{"url":"http://public2.vulnerablecode.io/api/packages/112483?format=json","purl":"pkg:rpm/redhat/chromium-browser@59.0.3071.86-1?arch=el6_9","type":"rpm","namespace":"redhat","name":"chromium-browser","version":"59.0.3071.86-1","qualifiers":{"arch":"el6_9"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56225?format=json","vulnerability_id":"VCID-1r7m-ska1-bfaa","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5080.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5080.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5080","reference_id":"","reference_type":"","scores":[{"value":"0.00911","scoring_system":"epss","scoring_elements":"0.75766","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00911","scoring_system":"epss","scoring_elements":"0.75909","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00911","scoring_system":"epss","scoring_elements":"0.7585","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00911","scoring_system":"epss","scoring_elements":"0.75888","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00911","scoring_system":"epss","scoring_elements":"0.75897","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00911","scoring_system":"epss","scoring_elements":"0.75769","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00911","scoring_system":"epss","scoring_elements":"0.75802","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00911","scoring_system":"epss","scoring_elements":"0.75781","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00911","scoring_system":"epss","scoring_elements":"0.75813","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00911","scoring_system":"epss","scoring_elements":"0.75825","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00911","scoring_system":"epss","scoring_elements":"0.75849","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00911","scoring_system":"epss","scoring_elements":"0.7583","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00911","scoring_system":"epss","scoring_elements":"0.75824","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00911","scoring_system":"epss","scoring_elements":"0.75861","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00911","scoring_system":"epss","scoring_elements":"0.75865","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5080"},{"reference_url":"https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html","reference_id":"","reference_type":"","scores":[],"url":"https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html"},{"reference_url":"https://crbug.com/708819","reference_id":"","reference_type":"","scores":[],"url":"https://crbug.com/708819"},{"reference_url":"http://www.securityfocus.com/bid/98861","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/98861"},{"reference_url":"http://www.securitytracker.com/id/1038622","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1038622"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1459033","reference_id":"1459033","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1459033"},{"reference_url":"https://security.archlinux.org/ASA-201706-8","reference_id":"ASA-201706-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201706-8"},{"reference_url":"https://security.archlinux.org/AVG-289","reference_id":"AVG-289","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-289"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5080","reference_id":"CVE-2017-5080","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5080"},{"reference_url":"https://security.gentoo.org/glsa/201706-20","reference_id":"GLSA-201706-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201706-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1399","reference_id":"RHSA-2017:1399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1399"}],"fixed_packages":[],"aliases":["CVE-2017-5080"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1r7m-ska1-bfaa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56219?format=json","vulnerability_id":"VCID-52ha-efrd-bkbu","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5074.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5074.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5074","reference_id":"","reference_type":"","scores":[{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62086","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62256","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62236","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62246","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62263","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62147","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62178","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62146","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62196","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62214","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62231","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62221","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.622","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62245","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62252","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5074"},{"reference_url":"https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html","reference_id":"","reference_type":"","scores":[],"url":"https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html"},{"reference_url":"https://crbug.com/700040","reference_id":"","reference_type":"","scores":[],"url":"https://crbug.com/700040"},{"reference_url":"http://www.securityfocus.com/bid/98861","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/98861"},{"reference_url":"http://www.securitytracker.com/id/1038622","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1038622"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1459025","reference_id":"1459025","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1459025"},{"reference_url":"https://security.archlinux.org/ASA-201706-8","reference_id":"ASA-201706-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201706-8"},{"reference_url":"https://security.archlinux.org/AVG-289","reference_id":"AVG-289","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-289"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5074","reference_id":"CVE-2017-5074","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv2","scoring_elements":"AV:A/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5074"},{"reference_url":"https://security.gentoo.org/glsa/201706-20","reference_id":"GLSA-201706-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201706-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1399","reference_id":"RHSA-2017:1399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1399"}],"fixed_packages":[],"aliases":["CVE-2017-5074"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-52ha-efrd-bkbu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56222?format=json","vulnerability_id":"VCID-5xy6-dfr2-f3gq","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5077.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5077.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5077","reference_id":"","reference_type":"","scores":[{"value":"0.00858","scoring_system":"epss","scoring_elements":"0.74955","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00858","scoring_system":"epss","scoring_elements":"0.75077","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00858","scoring_system":"epss","scoring_elements":"0.75031","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00858","scoring_system":"epss","scoring_elements":"0.75069","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00858","scoring_system":"epss","scoring_elements":"0.75074","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00858","scoring_system":"epss","scoring_elements":"0.74958","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00858","scoring_system":"epss","scoring_elements":"0.74987","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00858","scoring_system":"epss","scoring_elements":"0.74962","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00858","scoring_system":"epss","scoring_elements":"0.74996","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00858","scoring_system":"epss","scoring_elements":"0.75008","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00858","scoring_system":"epss","scoring_elements":"0.7503","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00858","scoring_system":"epss","scoring_elements":"0.75009","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00858","scoring_system":"epss","scoring_elements":"0.74998","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00858","scoring_system":"epss","scoring_elements":"0.75034","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00858","scoring_system":"epss","scoring_elements":"0.75042","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5077"},{"reference_url":"https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html","reference_id":"","reference_type":"","scores":[],"url":"https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html"},{"reference_url":"https://crbug.com/716311","reference_id":"","reference_type":"","scores":[],"url":"https://crbug.com/716311"},{"reference_url":"http://www.securityfocus.com/bid/98861","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/98861"},{"reference_url":"http://www.securitytracker.com/id/1038622","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1038622"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1459030","reference_id":"1459030","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1459030"},{"reference_url":"https://security.archlinux.org/ASA-201706-8","reference_id":"ASA-201706-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201706-8"},{"reference_url":"https://security.archlinux.org/AVG-289","reference_id":"AVG-289","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-289"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5077","reference_id":"CVE-2017-5077","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5077"},{"reference_url":"https://security.gentoo.org/glsa/201706-20","reference_id":"GLSA-201706-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201706-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1399","reference_id":"RHSA-2017:1399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1399"}],"fixed_packages":[],"aliases":["CVE-2017-5077"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5xy6-dfr2-f3gq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56221?format=json","vulnerability_id":"VCID-7add-jzbk-cba6","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5076.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5076.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5076","reference_id":"","reference_type":"","scores":[{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71215","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71357","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71294","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71347","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71353","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71224","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71242","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71216","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71258","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71273","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71295","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.7128","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71264","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.7131","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71316","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5076"},{"reference_url":"https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html","reference_id":"","reference_type":"","scores":[],"url":"https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html"},{"reference_url":"https://crbug.com/719199","reference_id":"","reference_type":"","scores":[],"url":"https://crbug.com/719199"},{"reference_url":"http://www.securityfocus.com/bid/98861","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/98861"},{"reference_url":"http://www.securitytracker.com/id/1038622","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1038622"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1459029","reference_id":"1459029","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1459029"},{"reference_url":"https://security.archlinux.org/ASA-201706-8","reference_id":"ASA-201706-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201706-8"},{"reference_url":"https://security.archlinux.org/AVG-289","reference_id":"AVG-289","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-289"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5076","reference_id":"CVE-2017-5076","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"},{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5076"},{"reference_url":"https://security.gentoo.org/glsa/201706-20","reference_id":"GLSA-201706-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201706-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1399","reference_id":"RHSA-2017:1399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1399"}],"fixed_packages":[],"aliases":["CVE-2017-5076"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7add-jzbk-cba6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56226?format=json","vulnerability_id":"VCID-89ws-643e-ayd1","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5081.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5081.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5081","reference_id":"","reference_type":"","scores":[{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0679","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0699","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07041","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07024","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07026","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06872","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06922","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06905","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0696","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06992","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06996","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06988","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06983","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06921","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5081"},{"reference_url":"https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html","reference_id":"","reference_type":"","scores":[],"url":"https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html"},{"reference_url":"https://crbug.com/672008","reference_id":"","reference_type":"","scores":[],"url":"https://crbug.com/672008"},{"reference_url":"http://www.securityfocus.com/bid/98861","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/98861"},{"reference_url":"http://www.securitytracker.com/id/1038622","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1038622"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1459034","reference_id":"1459034","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1459034"},{"reference_url":"https://security.archlinux.org/ASA-201706-8","reference_id":"ASA-201706-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201706-8"},{"reference_url":"https://security.archlinux.org/AVG-289","reference_id":"AVG-289","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-289"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5081","reference_id":"CVE-2017-5081","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:P/A:N"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5081"},{"reference_url":"https://security.gentoo.org/glsa/201706-20","reference_id":"GLSA-201706-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201706-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1399","reference_id":"RHSA-2017:1399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1399"}],"fixed_packages":[],"aliases":["CVE-2017-5081"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-89ws-643e-ayd1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56217?format=json","vulnerability_id":"VCID-b75z-83fg-vyea","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5072.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5072.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5072","reference_id":"","reference_type":"","scores":[{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.66852","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.66989","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.66956","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.66978","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.66991","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.6689","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.66916","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.66938","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.66952","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.66972","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.66958","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.66927","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.6696","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.66974","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5072"},{"reference_url":"https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html","reference_id":"","reference_type":"","scores":[],"url":"https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html"},{"reference_url":"https://crbug.com/709417","reference_id":"","reference_type":"","scores":[],"url":"https://crbug.com/709417"},{"reference_url":"http://www.securityfocus.com/bid/98861","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/98861"},{"reference_url":"http://www.securitytracker.com/id/1038622","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1038622"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1459023","reference_id":"1459023","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1459023"},{"reference_url":"https://security.archlinux.org/ASA-201706-8","reference_id":"ASA-201706-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201706-8"},{"reference_url":"https://security.archlinux.org/AVG-289","reference_id":"AVG-289","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-289"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5072","reference_id":"CVE-2017-5072","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5072"},{"reference_url":"https://security.gentoo.org/glsa/201706-20","reference_id":"GLSA-201706-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201706-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1399","reference_id":"RHSA-2017:1399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1399"}],"fixed_packages":[],"aliases":["CVE-2017-5072"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b75z-83fg-vyea"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56215?format=json","vulnerability_id":"VCID-kzw1-g1pw-bug3","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5070.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5070.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5070","reference_id":"","reference_type":"","scores":[{"value":"0.71096","scoring_system":"epss","scoring_elements":"0.98711","published_at":"2026-04-16T12:55:00Z"},{"value":"0.71096","scoring_system":"epss","scoring_elements":"0.98697","published_at":"2026-04-02T12:55:00Z"},{"value":"0.71096","scoring_system":"epss","scoring_elements":"0.98701","published_at":"2026-04-04T12:55:00Z"},{"value":"0.71096","scoring_system":"epss","scoring_elements":"0.98708","published_at":"2026-04-12T12:55:00Z"},{"value":"0.71096","scoring_system":"epss","scoring_elements":"0.98705","published_at":"2026-04-09T12:55:00Z"},{"value":"0.71096","scoring_system":"epss","scoring_elements":"0.98704","published_at":"2026-04-07T12:55:00Z"},{"value":"0.71096","scoring_system":"epss","scoring_elements":"0.98709","published_at":"2026-04-13T12:55:00Z"},{"value":"0.71096","scoring_system":"epss","scoring_elements":"0.98696","published_at":"2026-04-01T12:55:00Z"},{"value":"0.71096","scoring_system":"epss","scoring_elements":"0.98713","published_at":"2026-04-21T12:55:00Z"},{"value":"0.74378","scoring_system":"epss","scoring_elements":"0.98857","published_at":"2026-04-26T12:55:00Z"},{"value":"0.74378","scoring_system":"epss","scoring_elements":"0.98858","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5070"},{"reference_url":"https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:17:23Z/"}],"url":"https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html"},{"reference_url":"https://crbug.com/722756","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:17:23Z/"}],"url":"https://crbug.com/722756"},{"reference_url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-5070","reference_id":"","reference_type":"","scores":[],"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-5070"},{"reference_url":"http://www.securityfocus.com/bid/98861","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:17:23Z/"}],"url":"http://www.securityfocus.com/bid/98861"},{"reference_url":"http://www.securitytracker.com/id/1038622","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:17:23Z/"}],"url":"http://www.securitytracker.com/id/1038622"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1459021","reference_id":"1459021","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1459021"},{"reference_url":"https://security.archlinux.org/ASA-201706-8","reference_id":"ASA-201706-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201706-8"},{"reference_url":"https://security.archlinux.org/AVG-289","reference_id":"AVG-289","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-289"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5070","reference_id":"CVE-2017-5070","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5070"},{"reference_url":"https://security.gentoo.org/glsa/201706-20","reference_id":"GLSA-201706-20","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:17:23Z/"}],"url":"https://security.gentoo.org/glsa/201706-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1399","reference_id":"RHSA-2017:1399","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:17:23Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:1399"}],"fixed_packages":[],"aliases":["CVE-2017-5070"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kzw1-g1pw-bug3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56230?format=json","vulnerability_id":"VCID-pmhx-wy5d-buaz","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5085.json","reference_id":"","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5085.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5085","reference_id":"","reference_type":"","scores":[{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63243","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63378","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63348","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63367","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.6338","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63302","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63329","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63295","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63346","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63364","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63381","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63365","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63328","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63363","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.6337","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5085"},{"reference_url":"https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html","reference_id":"","reference_type":"","scores":[],"url":"https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html"},{"reference_url":"https://crbug.com/692378","reference_id":"","reference_type":"","scores":[],"url":"https://crbug.com/692378"},{"reference_url":"http://www.securityfocus.com/bid/98861","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/98861"},{"reference_url":"http://www.securitytracker.com/id/1038622","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1038622"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1459037","reference_id":"1459037","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1459037"},{"reference_url":"https://security.archlinux.org/ASA-201706-8","reference_id":"ASA-201706-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201706-8"},{"reference_url":"https://security.archlinux.org/AVG-289","reference_id":"AVG-289","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-289"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:chrome:58.0.3029:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:google:chrome:58.0.3029:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:chrome:58.0.3029:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5085","reference_id":"CVE-2017-5085","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"},{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5085"},{"reference_url":"https://security.gentoo.org/glsa/201706-20","reference_id":"GLSA-201706-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201706-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1399","reference_id":"RHSA-2017:1399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1399"}],"fixed_packages":[],"aliases":["CVE-2017-5085"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pmhx-wy5d-buaz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56231?format=json","vulnerability_id":"VCID-ppke-xzq1-nyac","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5086.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5086.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5086","reference_id":"","reference_type":"","scores":[{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71215","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71357","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71294","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71347","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71353","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71224","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71242","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71216","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71258","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71273","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71295","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.7128","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71264","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.7131","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71316","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5086"},{"reference_url":"https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html","reference_id":"","reference_type":"","scores":[],"url":"https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html"},{"reference_url":"https://crbug.com/722639","reference_id":"","reference_type":"","scores":[],"url":"https://crbug.com/722639"},{"reference_url":"http://www.securityfocus.com/bid/98861","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/98861"},{"reference_url":"http://www.securitytracker.com/id/1038622","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1038622"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1459028","reference_id":"1459028","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1459028"},{"reference_url":"https://security.archlinux.org/ASA-201706-8","reference_id":"ASA-201706-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201706-8"},{"reference_url":"https://security.archlinux.org/AVG-289","reference_id":"AVG-289","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-289"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5086","reference_id":"CVE-2017-5086","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"},{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5086"},{"reference_url":"https://security.gentoo.org/glsa/201706-20","reference_id":"GLSA-201706-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201706-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1399","reference_id":"RHSA-2017:1399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1399"}],"fixed_packages":[],"aliases":["CVE-2017-5086"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ppke-xzq1-nyac"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56223?format=json","vulnerability_id":"VCID-qdh5-dwpk-13bp","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5078.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5078.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5078","reference_id":"","reference_type":"","scores":[{"value":"0.027","scoring_system":"epss","scoring_elements":"0.85811","published_at":"2026-04-01T12:55:00Z"},{"value":"0.027","scoring_system":"epss","scoring_elements":"0.85925","published_at":"2026-04-29T12:55:00Z"},{"value":"0.027","scoring_system":"epss","scoring_elements":"0.85894","published_at":"2026-04-21T12:55:00Z"},{"value":"0.027","scoring_system":"epss","scoring_elements":"0.85915","published_at":"2026-04-24T12:55:00Z"},{"value":"0.027","scoring_system":"epss","scoring_elements":"0.85924","published_at":"2026-04-26T12:55:00Z"},{"value":"0.027","scoring_system":"epss","scoring_elements":"0.85822","published_at":"2026-04-02T12:55:00Z"},{"value":"0.027","scoring_system":"epss","scoring_elements":"0.8584","published_at":"2026-04-04T12:55:00Z"},{"value":"0.027","scoring_system":"epss","scoring_elements":"0.85844","published_at":"2026-04-07T12:55:00Z"},{"value":"0.027","scoring_system":"epss","scoring_elements":"0.85862","published_at":"2026-04-08T12:55:00Z"},{"value":"0.027","scoring_system":"epss","scoring_elements":"0.85872","published_at":"2026-04-09T12:55:00Z"},{"value":"0.027","scoring_system":"epss","scoring_elements":"0.85887","published_at":"2026-04-11T12:55:00Z"},{"value":"0.027","scoring_system":"epss","scoring_elements":"0.85884","published_at":"2026-04-12T12:55:00Z"},{"value":"0.027","scoring_system":"epss","scoring_elements":"0.85879","published_at":"2026-04-13T12:55:00Z"},{"value":"0.027","scoring_system":"epss","scoring_elements":"0.85898","published_at":"2026-04-16T12:55:00Z"},{"value":"0.027","scoring_system":"epss","scoring_elements":"0.85902","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5078"},{"reference_url":"https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html","reference_id":"","reference_type":"","scores":[],"url":"https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html"},{"reference_url":"https://crbug.com/711020","reference_id":"","reference_type":"","scores":[],"url":"https://crbug.com/711020"},{"reference_url":"http://www.securityfocus.com/bid/98861","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/98861"},{"reference_url":"http://www.securitytracker.com/id/1038622","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1038622"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1459031","reference_id":"1459031","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1459031"},{"reference_url":"https://security.archlinux.org/ASA-201706-8","reference_id":"ASA-201706-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201706-8"},{"reference_url":"https://security.archlinux.org/AVG-289","reference_id":"AVG-289","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-289"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5078","reference_id":"CVE-2017-5078","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5078"},{"reference_url":"https://security.gentoo.org/glsa/201706-20","reference_id":"GLSA-201706-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201706-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1399","reference_id":"RHSA-2017:1399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1399"}],"fixed_packages":[],"aliases":["CVE-2017-5078"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qdh5-dwpk-13bp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56227?format=json","vulnerability_id":"VCID-qetz-xrku-87fe","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5082.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5082.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5082","reference_id":"","reference_type":"","scores":[{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12948","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.1279","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12907","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12931","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12896","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.1304","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.13092","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12894","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12974","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.13025","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12987","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.1295","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12905","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12806","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12808","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5082"},{"reference_url":"https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html","reference_id":"","reference_type":"","scores":[],"url":"https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html"},{"reference_url":"https://crbug.com/721579","reference_id":"","reference_type":"","scores":[],"url":"https://crbug.com/721579"},{"reference_url":"https://wwws.nightwatchcybersecurity.com/2017/07/27/chrome-for-android-didnt-use-flag_secure-for-credit-card-prefill-settings-cve-2017-5082/","reference_id":"","reference_type":"","scores":[],"url":"https://wwws.nightwatchcybersecurity.com/2017/07/27/chrome-for-android-didnt-use-flag_secure-for-credit-card-prefill-settings-cve-2017-5082/"},{"reference_url":"http://www.securityfocus.com/bid/98861","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/98861"},{"reference_url":"http://www.securitytracker.com/id/1038622","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1038622"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1459035","reference_id":"1459035","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1459035"},{"reference_url":"https://security.archlinux.org/ASA-201706-8","reference_id":"ASA-201706-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201706-8"},{"reference_url":"https://security.archlinux.org/AVG-289","reference_id":"AVG-289","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-289"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5082","reference_id":"CVE-2017-5082","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:N/A:N"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5082"},{"reference_url":"https://security.gentoo.org/glsa/201706-20","reference_id":"GLSA-201706-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201706-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1399","reference_id":"RHSA-2017:1399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1399"}],"fixed_packages":[],"aliases":["CVE-2017-5082"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qetz-xrku-87fe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56216?format=json","vulnerability_id":"VCID-qqm4-enbx-sqas","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5071.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5071.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5071","reference_id":"","reference_type":"","scores":[{"value":"0.00736","scoring_system":"epss","scoring_elements":"0.7276","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00736","scoring_system":"epss","scoring_elements":"0.72909","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00736","scoring_system":"epss","scoring_elements":"0.72859","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00736","scoring_system":"epss","scoring_elements":"0.729","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00736","scoring_system":"epss","scoring_elements":"0.7291","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00736","scoring_system":"epss","scoring_elements":"0.72768","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00736","scoring_system":"epss","scoring_elements":"0.72788","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00736","scoring_system":"epss","scoring_elements":"0.72764","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00736","scoring_system":"epss","scoring_elements":"0.72802","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00736","scoring_system":"epss","scoring_elements":"0.72816","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00736","scoring_system":"epss","scoring_elements":"0.72841","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00736","scoring_system":"epss","scoring_elements":"0.72824","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00736","scoring_system":"epss","scoring_elements":"0.72815","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00736","scoring_system":"epss","scoring_elements":"0.72857","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00736","scoring_system":"epss","scoring_elements":"0.72867","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5071"},{"reference_url":"https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html","reference_id":"","reference_type":"","scores":[],"url":"https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html"},{"reference_url":"https://crbug.com/715582","reference_id":"","reference_type":"","scores":[],"url":"https://crbug.com/715582"},{"reference_url":"http://www.securityfocus.com/bid/98861","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/98861"},{"reference_url":"http://www.securitytracker.com/id/1038622","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1038622"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1459022","reference_id":"1459022","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1459022"},{"reference_url":"https://security.archlinux.org/ASA-201706-8","reference_id":"ASA-201706-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201706-8"},{"reference_url":"https://security.archlinux.org/AVG-289","reference_id":"AVG-289","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-289"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5071","reference_id":"CVE-2017-5071","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5071"},{"reference_url":"https://security.gentoo.org/glsa/201706-20","reference_id":"GLSA-201706-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201706-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1399","reference_id":"RHSA-2017:1399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1399"}],"fixed_packages":[],"aliases":["CVE-2017-5071"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qqm4-enbx-sqas"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56220?format=json","vulnerability_id":"VCID-tjyu-bwcu-jbbu","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5075.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5075.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5075","reference_id":"","reference_type":"","scores":[{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71205","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71348","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71285","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71338","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71344","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71214","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71233","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71208","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.7125","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71264","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71287","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71271","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71255","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71301","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71307","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5075"},{"reference_url":"https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html","reference_id":"","reference_type":"","scores":[],"url":"https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html"},{"reference_url":"https://crbug.com/678776","reference_id":"","reference_type":"","scores":[],"url":"https://crbug.com/678776"},{"reference_url":"http://www.securityfocus.com/bid/98861","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/98861"},{"reference_url":"http://www.securitytracker.com/id/1038622","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1038622"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1459027","reference_id":"1459027","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1459027"},{"reference_url":"https://security.archlinux.org/ASA-201706-8","reference_id":"ASA-201706-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201706-8"},{"reference_url":"https://security.archlinux.org/AVG-289","reference_id":"AVG-289","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-289"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5075","reference_id":"CVE-2017-5075","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"},{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5075"},{"reference_url":"https://security.gentoo.org/glsa/201706-20","reference_id":"GLSA-201706-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201706-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1399","reference_id":"RHSA-2017:1399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1399"}],"fixed_packages":[],"aliases":["CVE-2017-5075"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tjyu-bwcu-jbbu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56228?format=json","vulnerability_id":"VCID-vjp1-xjzc-fbh7","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5083.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5083.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5083","reference_id":"","reference_type":"","scores":[{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71215","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71357","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71294","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71347","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71353","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71224","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71242","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71216","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71258","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71273","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71295","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.7128","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71264","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.7131","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71316","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5083"},{"reference_url":"https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html","reference_id":"","reference_type":"","scores":[],"url":"https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html"},{"reference_url":"https://crbug.com/714849","reference_id":"","reference_type":"","scores":[],"url":"https://crbug.com/714849"},{"reference_url":"http://www.securityfocus.com/bid/98861","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/98861"},{"reference_url":"http://www.securitytracker.com/id/1038622","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1038622"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1459036","reference_id":"1459036","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1459036"},{"reference_url":"https://security.archlinux.org/ASA-201706-8","reference_id":"ASA-201706-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201706-8"},{"reference_url":"https://security.archlinux.org/AVG-289","reference_id":"AVG-289","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-289"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5083","reference_id":"CVE-2017-5083","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"},{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5083"},{"reference_url":"https://security.gentoo.org/glsa/201706-20","reference_id":"GLSA-201706-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201706-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1399","reference_id":"RHSA-2017:1399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1399"}],"fixed_packages":[],"aliases":["CVE-2017-5083"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vjp1-xjzc-fbh7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56224?format=json","vulnerability_id":"VCID-wd3v-zk8f-5fgh","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5079.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5079.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5079","reference_id":"","reference_type":"","scores":[{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71215","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71357","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71294","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71347","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71353","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71224","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71242","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71216","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71258","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71273","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71295","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.7128","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71264","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.7131","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71316","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5079"},{"reference_url":"https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html","reference_id":"","reference_type":"","scores":[],"url":"https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html"},{"reference_url":"https://crbug.com/713686","reference_id":"","reference_type":"","scores":[],"url":"https://crbug.com/713686"},{"reference_url":"http://www.securityfocus.com/bid/98861","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/98861"},{"reference_url":"http://www.securitytracker.com/id/1038622","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1038622"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1459032","reference_id":"1459032","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1459032"},{"reference_url":"https://security.archlinux.org/ASA-201706-8","reference_id":"ASA-201706-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201706-8"},{"reference_url":"https://security.archlinux.org/AVG-289","reference_id":"AVG-289","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-289"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5079","reference_id":"CVE-2017-5079","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"},{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5079"},{"reference_url":"https://security.gentoo.org/glsa/201706-20","reference_id":"GLSA-201706-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201706-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1399","reference_id":"RHSA-2017:1399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1399"}],"fixed_packages":[],"aliases":["CVE-2017-5079"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wd3v-zk8f-5fgh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56218?format=json","vulnerability_id":"VCID-yz5a-929h-jufn","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5073.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5073.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5073","reference_id":"","reference_type":"","scores":[{"value":"0.00858","scoring_system":"epss","scoring_elements":"0.74955","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00858","scoring_system":"epss","scoring_elements":"0.75077","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00858","scoring_system":"epss","scoring_elements":"0.75031","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00858","scoring_system":"epss","scoring_elements":"0.75069","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00858","scoring_system":"epss","scoring_elements":"0.75074","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00858","scoring_system":"epss","scoring_elements":"0.74958","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00858","scoring_system":"epss","scoring_elements":"0.74987","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00858","scoring_system":"epss","scoring_elements":"0.74962","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00858","scoring_system":"epss","scoring_elements":"0.74996","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00858","scoring_system":"epss","scoring_elements":"0.75008","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00858","scoring_system":"epss","scoring_elements":"0.7503","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00858","scoring_system":"epss","scoring_elements":"0.75009","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00858","scoring_system":"epss","scoring_elements":"0.74998","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00858","scoring_system":"epss","scoring_elements":"0.75034","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00858","scoring_system":"epss","scoring_elements":"0.75042","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5073"},{"reference_url":"https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html","reference_id":"","reference_type":"","scores":[],"url":"https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html"},{"reference_url":"https://crbug.com/716474","reference_id":"","reference_type":"","scores":[],"url":"https://crbug.com/716474"},{"reference_url":"http://www.securityfocus.com/bid/98861","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/98861"},{"reference_url":"http://www.securitytracker.com/id/1038622","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1038622"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1459024","reference_id":"1459024","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1459024"},{"reference_url":"https://security.archlinux.org/ASA-201706-8","reference_id":"ASA-201706-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201706-8"},{"reference_url":"https://security.archlinux.org/AVG-289","reference_id":"AVG-289","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-289"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5073","reference_id":"CVE-2017-5073","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5073"},{"reference_url":"https://security.gentoo.org/glsa/201706-20","reference_id":"GLSA-201706-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201706-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1399","reference_id":"RHSA-2017:1399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1399"}],"fixed_packages":[],"aliases":["CVE-2017-5073"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yz5a-929h-jufn"}],"fixing_vulnerabilities":[],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/chromium-browser@59.0.3071.86-1%3Farch=el6_9"}