{"url":"http://public2.vulnerablecode.io/api/packages/115333?format=json","purl":"pkg:rpm/redhat/chromium-browser@50.0.2661.94-1?arch=el6","type":"rpm","namespace":"redhat","name":"chromium-browser","version":"50.0.2661.94-1","qualifiers":{"arch":"el6"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48261?format=json","vulnerability_id":"VCID-3gc7-nyyq-vycu","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0707.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0707.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1665.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1665.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1665","reference_id":"","reference_type":"","scores":[{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.81808","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.81786","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.81791","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.81648","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.81659","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.81681","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.81679","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.81705","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.8171","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.8173","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.81717","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.81749","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.81748","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.81752","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01603","scoring_system":"epss","scoring_elements":"0.81776","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1665"},{"reference_url":"https://codereview.chromium.org/1925463003","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/1925463003"},{"reference_url":"https://crbug.com/606181","reference_id":"","reference_type":"","scores":[],"url":"https://crbug.com/606181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.debian.org/security/2016/dsa-3564","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3564"},{"reference_url":"http://www.securityfocus.com/bid/89106","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/89106"},{"reference_url":"http://www.ubuntu.com/usn/USN-2960-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2960-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1331640","reference_id":"1331640","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1331640"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1665","reference_id":"CVE-2016-1665","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1665"},{"reference_url":"https://security.gentoo.org/glsa/201605-02","reference_id":"GLSA-201605-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0707","reference_id":"RHSA-2016:0707","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0707"},{"reference_url":"https://usn.ubuntu.com/2960-1/","reference_id":"USN-2960-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2960-1/"}],"fixed_packages":[],"aliases":["CVE-2016-1665"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3gc7-nyyq-vycu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48258?format=json","vulnerability_id":"VCID-5pvd-cdrh-c3gb","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0707.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0707.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1662.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1662.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1662","reference_id":"","reference_type":"","scores":[{"value":"0.15771","scoring_system":"epss","scoring_elements":"0.94757","published_at":"2026-05-05T12:55:00Z"},{"value":"0.15771","scoring_system":"epss","scoring_elements":"0.94749","published_at":"2026-04-26T12:55:00Z"},{"value":"0.15771","scoring_system":"epss","scoring_elements":"0.9475","published_at":"2026-04-29T12:55:00Z"},{"value":"0.15771","scoring_system":"epss","scoring_elements":"0.94696","published_at":"2026-04-01T12:55:00Z"},{"value":"0.15771","scoring_system":"epss","scoring_elements":"0.94704","published_at":"2026-04-02T12:55:00Z"},{"value":"0.15771","scoring_system":"epss","scoring_elements":"0.94708","published_at":"2026-04-04T12:55:00Z"},{"value":"0.15771","scoring_system":"epss","scoring_elements":"0.9471","published_at":"2026-04-07T12:55:00Z"},{"value":"0.15771","scoring_system":"epss","scoring_elements":"0.9472","published_at":"2026-04-08T12:55:00Z"},{"value":"0.15771","scoring_system":"epss","scoring_elements":"0.94724","published_at":"2026-04-09T12:55:00Z"},{"value":"0.15771","scoring_system":"epss","scoring_elements":"0.94728","published_at":"2026-04-11T12:55:00Z"},{"value":"0.15771","scoring_system":"epss","scoring_elements":"0.94732","published_at":"2026-04-12T12:55:00Z"},{"value":"0.15771","scoring_system":"epss","scoring_elements":"0.94733","published_at":"2026-04-13T12:55:00Z"},{"value":"0.15771","scoring_system":"epss","scoring_elements":"0.94742","published_at":"2026-04-16T12:55:00Z"},{"value":"0.15771","scoring_system":"epss","scoring_elements":"0.94744","published_at":"2026-04-18T12:55:00Z"},{"value":"0.15771","scoring_system":"epss","scoring_elements":"0.94748","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1662"},{"reference_url":"https://codereview.chromium.org/1887423002","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/1887423002"},{"reference_url":"https://crbug.com/603732","reference_id":"","reference_type":"","scores":[],"url":"https://crbug.com/603732"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.debian.org/security/2016/dsa-3564","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3564"},{"reference_url":"http://www.securityfocus.com/bid/89106","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/89106"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1331637","reference_id":"1331637","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1331637"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1662","reference_id":"CVE-2016-1662","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"},{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1662"},{"reference_url":"https://security.gentoo.org/glsa/201605-02","reference_id":"GLSA-201605-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0707","reference_id":"RHSA-2016:0707","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0707"}],"fixed_packages":[],"aliases":["CVE-2016-1662"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5pvd-cdrh-c3gb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48259?format=json","vulnerability_id":"VCID-9ypx-d4jg-bkcm","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0707.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0707.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1663.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1663.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1663","reference_id":"","reference_type":"","scores":[{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80662","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80628","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80644","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80511","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80517","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.8054","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80531","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.8056","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.8057","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80587","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80574","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80566","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80595","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80597","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.806","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80625","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1663"},{"reference_url":"https://codereview.chromium.org/1904913002/","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/1904913002/"},{"reference_url":"https://crbug.com/603987","reference_id":"","reference_type":"","scores":[],"url":"https://crbug.com/603987"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.debian.org/security/2016/dsa-3564","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3564"},{"reference_url":"http://www.securityfocus.com/bid/89106","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/89106"},{"reference_url":"http://www.ubuntu.com/usn/USN-2960-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2960-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1331638","reference_id":"1331638","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1331638"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1663","reference_id":"CVE-2016-1663","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1663"},{"reference_url":"https://security.gentoo.org/glsa/201605-02","reference_id":"GLSA-201605-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0707","reference_id":"RHSA-2016:0707","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0707"},{"reference_url":"https://usn.ubuntu.com/2960-1/","reference_id":"USN-2960-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2960-1/"}],"fixed_packages":[],"aliases":["CVE-2016-1663"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9ypx-d4jg-bkcm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48260?format=json","vulnerability_id":"VCID-k754-me1v-kye1","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0707.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0707.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1664.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1664.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1664","reference_id":"","reference_type":"","scores":[{"value":"0.01056","scoring_system":"epss","scoring_elements":"0.77694","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01056","scoring_system":"epss","scoring_elements":"0.77667","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01056","scoring_system":"epss","scoring_elements":"0.77682","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01056","scoring_system":"epss","scoring_elements":"0.77538","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01056","scoring_system":"epss","scoring_elements":"0.77544","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01056","scoring_system":"epss","scoring_elements":"0.7757","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01056","scoring_system":"epss","scoring_elements":"0.77551","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01056","scoring_system":"epss","scoring_elements":"0.77581","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01056","scoring_system":"epss","scoring_elements":"0.77587","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01056","scoring_system":"epss","scoring_elements":"0.77615","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01056","scoring_system":"epss","scoring_elements":"0.77599","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01056","scoring_system":"epss","scoring_elements":"0.77597","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01056","scoring_system":"epss","scoring_elements":"0.77635","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01056","scoring_system":"epss","scoring_elements":"0.77633","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01056","scoring_system":"epss","scoring_elements":"0.77627","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01056","scoring_system":"epss","scoring_elements":"0.77659","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1664"},{"reference_url":"https://codereview.chromium.org/1848813005/","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/1848813005/"},{"reference_url":"https://crbug.com/597322","reference_id":"","reference_type":"","scores":[],"url":"https://crbug.com/597322"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.debian.org/security/2016/dsa-3564","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3564"},{"reference_url":"http://www.securityfocus.com/bid/89106","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/89106"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1331639","reference_id":"1331639","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1331639"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1664","reference_id":"CVE-2016-1664","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"},{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1664"},{"reference_url":"https://security.gentoo.org/glsa/201605-02","reference_id":"GLSA-201605-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0707","reference_id":"RHSA-2016:0707","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0707"}],"fixed_packages":[],"aliases":["CVE-2016-1664"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k754-me1v-kye1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48256?format=json","vulnerability_id":"VCID-rksh-5ywn-kqbv","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0707.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0707.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1660.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1660.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1660","reference_id":"","reference_type":"","scores":[{"value":"0.01238","scoring_system":"epss","scoring_elements":"0.79318","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01238","scoring_system":"epss","scoring_elements":"0.79288","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01238","scoring_system":"epss","scoring_elements":"0.79305","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01238","scoring_system":"epss","scoring_elements":"0.79178","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01238","scoring_system":"epss","scoring_elements":"0.79185","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01238","scoring_system":"epss","scoring_elements":"0.79208","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01238","scoring_system":"epss","scoring_elements":"0.79194","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01238","scoring_system":"epss","scoring_elements":"0.79219","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01238","scoring_system":"epss","scoring_elements":"0.79226","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01238","scoring_system":"epss","scoring_elements":"0.7925","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01238","scoring_system":"epss","scoring_elements":"0.79235","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01238","scoring_system":"epss","scoring_elements":"0.79224","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01238","scoring_system":"epss","scoring_elements":"0.79246","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01238","scoring_system":"epss","scoring_elements":"0.79247","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01238","scoring_system":"epss","scoring_elements":"0.79282","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1660"},{"reference_url":"https://codereview.chromium.org/1672603002","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/1672603002"},{"reference_url":"https://codereview.chromium.org/1677363002","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/1677363002"},{"reference_url":"https://crbug.com/574802","reference_id":"","reference_type":"","scores":[],"url":"https://crbug.com/574802"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.debian.org/security/2016/dsa-3564","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3564"},{"reference_url":"http://www.securityfocus.com/bid/89106","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/89106"},{"reference_url":"http://www.ubuntu.com/usn/USN-2960-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2960-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1331635","reference_id":"1331635","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1331635"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1660","reference_id":"CVE-2016-1660","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1660"},{"reference_url":"https://security.gentoo.org/glsa/201605-02","reference_id":"GLSA-201605-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0707","reference_id":"RHSA-2016:0707","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0707"},{"reference_url":"https://usn.ubuntu.com/2960-1/","reference_id":"USN-2960-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2960-1/"}],"fixed_packages":[],"aliases":["CVE-2016-1660"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rksh-5ywn-kqbv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48257?format=json","vulnerability_id":"VCID-vax8-arng-hyhr","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0707.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0707.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1661.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1661.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1661","reference_id":"","reference_type":"","scores":[{"value":"0.00995","scoring_system":"epss","scoring_elements":"0.77016","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00995","scoring_system":"epss","scoring_elements":"0.77011","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00995","scoring_system":"epss","scoring_elements":"0.77025","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00995","scoring_system":"epss","scoring_elements":"0.76871","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00995","scoring_system":"epss","scoring_elements":"0.76877","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00995","scoring_system":"epss","scoring_elements":"0.76908","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00995","scoring_system":"epss","scoring_elements":"0.7689","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00995","scoring_system":"epss","scoring_elements":"0.76922","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00995","scoring_system":"epss","scoring_elements":"0.76932","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00995","scoring_system":"epss","scoring_elements":"0.7696","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00995","scoring_system":"epss","scoring_elements":"0.7694","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00995","scoring_system":"epss","scoring_elements":"0.76935","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00995","scoring_system":"epss","scoring_elements":"0.76976","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00995","scoring_system":"epss","scoring_elements":"0.76979","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00995","scoring_system":"epss","scoring_elements":"0.76971","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00995","scoring_system":"epss","scoring_elements":"0.77005","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1661"},{"reference_url":"https://codereview.chromium.org/1887553002/","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/1887553002/"},{"reference_url":"https://crbug.com/601629","reference_id":"","reference_type":"","scores":[],"url":"https://crbug.com/601629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.debian.org/security/2016/dsa-3564","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3564"},{"reference_url":"http://www.securityfocus.com/bid/89106","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/89106"},{"reference_url":"http://www.ubuntu.com/usn/USN-2960-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2960-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1331636","reference_id":"1331636","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1331636"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1661","reference_id":"CVE-2016-1661","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:C"},{"value":"8.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1661"},{"reference_url":"https://security.gentoo.org/glsa/201605-02","reference_id":"GLSA-201605-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0707","reference_id":"RHSA-2016:0707","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0707"},{"reference_url":"https://usn.ubuntu.com/2960-1/","reference_id":"USN-2960-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2960-1/"}],"fixed_packages":[],"aliases":["CVE-2016-1661"],"risk_score":3.8,"exploitability":"0.5","weighted_severity":"7.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vax8-arng-hyhr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48262?format=json","vulnerability_id":"VCID-z9hd-cdnj-mbfm","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0707.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0707.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1666.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1666.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1666","reference_id":"","reference_type":"","scores":[{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73706","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73703","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73713","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73576","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73585","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73608","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73581","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73617","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.7363","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73652","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73635","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73626","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.7367","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73679","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1666"},{"reference_url":"https://bugs.chromium.org/p/chromium/issues/detail?id=601001","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.chromium.org/p/chromium/issues/detail?id=601001"},{"reference_url":"https://bugs.chromium.org/p/chromium/issues/detail?id=605491","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.chromium.org/p/chromium/issues/detail?id=605491"},{"reference_url":"https://crbug.com/607652","reference_id":"","reference_type":"","scores":[],"url":"https://crbug.com/607652"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.debian.org/security/2016/dsa-3564","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3564"},{"reference_url":"http://www.securityfocus.com/bid/89106","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/89106"},{"reference_url":"http://www.ubuntu.com/usn/USN-2960-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2960-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1331642","reference_id":"1331642","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1331642"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1666","reference_id":"CVE-2016-1666","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1666"},{"reference_url":"https://security.gentoo.org/glsa/201605-02","reference_id":"GLSA-201605-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0707","reference_id":"RHSA-2016:0707","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0707"},{"reference_url":"https://usn.ubuntu.com/2960-1/","reference_id":"USN-2960-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2960-1/"}],"fixed_packages":[],"aliases":["CVE-2016-1666"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z9hd-cdnj-mbfm"}],"fixing_vulnerabilities":[],"risk_score":"4.5","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/chromium-browser@50.0.2661.94-1%3Farch=el6"}