{"url":"http://public2.vulnerablecode.io/api/packages/114505?format=json","purl":"pkg:rpm/redhat/chromium-browser@52.0.2743.82-1?arch=el6","type":"rpm","namespace":"redhat","name":"chromium-browser","version":"52.0.2743.82-1","qualifiers":{"arch":"el6"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81416?format=json","vulnerability_id":"VCID-3k8j-c39d-r3ee","summary":"security update","references":[{"reference_url":"http://crbug.com/590619","reference_id":"","reference_type":"","scores":[],"url":"http://crbug.com/590619"},{"reference_url":"http://crbug.com/599458","reference_id":"","reference_type":"","scores":[],"url":"http://crbug.com/599458"},{"reference_url":"http://crbug.com/600953","reference_id":"","reference_type":"","scores":[],"url":"http://crbug.com/600953"},{"reference_url":"http://crbug.com/609286","reference_id":"","reference_type":"","scores":[],"url":"http://crbug.com/609286"},{"reference_url":"http://crbug.com/611959","reference_id":"","reference_type":"","scores":[],"url":"http://crbug.com/611959"},{"reference_url":"http://crbug.com/612939","reference_id":"","reference_type":"","scores":[],"url":"http://crbug.com/612939"},{"reference_url":"http://crbug.com/613869","reference_id":"","reference_type":"","scores":[],"url":"http://crbug.com/613869"},{"reference_url":"http://crbug.com/613971","reference_id":"","reference_type":"","scores":[],"url":"http://crbug.com/613971"},{"reference_url":"http://crbug.com/614405","reference_id":"","reference_type":"","scores":[],"url":"http://crbug.com/614405"},{"reference_url":"http://crbug.com/614701","reference_id":"","reference_type":"","scores":[],"url":"http://crbug.com/614701"},{"reference_url":"http://crbug.com/614989","reference_id":"","reference_type":"","scores":[],"url":"http://crbug.com/614989"},{"reference_url":"http://crbug.com/615820","reference_id":"","reference_type":"","scores":[],"url":"http://crbug.com/615820"},{"reference_url":"http://crbug.com/619378","reference_id":"","reference_type":"","scores":[],"url":"http://crbug.com/619378"},{"reference_url":"http://crbug.com/619382","reference_id":"","reference_type":"","scores":[],"url":"http://crbug.com/619382"},{"reference_url":"http://crbug.com/620694","reference_id":"","reference_type":"","scores":[],"url":"http://crbug.com/620694"},{"reference_url":"http://crbug.com/620737","reference_id":"","reference_type":"","scores":[],"url":"http://crbug.com/620737"},{"reference_url":"http://crbug.com/620858","reference_id":"","reference_type":"","scores":[],"url":"http://crbug.com/620858"},{"reference_url":"http://crbug.com/620952","reference_id":"","reference_type":"","scores":[],"url":"http://crbug.com/620952"},{"reference_url":"http://crbug.com/621843","reference_id":"","reference_type":"","scores":[],"url":"http://crbug.com/621843"},{"reference_url":"http://crbug.com/622522","reference_id":"","reference_type":"","scores":[],"url":"http://crbug.com/622522"},{"reference_url":"http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1485.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1485.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1705.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1705.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1705","reference_id":"","reference_type":"","scores":[{"value":"0.00621","scoring_system":"epss","scoring_elements":"0.70002","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00621","scoring_system":"epss","scoring_elements":"0.70261","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00621","scoring_system":"epss","scoring_elements":"0.702","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00621","scoring_system":"epss","scoring_elements":"0.70251","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00621","scoring_system":"epss","scoring_elements":"0.70015","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00621","scoring_system":"epss","scoring_elements":"0.70029","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00621","scoring_system":"epss","scoring_elements":"0.70006","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00621","scoring_system":"epss","scoring_elements":"0.70054","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00621","scoring_system":"epss","scoring_elements":"0.7007","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00621","scoring_system":"epss","scoring_elements":"0.70093","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00621","scoring_system":"epss","scoring_elements":"0.70078","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00621","scoring_system":"epss","scoring_elements":"0.70065","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00621","scoring_system":"epss","scoring_elements":"0.70108","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00621","scoring_system":"epss","scoring_elements":"0.70117","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00621","scoring_system":"epss","scoring_elements":"0.70097","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00621","scoring_system":"epss","scoring_elements":"0.70149","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00621","scoring_system":"epss","scoring_elements":"0.70156","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00621","scoring_system":"epss","scoring_elements":"0.70132","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00621","scoring_system":"epss","scoring_elements":"0.70174","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00621","scoring_system":"epss","scoring_elements":"0.70204","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00621","scoring_system":"epss","scoring_elements":"0.70173","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1705"},{"reference_url":"https://crbug.com/629852","reference_id":"","reference_type":"","scores":[],"url":"https://crbug.com/629852"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137"},{"reference_url":"http://www.debian.org/security/2016/dsa-3637","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3637"},{"reference_url":"http://www.securityfocus.com/bid/92053","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/92053"},{"reference_url":"http://www.securitytracker.com/id/1036428","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036428"},{"reference_url":"http://www.ubuntu.com/usn/USN-3041-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-3041-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358649","reference_id":"1358649","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358649"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1705","reference_id":"CVE-2016-1705","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1485","reference_id":"RHSA-2016:1485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1485"},{"reference_url":"https://usn.ubuntu.com/3041-1/","reference_id":"USN-3041-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3041-1/"}],"fixed_packages":[],"aliases":["CVE-2016-1705"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3k8j-c39d-r3ee"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58947?format=json","vulnerability_id":"VCID-4nqh-txx3-6qd5","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1485.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1485.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5136.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5136.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5136","reference_id":"","reference_type":"","scores":[{"value":"0.01987","scoring_system":"epss","scoring_elements":"0.83531","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01987","scoring_system":"epss","scoring_elements":"0.83787","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01987","scoring_system":"epss","scoring_elements":"0.83742","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01987","scoring_system":"epss","scoring_elements":"0.83777","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01987","scoring_system":"epss","scoring_elements":"0.83543","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01987","scoring_system":"epss","scoring_elements":"0.83558","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01987","scoring_system":"epss","scoring_elements":"0.83559","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01987","scoring_system":"epss","scoring_elements":"0.83583","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01987","scoring_system":"epss","scoring_elements":"0.83592","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01987","scoring_system":"epss","scoring_elements":"0.83607","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01987","scoring_system":"epss","scoring_elements":"0.836","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01987","scoring_system":"epss","scoring_elements":"0.83596","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01987","scoring_system":"epss","scoring_elements":"0.83631","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01987","scoring_system":"epss","scoring_elements":"0.83632","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01987","scoring_system":"epss","scoring_elements":"0.83656","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01987","scoring_system":"epss","scoring_elements":"0.83663","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01987","scoring_system":"epss","scoring_elements":"0.83666","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01987","scoring_system":"epss","scoring_elements":"0.83689","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01987","scoring_system":"epss","scoring_elements":"0.83709","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01987","scoring_system":"epss","scoring_elements":"0.83725","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01987","scoring_system":"epss","scoring_elements":"0.83726","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5136"},{"reference_url":"https://codereview.chromium.org/2116923002/","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/2116923002/"},{"reference_url":"https://codereview.chromium.org/2134613002/","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/2134613002/"},{"reference_url":"https://crbug.com/625393","reference_id":"","reference_type":"","scores":[],"url":"https://crbug.com/625393"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137"},{"reference_url":"http://www.debian.org/security/2016/dsa-3637","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3637"},{"reference_url":"http://www.securityfocus.com/bid/92053","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/92053"},{"reference_url":"http://www.securitytracker.com/id/1036428","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036428"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358647","reference_id":"1358647","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358647"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5136","reference_id":"CVE-2016-5136","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5136"},{"reference_url":"https://security.gentoo.org/glsa/201610-09","reference_id":"GLSA-201610-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1485","reference_id":"RHSA-2016:1485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1485"}],"fixed_packages":[],"aliases":["CVE-2016-5136"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4nqh-txx3-6qd5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58945?format=json","vulnerability_id":"VCID-5yqp-z394-9bgg","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1485.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1485.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5135.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5135.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5135","reference_id":"","reference_type":"","scores":[{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.62472","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.62736","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.62668","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.62725","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.6253","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.62562","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.62529","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.62579","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.62595","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.62613","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.62601","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.6262","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.62627","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.62609","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.62621","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.62637","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.62633","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.62584","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.62631","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.62682","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00431","scoring_system":"epss","scoring_elements":"0.62642","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5135"},{"reference_url":"https://codereview.chromium.org/1913983002","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/1913983002"},{"reference_url":"https://crbug.com/605451","reference_id":"","reference_type":"","scores":[],"url":"https://crbug.com/605451"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137"},{"reference_url":"http://www.debian.org/security/2016/dsa-3637","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3637"},{"reference_url":"http://www.securityfocus.com/bid/92053","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/92053"},{"reference_url":"http://www.securitytracker.com/id/1036428","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036428"},{"reference_url":"http://www.ubuntu.com/usn/USN-3041-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-3041-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358646","reference_id":"1358646","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358646"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5135","reference_id":"CVE-2016-5135","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5135"},{"reference_url":"https://security.gentoo.org/glsa/201610-09","reference_id":"GLSA-201610-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1485","reference_id":"RHSA-2016:1485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1485"},{"reference_url":"https://usn.ubuntu.com/3041-1/","reference_id":"USN-3041-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3041-1/"}],"fixed_packages":[],"aliases":["CVE-2016-5135"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5yqp-z394-9bgg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81419?format=json","vulnerability_id":"VCID-8v3j-utvs-eugu","summary":"security update","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1485.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1485.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1708.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1708.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1708","reference_id":"","reference_type":"","scores":[{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81196","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81448","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81404","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81445","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81205","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81228","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81256","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81261","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81281","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81267","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.8126","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81296","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81298","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81297","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81319","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81327","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81332","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81349","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81368","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.8139","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81387","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1708"},{"reference_url":"https://codereview.chromium.org/2103663002","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/2103663002"},{"reference_url":"https://crbug.com/613949","reference_id":"","reference_type":"","scores":[],"url":"https://crbug.com/613949"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137"},{"reference_url":"http://www.debian.org/security/2016/dsa-3637","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3637"},{"reference_url":"http://www.securityfocus.com/bid/92053","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/92053"},{"reference_url":"http://www.securitytracker.com/id/1036428","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036428"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358632","reference_id":"1358632","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358632"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1708","reference_id":"CVE-2016-1708","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1708"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1485","reference_id":"RHSA-2016:1485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1485"}],"fixed_packages":[],"aliases":["CVE-2016-1708"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8v3j-utvs-eugu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/7463?format=json","vulnerability_id":"VCID-9q49-2srz-rkg7","summary":"Use After Free\nUse-after-free vulnerability in libxml2, as used in Google Chrome, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the XPointer range-to function.","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:49:18Z/"}],"url":"http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:49:18Z/"}],"url":"http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:49:18Z/"}],"url":"http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2016/Sep/msg00010.html","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:49:18Z/"}],"url":"http://lists.apple.com/archives/security-announce/2016/Sep/msg00010.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:49:18Z/"}],"url":"http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:49:18Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:49:18Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:49:18Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:49:18Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1485.html","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:49:18Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2016-1485.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5131.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5131.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5131","reference_id":"","reference_type":"","scores":[{"value":"0.0369","scoring_system":"epss","scoring_elements":"0.88","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0369","scoring_system":"epss","scoring_elements":"0.88017","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0369","scoring_system":"epss","scoring_elements":"0.88014","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0369","scoring_system":"epss","scoring_elements":"0.87985","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0369","scoring_system":"epss","scoring_elements":"0.88057","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0369","scoring_system":"epss","scoring_elements":"0.88064","published_at":"2026-05-15T12:55:00Z"},{"value":"0.0369","scoring_system":"epss","scoring_elements":"0.87974","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0369","scoring_system":"epss","scoring_elements":"0.88027","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03868","scoring_system":"epss","scoring_elements":"0.88258","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03868","scoring_system":"epss","scoring_elements":"0.88198","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03868","scoring_system":"epss","scoring_elements":"0.88217","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03868","scoring_system":"epss","scoring_elements":"0.88223","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03868","scoring_system":"epss","scoring_elements":"0.88234","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03868","scoring_system":"epss","scoring_elements":"0.88227","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03868","scoring_system":"epss","scoring_elements":"0.88226","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03868","scoring_system":"epss","scoring_elements":"0.8824","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03868","scoring_system":"epss","scoring_elements":"0.88239","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03868","scoring_system":"epss","scoring_elements":"0.88263","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03971","scoring_system":"epss","scoring_elements":"0.88352","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03971","scoring_system":"epss","scoring_elements":"0.88338","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03971","scoring_system":"epss","scoring_elements":"0.8833","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5131"},{"reference_url":"https://codereview.chromium.org/2127493002","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:49:18Z/"}],"url":"https://codereview.chromium.org/2127493002"},{"reference_url":"https://crbug.com/623378","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:49:18Z/"}],"url":"https://crbug.com/623378"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4658"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://source.android.com/security/bulletin/2017-05-01","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:49:18Z/"}],"url":"https://source.android.com/security/bulletin/2017-05-01"},{"reference_url":"https://support.apple.com/HT207141","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:49:18Z/"}],"url":"https://support.apple.com/HT207141"},{"reference_url":"https://support.apple.com/HT207142","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:49:18Z/"}],"url":"https://support.apple.com/HT207142"},{"reference_url":"https://support.apple.com/HT207143","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:49:18Z/"}],"url":"https://support.apple.com/HT207143"},{"reference_url":"https://support.apple.com/HT207170","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:49:18Z/"}],"url":"https://support.apple.com/HT207170"},{"reference_url":"http://www.debian.org/security/2016/dsa-3637","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:49:18Z/"}],"url":"http://www.debian.org/security/2016/dsa-3637"},{"reference_url":"http://www.securityfocus.com/bid/92053","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:49:18Z/"}],"url":"http://www.securityfocus.com/bid/92053"},{"reference_url":"http://www.securitytracker.com/id/1036428","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:49:18Z/"}],"url":"http://www.securitytracker.com/id/1036428"},{"reference_url":"http://www.securitytracker.com/id/1038623","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:49:18Z/"}],"url":"http://www.securitytracker.com/id/1038623"},{"reference_url":"http://www.ubuntu.com/usn/USN-3041-1","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:49:18Z/"}],"url":"http://www.ubuntu.com/usn/USN-3041-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358641","reference_id":"1358641","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:49:18Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358641"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840554","reference_id":"840554","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840554"},{"reference_url":"https://security.archlinux.org/ASA-201611-2","reference_id":"ASA-201611-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-2"},{"reference_url":"https://security.archlinux.org/AVG-56","reference_id":"AVG-56","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-56"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5131","reference_id":"CVE-2016-5131","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5131"},{"reference_url":"https://security.gentoo.org/glsa/201610-09","reference_id":"GLSA-201610-09","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:49:18Z/"}],"url":"https://security.gentoo.org/glsa/201610-09"},{"reference_url":"https://security.gentoo.org/glsa/201701-37","reference_id":"GLSA-201701-37","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:49:18Z/"}],"url":"https://security.gentoo.org/glsa/201701-37"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1485","reference_id":"RHSA-2016:1485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1485"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1190","reference_id":"RHSA-2020:1190","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1190"},{"reference_url":"https://usn.ubuntu.com/3041-1/","reference_id":"USN-3041-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3041-1/"},{"reference_url":"https://usn.ubuntu.com/3235-1/","reference_id":"USN-3235-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3235-1/"}],"fixed_packages":[],"aliases":["CVE-2016-5131"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9q49-2srz-rkg7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58944?format=json","vulnerability_id":"VCID-acym-9xwr-mqh9","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1485.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1485.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5134.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5134.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5134","reference_id":"","reference_type":"","scores":[{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.78796","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.79035","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.78984","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.79023","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.78803","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.78832","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.78816","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.78841","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.78847","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.78871","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.78854","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.78844","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.78872","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.7887","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.78867","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.78896","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.78903","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.78919","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.78935","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.78956","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.7897","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01192","scoring_system":"epss","scoring_elements":"0.78967","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5134"},{"reference_url":"https://codereview.chromium.org/1996773002","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/1996773002"},{"reference_url":"https://crbug.com/593759","reference_id":"","reference_type":"","scores":[],"url":"https://crbug.com/593759"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137"},{"reference_url":"https://www.kb.cert.org/vuls/id/877625","reference_id":"","reference_type":"","scores":[],"url":"https://www.kb.cert.org/vuls/id/877625"},{"reference_url":"http://www.debian.org/security/2016/dsa-3637","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3637"},{"reference_url":"http://www.securityfocus.com/bid/92053","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/92053"},{"reference_url":"http://www.securitytracker.com/id/1036428","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036428"},{"reference_url":"http://www.ubuntu.com/usn/USN-3041-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-3041-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358645","reference_id":"1358645","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358645"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5134","reference_id":"CVE-2016-5134","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5134"},{"reference_url":"https://security.gentoo.org/glsa/201610-09","reference_id":"GLSA-201610-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1485","reference_id":"RHSA-2016:1485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1485"},{"reference_url":"https://usn.ubuntu.com/3041-1/","reference_id":"USN-3041-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3041-1/"}],"fixed_packages":[],"aliases":["CVE-2016-5134"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-acym-9xwr-mqh9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81421?format=json","vulnerability_id":"VCID-aytz-4fva-muhr","summary":"security update","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1485.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1485.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1710.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1710.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1710","reference_id":"","reference_type":"","scores":[{"value":"0.01281","scoring_system":"epss","scoring_elements":"0.79536","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01281","scoring_system":"epss","scoring_elements":"0.79779","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01281","scoring_system":"epss","scoring_elements":"0.79735","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01281","scoring_system":"epss","scoring_elements":"0.79774","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01281","scoring_system":"epss","scoring_elements":"0.79542","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01281","scoring_system":"epss","scoring_elements":"0.79564","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01281","scoring_system":"epss","scoring_elements":"0.79552","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01281","scoring_system":"epss","scoring_elements":"0.7958","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01281","scoring_system":"epss","scoring_elements":"0.79587","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01281","scoring_system":"epss","scoring_elements":"0.79609","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01281","scoring_system":"epss","scoring_elements":"0.79593","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01281","scoring_system":"epss","scoring_elements":"0.79585","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01281","scoring_system":"epss","scoring_elements":"0.79615","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01281","scoring_system":"epss","scoring_elements":"0.79613","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01281","scoring_system":"epss","scoring_elements":"0.79617","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01281","scoring_system":"epss","scoring_elements":"0.79648","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01281","scoring_system":"epss","scoring_elements":"0.79655","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01281","scoring_system":"epss","scoring_elements":"0.79671","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01281","scoring_system":"epss","scoring_elements":"0.79687","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01281","scoring_system":"epss","scoring_elements":"0.79709","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01281","scoring_system":"epss","scoring_elements":"0.79727","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01281","scoring_system":"epss","scoring_elements":"0.79722","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1710"},{"reference_url":"https://codereview.chromium.org/2035973002/","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/2035973002/"},{"reference_url":"https://crbug.com/616907","reference_id":"","reference_type":"","scores":[],"url":"https://crbug.com/616907"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137"},{"reference_url":"http://www.debian.org/security/2016/dsa-3637","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3637"},{"reference_url":"http://www.securityfocus.com/bid/92053","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/92053"},{"reference_url":"http://www.securitytracker.com/id/1036428","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036428"},{"reference_url":"http://www.ubuntu.com/usn/USN-3041-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-3041-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358634","reference_id":"1358634","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358634"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1710","reference_id":"CVE-2016-1710","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1710"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1485","reference_id":"RHSA-2016:1485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1485"},{"reference_url":"https://usn.ubuntu.com/3041-1/","reference_id":"USN-3041-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3041-1/"}],"fixed_packages":[],"aliases":["CVE-2016-1710"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-aytz-4fva-muhr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58939?format=json","vulnerability_id":"VCID-b322-8vgh-pkbv","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1485.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1485.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5128.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5128.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5128","reference_id":"","reference_type":"","scores":[{"value":"0.01456","scoring_system":"epss","scoring_elements":"0.80759","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01456","scoring_system":"epss","scoring_elements":"0.81017","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01456","scoring_system":"epss","scoring_elements":"0.80969","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01456","scoring_system":"epss","scoring_elements":"0.81012","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01456","scoring_system":"epss","scoring_elements":"0.80768","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01456","scoring_system":"epss","scoring_elements":"0.80788","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01456","scoring_system":"epss","scoring_elements":"0.80786","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01456","scoring_system":"epss","scoring_elements":"0.80812","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01456","scoring_system":"epss","scoring_elements":"0.80821","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01456","scoring_system":"epss","scoring_elements":"0.80838","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01456","scoring_system":"epss","scoring_elements":"0.80823","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01456","scoring_system":"epss","scoring_elements":"0.80815","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01456","scoring_system":"epss","scoring_elements":"0.80852","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01456","scoring_system":"epss","scoring_elements":"0.80855","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01456","scoring_system":"epss","scoring_elements":"0.80856","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01456","scoring_system":"epss","scoring_elements":"0.80879","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01456","scoring_system":"epss","scoring_elements":"0.80884","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01456","scoring_system":"epss","scoring_elements":"0.80896","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01456","scoring_system":"epss","scoring_elements":"0.80912","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01456","scoring_system":"epss","scoring_elements":"0.80933","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01456","scoring_system":"epss","scoring_elements":"0.80955","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01456","scoring_system":"epss","scoring_elements":"0.8095","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5128"},{"reference_url":"https://codereview.chromium.org/2082633002","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/2082633002"},{"reference_url":"https://codereview.chromium.org/2084183004","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/2084183004"},{"reference_url":"https://codereview.chromium.org/2085223002","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/2085223002"},{"reference_url":"https://codereview.chromium.org/2101983002","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/2101983002"},{"reference_url":"https://codereview.chromium.org/2103033002","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/2103033002"},{"reference_url":"https://crbug.com/619166","reference_id":"","reference_type":"","scores":[],"url":"https://crbug.com/619166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137"},{"reference_url":"http://www.debian.org/security/2016/dsa-3637","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3637"},{"reference_url":"http://www.securityfocus.com/bid/92053","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/92053"},{"reference_url":"http://www.securitytracker.com/id/1036428","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036428"},{"reference_url":"http://www.ubuntu.com/usn/USN-3041-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-3041-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358638","reference_id":"1358638","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358638"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:v8:5.2.360:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:v8:5.2.360:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:v8:5.2.360:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5128","reference_id":"CVE-2016-5128","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5128"},{"reference_url":"https://security.gentoo.org/glsa/201610-09","reference_id":"GLSA-201610-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1485","reference_id":"RHSA-2016:1485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1485"},{"reference_url":"https://usn.ubuntu.com/3041-1/","reference_id":"USN-3041-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3041-1/"}],"fixed_packages":[],"aliases":["CVE-2016-5128"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b322-8vgh-pkbv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81422?format=json","vulnerability_id":"VCID-desf-tjau-5bcv","summary":"security update","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1485.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1485.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1711.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1711.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1711","reference_id":"","reference_type":"","scores":[{"value":"0.01777","scoring_system":"epss","scoring_elements":"0.82616","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01777","scoring_system":"epss","scoring_elements":"0.82884","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01777","scoring_system":"epss","scoring_elements":"0.82838","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01777","scoring_system":"epss","scoring_elements":"0.82875","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01777","scoring_system":"epss","scoring_elements":"0.82631","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01777","scoring_system":"epss","scoring_elements":"0.82646","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01777","scoring_system":"epss","scoring_elements":"0.82642","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01777","scoring_system":"epss","scoring_elements":"0.82668","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01777","scoring_system":"epss","scoring_elements":"0.82674","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01777","scoring_system":"epss","scoring_elements":"0.82692","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01777","scoring_system":"epss","scoring_elements":"0.82686","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01777","scoring_system":"epss","scoring_elements":"0.82682","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01777","scoring_system":"epss","scoring_elements":"0.8272","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01777","scoring_system":"epss","scoring_elements":"0.82721","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01777","scoring_system":"epss","scoring_elements":"0.82724","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01777","scoring_system":"epss","scoring_elements":"0.82747","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01777","scoring_system":"epss","scoring_elements":"0.82756","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01777","scoring_system":"epss","scoring_elements":"0.82762","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01777","scoring_system":"epss","scoring_elements":"0.82782","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01777","scoring_system":"epss","scoring_elements":"0.82803","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01777","scoring_system":"epss","scoring_elements":"0.82824","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01777","scoring_system":"epss","scoring_elements":"0.82822","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1711"},{"reference_url":"https://codereview.chromium.org/2079473002","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/2079473002"},{"reference_url":"https://crbug.com/617495","reference_id":"","reference_type":"","scores":[],"url":"https://crbug.com/617495"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137"},{"reference_url":"http://www.debian.org/security/2016/dsa-3637","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3637"},{"reference_url":"http://www.securityfocus.com/bid/92053","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/92053"},{"reference_url":"http://www.securitytracker.com/id/1036428","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036428"},{"reference_url":"http://www.ubuntu.com/usn/USN-3041-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-3041-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358636","reference_id":"1358636","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358636"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1711","reference_id":"CVE-2016-1711","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1711"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1485","reference_id":"RHSA-2016:1485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1485"},{"reference_url":"https://usn.ubuntu.com/3041-1/","reference_id":"USN-3041-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3041-1/"}],"fixed_packages":[],"aliases":["CVE-2016-1711"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-desf-tjau-5bcv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58942?format=json","vulnerability_id":"VCID-p2ua-m5px-uka1","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1485.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1485.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5132.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5132.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5132","reference_id":"","reference_type":"","scores":[{"value":"0.01594","scoring_system":"epss","scoring_elements":"0.81601","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01594","scoring_system":"epss","scoring_elements":"0.81865","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01594","scoring_system":"epss","scoring_elements":"0.81821","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01594","scoring_system":"epss","scoring_elements":"0.81862","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01594","scoring_system":"epss","scoring_elements":"0.81612","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01594","scoring_system":"epss","scoring_elements":"0.81633","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01594","scoring_system":"epss","scoring_elements":"0.8163","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01594","scoring_system":"epss","scoring_elements":"0.81658","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01594","scoring_system":"epss","scoring_elements":"0.81663","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01594","scoring_system":"epss","scoring_elements":"0.81683","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01594","scoring_system":"epss","scoring_elements":"0.81671","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01594","scoring_system":"epss","scoring_elements":"0.81664","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01594","scoring_system":"epss","scoring_elements":"0.81703","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01594","scoring_system":"epss","scoring_elements":"0.81702","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01594","scoring_system":"epss","scoring_elements":"0.81706","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01594","scoring_system":"epss","scoring_elements":"0.8173","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01594","scoring_system":"epss","scoring_elements":"0.81739","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01594","scoring_system":"epss","scoring_elements":"0.81745","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01594","scoring_system":"epss","scoring_elements":"0.81763","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01594","scoring_system":"epss","scoring_elements":"0.81784","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01594","scoring_system":"epss","scoring_elements":"0.81808","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01594","scoring_system":"epss","scoring_elements":"0.81804","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5132"},{"reference_url":"https://codereview.chromium.org/2009453002","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/2009453002"},{"reference_url":"https://codereview.chromium.org/2061203002/","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/2061203002/"},{"reference_url":"https://codereview.chromium.org/2071433003","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/2071433003"},{"reference_url":"https://codereview.chromium.org/2082493002/","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/2082493002/"},{"reference_url":"https://codereview.chromium.org/2085923002","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/2085923002"},{"reference_url":"https://crbug.com/607543","reference_id":"","reference_type":"","scores":[],"url":"https://crbug.com/607543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137"},{"reference_url":"http://www.debian.org/security/2016/dsa-3637","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3637"},{"reference_url":"http://www.securityfocus.com/bid/92053","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/92053"},{"reference_url":"http://www.securitytracker.com/id/1036428","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036428"},{"reference_url":"http://www.ubuntu.com/usn/USN-3041-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-3041-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358642","reference_id":"1358642","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358642"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5132","reference_id":"CVE-2016-5132","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5132"},{"reference_url":"https://security.gentoo.org/glsa/201610-09","reference_id":"GLSA-201610-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1485","reference_id":"RHSA-2016:1485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1485"},{"reference_url":"https://usn.ubuntu.com/3041-1/","reference_id":"USN-3041-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3041-1/"}],"fixed_packages":[],"aliases":["CVE-2016-5132"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p2ua-m5px-uka1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58941?format=json","vulnerability_id":"VCID-s79f-rab8-33ez","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1485.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1485.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5130.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5130.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5130","reference_id":"","reference_type":"","scores":[{"value":"0.0113","scoring_system":"epss","scoring_elements":"0.78255","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0113","scoring_system":"epss","scoring_elements":"0.7851","published_at":"2026-05-15T12:55:00Z"},{"value":"0.0113","scoring_system":"epss","scoring_elements":"0.78457","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0113","scoring_system":"epss","scoring_elements":"0.78495","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0113","scoring_system":"epss","scoring_elements":"0.78263","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0113","scoring_system":"epss","scoring_elements":"0.78294","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0113","scoring_system":"epss","scoring_elements":"0.78275","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0113","scoring_system":"epss","scoring_elements":"0.78301","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0113","scoring_system":"epss","scoring_elements":"0.78307","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0113","scoring_system":"epss","scoring_elements":"0.78333","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0113","scoring_system":"epss","scoring_elements":"0.78316","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0113","scoring_system":"epss","scoring_elements":"0.7831","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0113","scoring_system":"epss","scoring_elements":"0.78339","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0113","scoring_system":"epss","scoring_elements":"0.78337","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0113","scoring_system":"epss","scoring_elements":"0.78334","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0113","scoring_system":"epss","scoring_elements":"0.78367","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0113","scoring_system":"epss","scoring_elements":"0.78374","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0113","scoring_system":"epss","scoring_elements":"0.7839","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0113","scoring_system":"epss","scoring_elements":"0.78404","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0113","scoring_system":"epss","scoring_elements":"0.78429","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0113","scoring_system":"epss","scoring_elements":"0.78445","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0113","scoring_system":"epss","scoring_elements":"0.78441","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5130"},{"reference_url":"https://bugs.chromium.org/p/chromium/issues/detail?id=626838","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.chromium.org/p/chromium/issues/detail?id=626838"},{"reference_url":"https://codereview.chromium.org/2134493002/","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/2134493002/"},{"reference_url":"https://codereview.chromium.org/2144823002","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/2144823002"},{"reference_url":"https://crbug.com/623319","reference_id":"","reference_type":"","scores":[],"url":"https://crbug.com/623319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137"},{"reference_url":"http://www.debian.org/security/2016/dsa-3637","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3637"},{"reference_url":"http://www.securityfocus.com/bid/92053","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/92053"},{"reference_url":"http://www.securitytracker.com/id/1036428","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036428"},{"reference_url":"http://www.ubuntu.com/usn/USN-3041-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-3041-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358640","reference_id":"1358640","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358640"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5130","reference_id":"CVE-2016-5130","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5130"},{"reference_url":"https://security.gentoo.org/glsa/201610-09","reference_id":"GLSA-201610-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1485","reference_id":"RHSA-2016:1485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1485"},{"reference_url":"https://usn.ubuntu.com/3041-1/","reference_id":"USN-3041-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3041-1/"}],"fixed_packages":[],"aliases":["CVE-2016-5130"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s79f-rab8-33ez"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58938?format=json","vulnerability_id":"VCID-svnc-qkzm-9bhc","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1485.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1485.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5127.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5127.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5127","reference_id":"","reference_type":"","scores":[{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84295","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84548","published_at":"2026-05-15T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84506","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84538","published_at":"2026-05-14T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84308","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84328","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84331","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84353","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84358","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84376","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84369","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84365","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84387","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.8439","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84416","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84425","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84429","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84449","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84475","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.8449","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84489","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5127"},{"reference_url":"https://codereview.chromium.org/2082893005/","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/2082893005/"},{"reference_url":"https://codereview.chromium.org/2091633002","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/2091633002"},{"reference_url":"https://crbug.com/618237","reference_id":"","reference_type":"","scores":[],"url":"https://crbug.com/618237"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137"},{"reference_url":"http://www.debian.org/security/2016/dsa-3637","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3637"},{"reference_url":"http://www.securityfocus.com/bid/92053","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/92053"},{"reference_url":"http://www.securitytracker.com/id/1036428","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036428"},{"reference_url":"http://www.ubuntu.com/usn/USN-3041-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-3041-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358637","reference_id":"1358637","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358637"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5127","reference_id":"CVE-2016-5127","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5127"},{"reference_url":"https://security.gentoo.org/glsa/201610-09","reference_id":"GLSA-201610-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1485","reference_id":"RHSA-2016:1485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1485"},{"reference_url":"https://usn.ubuntu.com/3041-1/","reference_id":"USN-3041-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3041-1/"}],"fixed_packages":[],"aliases":["CVE-2016-5127"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-svnc-qkzm-9bhc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58940?format=json","vulnerability_id":"VCID-tb3n-qup4-6kfh","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1485.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1485.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5129.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5129.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5129","reference_id":"","reference_type":"","scores":[{"value":"0.02468","scoring_system":"epss","scoring_elements":"0.85192","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02468","scoring_system":"epss","scoring_elements":"0.85427","published_at":"2026-05-15T12:55:00Z"},{"value":"0.02468","scoring_system":"epss","scoring_elements":"0.85381","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02468","scoring_system":"epss","scoring_elements":"0.85419","published_at":"2026-05-14T12:55:00Z"},{"value":"0.02468","scoring_system":"epss","scoring_elements":"0.85203","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02468","scoring_system":"epss","scoring_elements":"0.85221","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02468","scoring_system":"epss","scoring_elements":"0.85224","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02468","scoring_system":"epss","scoring_elements":"0.85246","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02468","scoring_system":"epss","scoring_elements":"0.85254","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02468","scoring_system":"epss","scoring_elements":"0.85269","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02468","scoring_system":"epss","scoring_elements":"0.85266","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02468","scoring_system":"epss","scoring_elements":"0.85263","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02468","scoring_system":"epss","scoring_elements":"0.85283","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02468","scoring_system":"epss","scoring_elements":"0.85285","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02468","scoring_system":"epss","scoring_elements":"0.85306","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02468","scoring_system":"epss","scoring_elements":"0.85315","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02468","scoring_system":"epss","scoring_elements":"0.85314","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02468","scoring_system":"epss","scoring_elements":"0.85328","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02468","scoring_system":"epss","scoring_elements":"0.85354","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02468","scoring_system":"epss","scoring_elements":"0.85373","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02468","scoring_system":"epss","scoring_elements":"0.85367","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5129"},{"reference_url":"https://codereview.chromium.org/2078403002/","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/2078403002/"},{"reference_url":"https://codereview.chromium.org/2102243002","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/2102243002"},{"reference_url":"https://codereview.chromium.org/2111133002","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/2111133002"},{"reference_url":"https://crbug.com/620553","reference_id":"","reference_type":"","scores":[],"url":"https://crbug.com/620553"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137"},{"reference_url":"https://source.android.com/security/bulletin/2017-04-01","reference_id":"","reference_type":"","scores":[],"url":"https://source.android.com/security/bulletin/2017-04-01"},{"reference_url":"http://www.debian.org/security/2016/dsa-3637","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3637"},{"reference_url":"http://www.securityfocus.com/bid/92053","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/92053"},{"reference_url":"http://www.securitytracker.com/id/1036428","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036428"},{"reference_url":"http://www.securitytracker.com/id/1038201","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1038201"},{"reference_url":"http://www.ubuntu.com/usn/USN-3041-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-3041-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358639","reference_id":"1358639","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358639"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:51.0.2704.106:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:51.0.2704.106:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:51.0.2704.106:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5129","reference_id":"CVE-2016-5129","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5129"},{"reference_url":"https://security.gentoo.org/glsa/201610-09","reference_id":"GLSA-201610-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1485","reference_id":"RHSA-2016:1485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1485"},{"reference_url":"https://usn.ubuntu.com/3041-1/","reference_id":"USN-3041-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3041-1/"}],"fixed_packages":[],"aliases":["CVE-2016-5129"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tb3n-qup4-6kfh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58943?format=json","vulnerability_id":"VCID-ur4s-afsc-nua7","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1485.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1485.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5133.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5133.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5133","reference_id":"","reference_type":"","scores":[{"value":"0.00653","scoring_system":"epss","scoring_elements":"0.70842","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00653","scoring_system":"epss","scoring_elements":"0.71112","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00653","scoring_system":"epss","scoring_elements":"0.71048","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00653","scoring_system":"epss","scoring_elements":"0.71102","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00653","scoring_system":"epss","scoring_elements":"0.70856","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00653","scoring_system":"epss","scoring_elements":"0.70875","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00653","scoring_system":"epss","scoring_elements":"0.7085","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00653","scoring_system":"epss","scoring_elements":"0.70893","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00653","scoring_system":"epss","scoring_elements":"0.70909","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00653","scoring_system":"epss","scoring_elements":"0.70932","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00653","scoring_system":"epss","scoring_elements":"0.70916","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00653","scoring_system":"epss","scoring_elements":"0.709","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00653","scoring_system":"epss","scoring_elements":"0.70947","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00653","scoring_system":"epss","scoring_elements":"0.70954","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00653","scoring_system":"epss","scoring_elements":"0.70933","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00653","scoring_system":"epss","scoring_elements":"0.70989","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00653","scoring_system":"epss","scoring_elements":"0.70999","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00653","scoring_system":"epss","scoring_elements":"0.70997","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00653","scoring_system":"epss","scoring_elements":"0.70979","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00653","scoring_system":"epss","scoring_elements":"0.71018","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00653","scoring_system":"epss","scoring_elements":"0.71055","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00653","scoring_system":"epss","scoring_elements":"0.71021","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5133"},{"reference_url":"https://codereview.chromium.org/2067933002/","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/2067933002/"},{"reference_url":"https://crbug.com/613626","reference_id":"","reference_type":"","scores":[],"url":"https://crbug.com/613626"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137"},{"reference_url":"http://www.debian.org/security/2016/dsa-3637","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3637"},{"reference_url":"http://www.securityfocus.com/bid/92053","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/92053"},{"reference_url":"http://www.securitytracker.com/id/1036428","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036428"},{"reference_url":"http://www.ubuntu.com/usn/USN-3041-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-3041-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358643","reference_id":"1358643","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358643"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5133","reference_id":"CVE-2016-5133","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5133"},{"reference_url":"https://security.gentoo.org/glsa/201610-09","reference_id":"GLSA-201610-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1485","reference_id":"RHSA-2016:1485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1485"},{"reference_url":"https://usn.ubuntu.com/3041-1/","reference_id":"USN-3041-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3041-1/"}],"fixed_packages":[],"aliases":["CVE-2016-5133"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ur4s-afsc-nua7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81420?format=json","vulnerability_id":"VCID-w6s7-6f5e-7ufz","summary":"security update","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1485.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1485.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1709.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1709.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1709","reference_id":"","reference_type":"","scores":[{"value":"0.0155","scoring_system":"epss","scoring_elements":"0.81349","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0155","scoring_system":"epss","scoring_elements":"0.81602","published_at":"2026-05-15T12:55:00Z"},{"value":"0.0155","scoring_system":"epss","scoring_elements":"0.81561","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0155","scoring_system":"epss","scoring_elements":"0.81599","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0155","scoring_system":"epss","scoring_elements":"0.81358","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0155","scoring_system":"epss","scoring_elements":"0.8138","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0155","scoring_system":"epss","scoring_elements":"0.81378","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0155","scoring_system":"epss","scoring_elements":"0.81406","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0155","scoring_system":"epss","scoring_elements":"0.81411","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0155","scoring_system":"epss","scoring_elements":"0.81433","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0155","scoring_system":"epss","scoring_elements":"0.8142","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0155","scoring_system":"epss","scoring_elements":"0.81413","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0155","scoring_system":"epss","scoring_elements":"0.8145","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0155","scoring_system":"epss","scoring_elements":"0.81451","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0155","scoring_system":"epss","scoring_elements":"0.81453","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0155","scoring_system":"epss","scoring_elements":"0.81474","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0155","scoring_system":"epss","scoring_elements":"0.81482","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0155","scoring_system":"epss","scoring_elements":"0.81486","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0155","scoring_system":"epss","scoring_elements":"0.81504","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0155","scoring_system":"epss","scoring_elements":"0.81523","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0155","scoring_system":"epss","scoring_elements":"0.81546","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0155","scoring_system":"epss","scoring_elements":"0.81543","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1709"},{"reference_url":"https://crbug.com/614934","reference_id":"","reference_type":"","scores":[],"url":"https://crbug.com/614934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137"},{"reference_url":"https://github.com/googlei18n/sfntly/commit/468cad540fa1b0027cad60456f53feabecdce2bc","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/googlei18n/sfntly/commit/468cad540fa1b0027cad60456f53feabecdce2bc"},{"reference_url":"https://github.com/googlei18n/sfntly/commit/c56b85408bab232efd7e650f0994272a174e3b92","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/googlei18n/sfntly/commit/c56b85408bab232efd7e650f0994272a174e3b92"},{"reference_url":"https://github.com/googlei18n/sfntly/pull/56","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/googlei18n/sfntly/pull/56"},{"reference_url":"http://www.debian.org/security/2016/dsa-3637","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3637"},{"reference_url":"http://www.securityfocus.com/bid/92053","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/92053"},{"reference_url":"http://www.securitytracker.com/id/1036428","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036428"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358633","reference_id":"1358633","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358633"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:sfntly:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:sfntly:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:sfntly:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1709","reference_id":"CVE-2016-1709","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1709"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1485","reference_id":"RHSA-2016:1485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1485"}],"fixed_packages":[],"aliases":["CVE-2016-1709"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w6s7-6f5e-7ufz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58948?format=json","vulnerability_id":"VCID-wf48-qk32-tqcc","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1485.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1485.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5137.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5137.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5137","reference_id":"","reference_type":"","scores":[{"value":"0.01011","scoring_system":"epss","scoring_elements":"0.77052","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01011","scoring_system":"epss","scoring_elements":"0.77323","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01011","scoring_system":"epss","scoring_elements":"0.77262","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01011","scoring_system":"epss","scoring_elements":"0.77308","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01011","scoring_system":"epss","scoring_elements":"0.77058","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01011","scoring_system":"epss","scoring_elements":"0.77086","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01011","scoring_system":"epss","scoring_elements":"0.77068","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01011","scoring_system":"epss","scoring_elements":"0.77101","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01011","scoring_system":"epss","scoring_elements":"0.77111","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01011","scoring_system":"epss","scoring_elements":"0.77138","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01011","scoring_system":"epss","scoring_elements":"0.77117","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01011","scoring_system":"epss","scoring_elements":"0.77112","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01011","scoring_system":"epss","scoring_elements":"0.77153","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01011","scoring_system":"epss","scoring_elements":"0.77154","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01011","scoring_system":"epss","scoring_elements":"0.77146","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01011","scoring_system":"epss","scoring_elements":"0.7718","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01011","scoring_system":"epss","scoring_elements":"0.77187","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01011","scoring_system":"epss","scoring_elements":"0.77202","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01011","scoring_system":"epss","scoring_elements":"0.77207","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01011","scoring_system":"epss","scoring_elements":"0.77237","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01011","scoring_system":"epss","scoring_elements":"0.77257","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01011","scoring_system":"epss","scoring_elements":"0.77247","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5137"},{"reference_url":"https://codereview.chromium.org/2125873003","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/2125873003"},{"reference_url":"https://crbug.com/625945","reference_id":"","reference_type":"","scores":[],"url":"https://crbug.com/625945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137"},{"reference_url":"http://www.debian.org/security/2016/dsa-3637","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3637"},{"reference_url":"http://www.securityfocus.com/bid/92053","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/92053"},{"reference_url":"http://www.securitytracker.com/id/1036428","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036428"},{"reference_url":"http://www.ubuntu.com/usn/USN-3041-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-3041-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358648","reference_id":"1358648","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358648"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5137","reference_id":"CVE-2016-5137","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"},{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5137"},{"reference_url":"https://security.gentoo.org/glsa/201610-09","reference_id":"GLSA-201610-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1485","reference_id":"RHSA-2016:1485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1485"},{"reference_url":"https://usn.ubuntu.com/3041-1/","reference_id":"USN-3041-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3041-1/"}],"fixed_packages":[],"aliases":["CVE-2016-5137"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wf48-qk32-tqcc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81417?format=json","vulnerability_id":"VCID-yq6t-qf82-vfa5","summary":"security update","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1485.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1485.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1706.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1706.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1706","reference_id":"","reference_type":"","scores":[{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80646","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80902","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80856","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80898","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80655","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80677","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80672","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.807","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.8071","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80726","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80713","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80705","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.8074","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80741","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80744","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80767","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80771","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80785","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80801","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80823","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80844","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80838","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1706"},{"reference_url":"https://codereview.chromium.org/2069853002/","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/2069853002/"},{"reference_url":"https://crbug.com/610600","reference_id":"","reference_type":"","scores":[],"url":"https://crbug.com/610600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137"},{"reference_url":"http://www.debian.org/security/2016/dsa-3637","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3637"},{"reference_url":"http://www.securitytracker.com/id/1036428","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036428"},{"reference_url":"http://www.ubuntu.com/usn/USN-3041-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-3041-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358630","reference_id":"1358630","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358630"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1706","reference_id":"CVE-2016-1706","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"},{"value":"9.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1706"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1485","reference_id":"RHSA-2016:1485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1485"},{"reference_url":"https://usn.ubuntu.com/3041-1/","reference_id":"USN-3041-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3041-1/"}],"fixed_packages":[],"aliases":["CVE-2016-1706"],"risk_score":4.3,"exploitability":"0.5","weighted_severity":"8.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yq6t-qf82-vfa5"}],"fixing_vulnerabilities":[],"risk_score":"4.5","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/chromium-browser@52.0.2743.82-1%3Farch=el6"}