.00777
scoring_system epss
scoring_elements 0.7367
published_at 2026-04-21T12:55:00Z
3
value 0.00777
scoring_system epss
scoring_elements 0.73576
published_at 2026-04-01T12:55:00Z
4
value 0.00777
scoring_system epss
scoring_elements 0.73585
published_at 2026-04-02T12:55:00Z
5
value 0.00777
scoring_system epss
scoring_elements 0.73608
published_at 2026-04-04T12:55:00Z
6
value 0.00777
scoring_system epss
scoring_elements 0.73581
published_at 2026-04-07T12:55:00Z
7
value 0.00777
scoring_system epss
scoring_elements 0.73617
published_at 2026-04-08T12:55:00Z
8
value 0.00777
scoring_system epss
scoring_elements 0.7363
published_at 2026-04-09T12:55:00Z
9
value 0.00777
scoring_system epss
scoring_elements 0.73652
published_at 2026-04-11T12:55:00Z
10
value 0.00777
scoring_system epss
scoring_elements 0.73635
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1666
8
reference_url https://bugs.chromium.org/p/chromium/issues/detail?id=601001
reference_id
reference_type
scores
url https://bugs.chromium.org/p/chromium/issues/detail?id=601001
9
reference_url https://bugs.chromium.org/p/chromium/issues/detail?id=605491
reference_id
reference_type
scores
url https://bugs.chromium.org/p/chromium/issues/detail?id=605491
10
reference_url https://crbug.com/607652
reference_id
reference_type
scores
url https://crbug.com/607652
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url http://www.debian.org/security/2016/dsa-3564
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3564
20
reference_url http://www.securityfocus.com/bid/89106
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/89106
21
reference_url http://www.ubuntu.com/usn/USN-2960-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2960-1
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1331642
reference_id 1331642
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1331642
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1666
reference_id CVE-2016-1666
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-1666
30
reference_url https://security.gentoo.org/glsa/201605-02
reference_id GLSA-201605-02
reference_type
scores
url https://security.gentoo.org/glsa/201605-02
31
reference_url https://access.redhat.com/errata/RHSA-2016:0707
reference_id RHSA-2016:0707
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0707
32
reference_url https://usn.ubuntu.com/2960-1/
reference_id USN-2960-1
reference_type
scores
url https://usn.ubuntu.com/2960-1/
fixed_packages
0
url pkg:ebuild/www-client/chromium@50.0.2661.102
purl pkg:ebuild/www-client/chromium@50.0.2661.102
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/chromium@50.0.2661.102
aliases CVE-2016-1666
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z9hd-cdnj-mbfm
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/chromium@50.0.2661.102