{"url":"http://public2.vulnerablecode.io/api/packages/113906?format=json","purl":"pkg:rpm/redhat/chromium-browser@53.0.2785.113-1?arch=el6","type":"rpm","namespace":"redhat","name":"chromium-browser","version":"53.0.2785.113-1","qualifiers":{"arch":"el6"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58991?format=json","vulnerability_id":"VCID-eayh-5hgj-27ag","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5170.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5170.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5170","reference_id":"","reference_type":"","scores":[{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74693","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74696","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74723","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74729","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74743","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74767","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74745","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74736","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74773","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74781","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74771","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74807","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74814","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74817","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5170"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5170","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5170"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5171","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5171"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5172","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5172"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5173","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5173"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5174","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5174"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5175","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5175"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7395","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7395"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7549","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7549"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1375863","reference_id":"1375863","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1375863"},{"reference_url":"https://security.gentoo.org/glsa/201610-09","reference_id":"GLSA-201610-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1905","reference_id":"RHSA-2016:1905","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1905"},{"reference_url":"https://usn.ubuntu.com/3091-1/","reference_id":"USN-3091-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3091-1/"}],"fixed_packages":[],"aliases":["CVE-2016-5170"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-eayh-5hgj-27ag"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58994?format=json","vulnerability_id":"VCID-gzch-hdy8-k3bk","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5173.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5173.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5173","reference_id":"","reference_type":"","scores":[{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.73058","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.73067","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.73088","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.73062","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.73099","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.73112","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.73137","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.73116","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.7311","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.73153","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.73163","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.73155","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.7319","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.73204","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00749","scoring_system":"epss","scoring_elements":"0.73203","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5173"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5170","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5170"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5171","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5171"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5172","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5172"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5173","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5173"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5174","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5174"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5175","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5175"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7395","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7395"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7549","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7549"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1375866","reference_id":"1375866","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1375866"},{"reference_url":"https://security.gentoo.org/glsa/201610-09","reference_id":"GLSA-201610-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1905","reference_id":"RHSA-2016:1905","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1905"}],"fixed_packages":[],"aliases":["CVE-2016-5173"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gzch-hdy8-k3bk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58995?format=json","vulnerability_id":"VCID-jz52-bdu9-abdr","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5174.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5174.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5174","reference_id":"","reference_type":"","scores":[{"value":"0.01131","scoring_system":"epss","scoring_elements":"0.78268","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01131","scoring_system":"epss","scoring_elements":"0.78276","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01131","scoring_system":"epss","scoring_elements":"0.78307","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01131","scoring_system":"epss","scoring_elements":"0.78289","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01131","scoring_system":"epss","scoring_elements":"0.78315","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01131","scoring_system":"epss","scoring_elements":"0.78321","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01131","scoring_system":"epss","scoring_elements":"0.78347","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01131","scoring_system":"epss","scoring_elements":"0.7833","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01131","scoring_system":"epss","scoring_elements":"0.78323","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01131","scoring_system":"epss","scoring_elements":"0.78352","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01131","scoring_system":"epss","scoring_elements":"0.78351","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01131","scoring_system":"epss","scoring_elements":"0.78348","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01131","scoring_system":"epss","scoring_elements":"0.78381","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01131","scoring_system":"epss","scoring_elements":"0.78388","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01131","scoring_system":"epss","scoring_elements":"0.78404","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5174"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5170","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5170"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5171","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5171"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5172","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5172"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5173","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5173"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5174","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5174"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5175","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5175"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7395","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7395"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7549","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7549"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1375867","reference_id":"1375867","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1375867"},{"reference_url":"https://security.gentoo.org/glsa/201610-09","reference_id":"GLSA-201610-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1905","reference_id":"RHSA-2016:1905","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1905"}],"fixed_packages":[],"aliases":["CVE-2016-5174"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jz52-bdu9-abdr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81633?format=json","vulnerability_id":"VCID-kmvx-wu7p-hqbh","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7549.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7549.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7549","reference_id":"","reference_type":"","scores":[{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75044","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75047","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75076","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75053","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75087","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75098","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75121","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75099","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75089","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75127","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75133","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75123","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75162","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75166","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75169","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7549"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5170","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5170"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5171","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5171"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5172","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5172"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5173","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5173"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5174","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5174"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5175","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5175"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7395","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7395"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7549","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7549"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1380301","reference_id":"1380301","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1380301"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1905","reference_id":"RHSA-2016:1905","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1905"},{"reference_url":"https://usn.ubuntu.com/3091-1/","reference_id":"USN-3091-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3091-1/"}],"fixed_packages":[],"aliases":["CVE-2016-7549"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kmvx-wu7p-hqbh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58992?format=json","vulnerability_id":"VCID-kwsd-uu8v-8ffd","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5171.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5171.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5171","reference_id":"","reference_type":"","scores":[{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74693","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74696","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74723","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74729","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74743","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74767","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74745","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74736","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74773","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74781","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74771","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74807","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74814","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00842","scoring_system":"epss","scoring_elements":"0.74817","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5171"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5170","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5170"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5171","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5171"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5172","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5172"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5173","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5173"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5174","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5174"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5175","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5175"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7395","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7395"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7549","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7549"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1375864","reference_id":"1375864","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1375864"},{"reference_url":"https://security.gentoo.org/glsa/201610-09","reference_id":"GLSA-201610-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1905","reference_id":"RHSA-2016:1905","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1905"},{"reference_url":"https://usn.ubuntu.com/3091-1/","reference_id":"USN-3091-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3091-1/"}],"fixed_packages":[],"aliases":["CVE-2016-5171"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kwsd-uu8v-8ffd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58993?format=json","vulnerability_id":"VCID-p7ny-49ph-3kbp","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5172.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5172.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5172","reference_id":"","reference_type":"","scores":[{"value":"0.0113","scoring_system":"epss","scoring_elements":"0.7826","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0113","scoring_system":"epss","scoring_elements":"0.78268","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0113","scoring_system":"epss","scoring_elements":"0.78299","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0113","scoring_system":"epss","scoring_elements":"0.78281","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0113","scoring_system":"epss","scoring_elements":"0.78307","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0113","scoring_system":"epss","scoring_elements":"0.78312","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0113","scoring_system":"epss","scoring_elements":"0.78339","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0113","scoring_system":"epss","scoring_elements":"0.78322","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0113","scoring_system":"epss","scoring_elements":"0.78315","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0113","scoring_system":"epss","scoring_elements":"0.78344","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0113","scoring_system":"epss","scoring_elements":"0.78342","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0113","scoring_system":"epss","scoring_elements":"0.78372","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0113","scoring_system":"epss","scoring_elements":"0.78379","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0113","scoring_system":"epss","scoring_elements":"0.78396","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5172"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5170","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5170"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5171","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5171"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5172","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5172"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5173","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5173"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5174","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5174"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5175","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5175"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7395","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7395"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7549","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7549"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1375865","reference_id":"1375865","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1375865"},{"reference_url":"https://security.gentoo.org/glsa/201610-09","reference_id":"GLSA-201610-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1905","reference_id":"RHSA-2016:1905","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1905"},{"reference_url":"https://usn.ubuntu.com/3091-1/","reference_id":"USN-3091-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3091-1/"}],"fixed_packages":[],"aliases":["CVE-2016-5172"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p7ny-49ph-3kbp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58996?format=json","vulnerability_id":"VCID-rjxh-tw1k-skc9","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5175.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5175.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5175","reference_id":"","reference_type":"","scores":[{"value":"0.005","scoring_system":"epss","scoring_elements":"0.65899","published_at":"2026-04-01T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.6594","published_at":"2026-04-02T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.6597","published_at":"2026-04-04T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.65936","published_at":"2026-04-07T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.65988","published_at":"2026-04-08T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.66","published_at":"2026-04-09T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.66018","published_at":"2026-04-11T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.66005","published_at":"2026-04-12T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.65975","published_at":"2026-04-13T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.66011","published_at":"2026-04-21T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.66025","published_at":"2026-04-18T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.66031","published_at":"2026-04-24T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.66042","published_at":"2026-04-26T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.66041","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5175"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5170","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5170"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5171","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5171"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5172","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5172"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5173","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5173"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5174","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5174"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5175","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5175"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7395","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7395"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7549","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7549"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1375868","reference_id":"1375868","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1375868"},{"reference_url":"https://security.gentoo.org/glsa/201610-09","reference_id":"GLSA-201610-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1905","reference_id":"RHSA-2016:1905","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1905"},{"reference_url":"https://usn.ubuntu.com/3091-1/","reference_id":"USN-3091-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3091-1/"}],"fixed_packages":[],"aliases":["CVE-2016-5175"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rjxh-tw1k-skc9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81631?format=json","vulnerability_id":"VCID-wzfk-28pz-pugd","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5176.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5176.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5176","reference_id":"","reference_type":"","scores":[{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43376","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43438","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43465","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43403","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43454","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43468","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43486","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43455","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.4344","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43499","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43488","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43423","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43354","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43358","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43281","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5170","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5170"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5171","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5171"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5172","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5172"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5173","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5173"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5174","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5174"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5175","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5175"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7395","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7395"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7549","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7549"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1380331","reference_id":"1380331","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1380331"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1905","reference_id":"RHSA-2016:1905","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1905"}],"fixed_packages":[],"aliases":["CVE-2016-5176"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wzfk-28pz-pugd"}],"fixing_vulnerabilities":[],"risk_score":"4.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/chromium-browser@53.0.2785.113-1%3Farch=el6"}