{"url":"http://public2.vulnerablecode.io/api/packages/115519?format=json","purl":"pkg:rpm/redhat/chromium-browser@50.0.2661.75-1?arch=el6","type":"rpm","namespace":"redhat","name":"chromium-browser","version":"50.0.2661.75-1","qualifiers":{"arch":"el6"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48255?format=json","vulnerability_id":"VCID-4ypa-zvcs-xuhh","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0638.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0638.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1659.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1659.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1659","reference_id":"","reference_type":"","scores":[{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85282","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85267","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85147","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85158","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85176","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85178","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.852","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85208","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85222","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85219","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85216","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85236","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85237","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85261","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85269","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1659"},{"reference_url":"https://crbug.com/602697","reference_id":"","reference_type":"","scores":[],"url":"https://crbug.com/602697"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1651","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1651"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1652","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1652"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1653","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1653"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1654","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1654"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1655","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1655"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1657","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1657"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1658"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1659","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1659"},{"reference_url":"http://www.debian.org/security/2016/dsa-3549","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3549"},{"reference_url":"http://www.ubuntu.com/usn/USN-2955-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2955-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1327120","reference_id":"1327120","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1327120"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1659","reference_id":"CVE-2016-1659","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"},{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1659"},{"reference_url":"https://security.gentoo.org/glsa/201605-02","reference_id":"GLSA-201605-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0638","reference_id":"RHSA-2016:0638","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0638"},{"reference_url":"https://usn.ubuntu.com/2955-1/","reference_id":"USN-2955-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2955-1/"}],"fixed_packages":[],"aliases":["CVE-2016-1659"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4ypa-zvcs-xuhh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48249?format=json","vulnerability_id":"VCID-7k4q-jnya-gyhp","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0638.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0638.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1653.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1653.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1653","reference_id":"","reference_type":"","scores":[{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81327","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81311","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81175","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81183","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81207","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81234","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.8124","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.8126","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81246","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81238","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81275","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81277","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81276","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81298","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01518","scoring_system":"epss","scoring_elements":"0.81306","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1653"},{"reference_url":"https://codereview.chromium.org/1740123002","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/1740123002"},{"reference_url":"https://crbug.com/589792","reference_id":"","reference_type":"","scores":[],"url":"https://crbug.com/589792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1651","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1651"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1652","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1652"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1653","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1653"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1654","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1654"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1655","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1655"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1657","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1657"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1658"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1659","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1659"},{"reference_url":"http://www.debian.org/security/2016/dsa-3549","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3549"},{"reference_url":"http://www.ubuntu.com/usn/USN-2955-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2955-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1327110","reference_id":"1327110","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1327110"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1653","reference_id":"CVE-2016-1653","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1653"},{"reference_url":"https://security.gentoo.org/glsa/201605-02","reference_id":"GLSA-201605-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0638","reference_id":"RHSA-2016:0638","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0638"},{"reference_url":"https://usn.ubuntu.com/2955-1/","reference_id":"USN-2955-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2955-1/"}],"fixed_packages":[],"aliases":["CVE-2016-1653"],"risk_score":4.2,"exploitability":"0.5","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7k4q-jnya-gyhp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48250?format=json","vulnerability_id":"VCID-ccvx-hz83-kyaw","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0638.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0638.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1654.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1654.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1654","reference_id":"","reference_type":"","scores":[{"value":"0.0249","scoring_system":"epss","scoring_elements":"0.85379","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0249","scoring_system":"epss","scoring_elements":"0.85365","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0249","scoring_system":"epss","scoring_elements":"0.85243","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0249","scoring_system":"epss","scoring_elements":"0.85255","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0249","scoring_system":"epss","scoring_elements":"0.85274","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0249","scoring_system":"epss","scoring_elements":"0.85276","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0249","scoring_system":"epss","scoring_elements":"0.85298","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0249","scoring_system":"epss","scoring_elements":"0.85306","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0249","scoring_system":"epss","scoring_elements":"0.85321","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0249","scoring_system":"epss","scoring_elements":"0.85319","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0249","scoring_system":"epss","scoring_elements":"0.85316","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0249","scoring_system":"epss","scoring_elements":"0.85336","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0249","scoring_system":"epss","scoring_elements":"0.85337","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0249","scoring_system":"epss","scoring_elements":"0.85334","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0249","scoring_system":"epss","scoring_elements":"0.85357","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0249","scoring_system":"epss","scoring_elements":"0.85366","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1654"},{"reference_url":"https://crbug.com/589512","reference_id":"","reference_type":"","scores":[],"url":"https://crbug.com/589512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1651","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1651"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1652","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1652"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1653","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1653"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1654","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1654"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1655","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1655"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1657","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1657"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1658"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1659","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1659"},{"reference_url":"http://www.debian.org/security/2016/dsa-3549","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3549"},{"reference_url":"http://www.ubuntu.com/usn/USN-2955-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2955-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1327112","reference_id":"1327112","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1327112"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1654","reference_id":"CVE-2016-1654","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1654"},{"reference_url":"https://security.gentoo.org/glsa/201605-02","reference_id":"GLSA-201605-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0638","reference_id":"RHSA-2016:0638","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0638"},{"reference_url":"https://usn.ubuntu.com/2955-1/","reference_id":"USN-2955-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2955-1/"}],"fixed_packages":[],"aliases":["CVE-2016-1654"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ccvx-hz83-kyaw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48248?format=json","vulnerability_id":"VCID-dt8r-g6xf-3uhj","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0638.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0638.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1652.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1652.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1652","reference_id":"","reference_type":"","scores":[{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61344","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61393","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61245","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61324","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61354","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61323","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.6137","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61385","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61406","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61391","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61372","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.6141","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61414","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61396","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61399","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1652"},{"reference_url":"https://codereview.chromium.org/1748943002/","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/1748943002/"},{"reference_url":"https://crbug.com/590275","reference_id":"","reference_type":"","scores":[],"url":"https://crbug.com/590275"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1651","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1651"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1652","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1652"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1653","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1653"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1654","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1654"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1655","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1655"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1657","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1657"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1658"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1659","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1659"},{"reference_url":"http://www.debian.org/security/2016/dsa-3549","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3549"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1327109","reference_id":"1327109","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1327109"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1652","reference_id":"CVE-2016-1652","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"},{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1652"},{"reference_url":"https://security.gentoo.org/glsa/201605-02","reference_id":"GLSA-201605-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0638","reference_id":"RHSA-2016:0638","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0638"}],"fixed_packages":[],"aliases":["CVE-2016-1652"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dt8r-g6xf-3uhj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48251?format=json","vulnerability_id":"VCID-k9aj-xsjv-bbfk","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0638.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0638.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1655.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1655.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1655","reference_id":"","reference_type":"","scores":[{"value":"0.03027","scoring_system":"epss","scoring_elements":"0.86708","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03027","scoring_system":"epss","scoring_elements":"0.86686","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03027","scoring_system":"epss","scoring_elements":"0.86585","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03027","scoring_system":"epss","scoring_elements":"0.86595","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03027","scoring_system":"epss","scoring_elements":"0.86614","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03027","scoring_system":"epss","scoring_elements":"0.86634","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03027","scoring_system":"epss","scoring_elements":"0.86643","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03027","scoring_system":"epss","scoring_elements":"0.86657","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03027","scoring_system":"epss","scoring_elements":"0.86654","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03027","scoring_system":"epss","scoring_elements":"0.86647","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03027","scoring_system":"epss","scoring_elements":"0.8666","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03027","scoring_system":"epss","scoring_elements":"0.86666","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03027","scoring_system":"epss","scoring_elements":"0.86678","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1655"},{"reference_url":"https://codereview.chromium.org/1642283002","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/1642283002"},{"reference_url":"https://crbug.com/582008","reference_id":"","reference_type":"","scores":[],"url":"https://crbug.com/582008"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1651","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1651"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1652","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1652"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1653","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1653"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1654","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1654"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1655","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1655"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1657","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1657"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1658"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1659","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1659"},{"reference_url":"http://www.debian.org/security/2016/dsa-3549","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3549"},{"reference_url":"http://www.ubuntu.com/usn/USN-2955-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2955-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1327113","reference_id":"1327113","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1327113"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1655","reference_id":"CVE-2016-1655","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1655"},{"reference_url":"https://security.gentoo.org/glsa/201605-02","reference_id":"GLSA-201605-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0638","reference_id":"RHSA-2016:0638","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0638"},{"reference_url":"https://usn.ubuntu.com/2955-1/","reference_id":"USN-2955-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2955-1/"}],"fixed_packages":[],"aliases":["CVE-2016-1655"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k9aj-xsjv-bbfk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48253?format=json","vulnerability_id":"VCID-mz2v-rfmy-6uhp","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0638.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0638.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1657.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1657.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1657","reference_id":"","reference_type":"","scores":[{"value":"0.02176","scoring_system":"epss","scoring_elements":"0.8442","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02176","scoring_system":"epss","scoring_elements":"0.84401","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02176","scoring_system":"epss","scoring_elements":"0.84268","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02176","scoring_system":"epss","scoring_elements":"0.8428","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02176","scoring_system":"epss","scoring_elements":"0.84299","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02176","scoring_system":"epss","scoring_elements":"0.84301","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02176","scoring_system":"epss","scoring_elements":"0.84322","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02176","scoring_system":"epss","scoring_elements":"0.84328","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02176","scoring_system":"epss","scoring_elements":"0.84346","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02176","scoring_system":"epss","scoring_elements":"0.84338","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02176","scoring_system":"epss","scoring_elements":"0.84335","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02176","scoring_system":"epss","scoring_elements":"0.84357","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02176","scoring_system":"epss","scoring_elements":"0.8436","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02176","scoring_system":"epss","scoring_elements":"0.84387","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02176","scoring_system":"epss","scoring_elements":"0.84396","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1657"},{"reference_url":"https://codereview.chromium.org/1678233003/","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/1678233003/"},{"reference_url":"https://crbug.com/567445","reference_id":"","reference_type":"","scores":[],"url":"https://crbug.com/567445"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1651","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1651"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1652","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1652"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1653","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1653"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1654","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1654"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1655","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1655"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1657","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1657"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1658"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1659","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1659"},{"reference_url":"http://www.debian.org/security/2016/dsa-3549","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3549"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1327115","reference_id":"1327115","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1327115"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_package_hub_for_suse_linux_enterprise:12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:novell:suse_package_hub_for_suse_linux_enterprise:12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_package_hub_for_suse_linux_enterprise:12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1657","reference_id":"CVE-2016-1657","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"},{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1657"},{"reference_url":"https://security.gentoo.org/glsa/201605-02","reference_id":"GLSA-201605-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0638","reference_id":"RHSA-2016:0638","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0638"}],"fixed_packages":[],"aliases":["CVE-2016-1657"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mz2v-rfmy-6uhp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48254?format=json","vulnerability_id":"VCID-qu3h-aycb-2qb1","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0638.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0638.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1658.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1658.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1658","reference_id":"","reference_type":"","scores":[{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75475","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75467","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75331","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75334","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75367","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75346","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.7539","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75399","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75419","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75398","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75386","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75428","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75434","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75423","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75458","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75462","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1658"},{"reference_url":"https://codereview.chromium.org/1658913002","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/1658913002"},{"reference_url":"https://crbug.com/573317","reference_id":"","reference_type":"","scores":[],"url":"https://crbug.com/573317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1651","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1651"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1652","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1652"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1653","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1653"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1654","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1654"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1655","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1655"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1657","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1657"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1658"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1659","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1659"},{"reference_url":"http://www.debian.org/security/2016/dsa-3549","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3549"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1327117","reference_id":"1327117","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1327117"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_package_hub_for_suse_linux_enterprise:12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:novell:suse_package_hub_for_suse_linux_enterprise:12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_package_hub_for_suse_linux_enterprise:12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1658","reference_id":"CVE-2016-1658","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"},{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1658"},{"reference_url":"https://security.gentoo.org/glsa/201605-02","reference_id":"GLSA-201605-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0638","reference_id":"RHSA-2016:0638","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0638"}],"fixed_packages":[],"aliases":["CVE-2016-1658"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qu3h-aycb-2qb1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48252?format=json","vulnerability_id":"VCID-tbp1-4ah8-nqft","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0638.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0638.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1656.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1656.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1656","reference_id":"","reference_type":"","scores":[{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.60954","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.61006","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.6086","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.60932","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.60961","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.60927","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.60976","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.60992","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.61013","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.60999","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.60979","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.61021","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.61027","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.61012","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.61002","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.61014","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1656"},{"reference_url":"https://crbug.com/570750","reference_id":"","reference_type":"","scores":[],"url":"https://crbug.com/570750"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1327114","reference_id":"1327114","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1327114"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1656","reference_id":"CVE-2016-1656","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:N"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1656"},{"reference_url":"https://security.gentoo.org/glsa/201605-02","reference_id":"GLSA-201605-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0638","reference_id":"RHSA-2016:0638","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0638"}],"fixed_packages":[],"aliases":["CVE-2016-1656"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tbp1-4ah8-nqft"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48247?format=json","vulnerability_id":"VCID-uw67-r9p5-j7bj","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_13.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00040.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00041.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00049.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00050.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0638.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0638.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1651.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1651.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1651","reference_id":"","reference_type":"","scores":[{"value":"0.01385","scoring_system":"epss","scoring_elements":"0.8042","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01385","scoring_system":"epss","scoring_elements":"0.80404","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01385","scoring_system":"epss","scoring_elements":"0.80265","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01385","scoring_system":"epss","scoring_elements":"0.80272","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01385","scoring_system":"epss","scoring_elements":"0.80293","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01385","scoring_system":"epss","scoring_elements":"0.80281","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01385","scoring_system":"epss","scoring_elements":"0.80309","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01385","scoring_system":"epss","scoring_elements":"0.80319","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01385","scoring_system":"epss","scoring_elements":"0.80338","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01385","scoring_system":"epss","scoring_elements":"0.80324","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01385","scoring_system":"epss","scoring_elements":"0.80317","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01385","scoring_system":"epss","scoring_elements":"0.80347","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01385","scoring_system":"epss","scoring_elements":"0.80349","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01385","scoring_system":"epss","scoring_elements":"0.80354","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01385","scoring_system":"epss","scoring_elements":"0.8038","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01385","scoring_system":"epss","scoring_elements":"0.80387","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1651"},{"reference_url":"https://codereview.chromium.org/1837383011","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/1837383011"},{"reference_url":"https://crbug.com/591785","reference_id":"","reference_type":"","scores":[],"url":"https://crbug.com/591785"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1651","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1651"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1652","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1652"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1653","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1653"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1654","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1654"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1655","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1655"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1657","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1657"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1658"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1659","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1659"},{"reference_url":"http://www.debian.org/security/2016/dsa-3549","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3549"},{"reference_url":"http://zerodayinitiative.com/advisories/ZDI-16-243/","reference_id":"","reference_type":"","scores":[],"url":"http://zerodayinitiative.com/advisories/ZDI-16-243/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1327111","reference_id":"1327111","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1327111"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1651","reference_id":"CVE-2016-1651","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:P"},{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1651"},{"reference_url":"https://security.gentoo.org/glsa/201605-02","reference_id":"GLSA-201605-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0638","reference_id":"RHSA-2016:0638","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0638"}],"fixed_packages":[],"aliases":["CVE-2016-1651"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uw67-r9p5-j7bj"}],"fixing_vulnerabilities":[],"risk_score":"4.5","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/chromium-browser@50.0.2661.75-1%3Farch=el6"}