Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/115850?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/115850?format=api", "purl": "pkg:rpm/redhat/chromium-browser@49.0.2623.75-1?arch=el6", "type": "rpm", "namespace": "redhat", "name": "chromium-browser", "version": "49.0.2623.75-1", "qualifiers": { "arch": "el6" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62160?format=api", "vulnerability_id": "VCID-1jtu-nswz-jfed", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00028.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00028.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1641.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1641.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1641", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01738", "scoring_system": "epss", "scoring_elements": "0.82685", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.01738", "scoring_system": "epss", "scoring_elements": "0.82644", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01738", "scoring_system": "epss", "scoring_elements": "0.82416", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01738", "scoring_system": "epss", "scoring_elements": "0.82431", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01738", "scoring_system": "epss", "scoring_elements": "0.82449", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01738", "scoring_system": "epss", "scoring_elements": "0.82445", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01738", "scoring_system": "epss", "scoring_elements": "0.82472", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01738", "scoring_system": "epss", "scoring_elements": "0.82479", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01738", "scoring_system": "epss", "scoring_elements": "0.82497", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01738", "scoring_system": "epss", "scoring_elements": "0.82493", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01738", "scoring_system": "epss", "scoring_elements": "0.82488", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01738", "scoring_system": "epss", "scoring_elements": "0.82525", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01738", "scoring_system": "epss", "scoring_elements": "0.82526", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01738", "scoring_system": "epss", "scoring_elements": "0.8253", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01738", "scoring_system": "epss", "scoring_elements": "0.82552", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01738", "scoring_system": "epss", "scoring_elements": "0.82562", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01738", "scoring_system": "epss", "scoring_elements": "0.82567", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01738", "scoring_system": "epss", "scoring_elements": "0.82588", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01738", "scoring_system": "epss", "scoring_elements": "0.82609", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01738", "scoring_system": "epss", "scoring_elements": "0.82629", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01738", "scoring_system": "epss", "scoring_elements": "0.82628", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1641" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=583718", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=583718" }, { "reference_url": "https://codereview.chromium.org/1730363003", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/1730363003" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8126", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1630", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1630" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1631", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1631" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1632", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1632" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1633", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1633" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1634", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1634" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1635", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1635" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1636", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1636" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1637", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1637" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1638", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1638" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1639", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1639" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1640", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1640" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1641", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1641" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1642", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1642" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2843", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2844", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2844" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2845" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3507", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3507" }, { "reference_url": "http://www.securityfocus.com/bid/84008", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/84008" }, { "reference_url": "http://www.securitytracker.com/id/1035185", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035185" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2920-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2920-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314226", "reference_id": "1314226", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314226" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1641", "reference_id": "CVE-2016-1641", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1641" }, { "reference_url": "https://security.gentoo.org/glsa/201603-09", "reference_id": "GLSA-201603-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0359", "reference_id": "RHSA-2016:0359", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0359" }, { "reference_url": "https://usn.ubuntu.com/2920-1/", "reference_id": "USN-2920-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2920-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-1641" ], "risk_score": 4.2, "exploitability": "0.5", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1jtu-nswz-jfed" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62158?format=api", "vulnerability_id": "VCID-1jur-y2e7-vygt", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00028.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00028.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1639.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1639.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1639", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05701", "scoring_system": "epss", "scoring_elements": "0.90498", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.05701", "scoring_system": "epss", "scoring_elements": "0.90485", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.05701", "scoring_system": "epss", "scoring_elements": "0.90375", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05701", "scoring_system": "epss", "scoring_elements": "0.90378", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05701", "scoring_system": "epss", "scoring_elements": "0.9039", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05701", "scoring_system": "epss", "scoring_elements": "0.90395", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05701", "scoring_system": "epss", "scoring_elements": "0.90409", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05701", "scoring_system": "epss", "scoring_elements": "0.90415", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05701", "scoring_system": "epss", "scoring_elements": "0.90423", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05701", "scoring_system": "epss", "scoring_elements": "0.90431", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.05701", "scoring_system": "epss", "scoring_elements": "0.9043", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05701", "scoring_system": "epss", "scoring_elements": "0.90428", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.05701", "scoring_system": "epss", "scoring_elements": "0.90442", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.05701", "scoring_system": "epss", "scoring_elements": "0.90441", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.05701", "scoring_system": "epss", "scoring_elements": "0.90438", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.05701", "scoring_system": "epss", "scoring_elements": "0.9045", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.05701", "scoring_system": "epss", "scoring_elements": "0.90467", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.05701", "scoring_system": "epss", "scoring_elements": "0.90479", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.05701", "scoring_system": "epss", "scoring_elements": "0.90476", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1639" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=572224", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=572224" }, { "reference_url": "https://codereview.chromium.org/1703733002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/1703733002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8126", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1630", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1630" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1631", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1631" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1632", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1632" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1633", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1633" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1634", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1634" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1635", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1635" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1636", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1636" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1637", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1637" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1638", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1638" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1639", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1639" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1640", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1640" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1641", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1641" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1642", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1642" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2843", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2844", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2844" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2845" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3507", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3507" }, { "reference_url": "http://www.securityfocus.com/bid/84008", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/84008" }, { "reference_url": "http://www.securitytracker.com/id/1035185", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035185" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314224", "reference_id": "1314224", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314224" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1639", "reference_id": "CVE-2016-1639", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1639" }, { "reference_url": "https://security.gentoo.org/glsa/201603-09", "reference_id": "GLSA-201603-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0359", "reference_id": "RHSA-2016:0359", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0359" } ], "fixed_packages": [], "aliases": [ "CVE-2016-1639" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1jur-y2e7-vygt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62159?format=api", "vulnerability_id": "VCID-2vve-gx1n-yug9", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00028.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00028.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1640.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1640.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1640", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73584", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73526", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73363", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73372", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73396", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73368", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73404", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73418", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73441", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73421", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73414", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73456", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73464", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73458", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73491", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73503", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.735", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73494", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.7352", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00764", "scoring_system": "epss", "scoring_elements": "0.73543", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1640" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=550047", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=550047" }, { "reference_url": "https://codereview.chromium.org/1496033003", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/1496033003" }, { "reference_url": "https://codereview.chromium.org/1554233005", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/1554233005" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8126", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1630", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1630" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1631", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1631" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1632", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1632" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1633", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1633" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1634", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1634" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1635", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1635" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1636", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1636" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1637", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1637" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1638", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1638" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1639", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1639" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1640", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1640" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1641", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1641" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1642", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1642" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2843", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2844", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2844" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2845" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3507", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3507" }, { "reference_url": "http://www.securityfocus.com/bid/84008", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/84008" }, { "reference_url": "http://www.securitytracker.com/id/1035185", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035185" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314225", "reference_id": "1314225", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314225" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1640", "reference_id": "CVE-2016-1640", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N" }, { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1640" }, { "reference_url": "https://security.gentoo.org/glsa/201603-09", "reference_id": "GLSA-201603-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0359", "reference_id": "RHSA-2016:0359", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0359" } ], "fixed_packages": [], "aliases": [ "CVE-2016-1640" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2vve-gx1n-yug9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62151?format=api", "vulnerability_id": "VCID-45ct-rn2t-x7ak", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00028.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00028.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1632.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1632.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1632", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01206", "scoring_system": "epss", "scoring_elements": "0.7914", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.01206", "scoring_system": "epss", "scoring_elements": "0.79104", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01206", "scoring_system": "epss", "scoring_elements": "0.78914", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01206", "scoring_system": "epss", "scoring_elements": "0.7892", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01206", "scoring_system": "epss", "scoring_elements": "0.78948", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01206", "scoring_system": "epss", "scoring_elements": "0.78932", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01206", "scoring_system": "epss", "scoring_elements": "0.78956", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01206", "scoring_system": "epss", "scoring_elements": "0.78962", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01206", "scoring_system": "epss", "scoring_elements": "0.78986", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01206", "scoring_system": "epss", "scoring_elements": "0.78971", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01206", "scoring_system": "epss", "scoring_elements": "0.78961", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01206", "scoring_system": "epss", "scoring_elements": "0.78989", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01206", "scoring_system": "epss", "scoring_elements": "0.78985", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01206", "scoring_system": "epss", "scoring_elements": "0.79016", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01206", "scoring_system": "epss", "scoring_elements": "0.79022", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01206", "scoring_system": "epss", "scoring_elements": "0.79038", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01206", "scoring_system": "epss", "scoring_elements": "0.79053", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01206", "scoring_system": "epss", "scoring_elements": "0.79074", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01206", "scoring_system": "epss", "scoring_elements": "0.7909", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01206", "scoring_system": "epss", "scoring_elements": "0.79088", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1632" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=549986", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=549986" }, { "reference_url": "https://codereview.chromium.org/1433293004", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/1433293004" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8126", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1630", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1630" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1631", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1631" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1632", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1632" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1633", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1633" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1634", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1634" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1635", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1635" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1636", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1636" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1637", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1637" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1638", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1638" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1639", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1639" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1640", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1640" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1641", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1641" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1642", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1642" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2843", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2844", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2844" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2845" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3507", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3507" }, { "reference_url": "http://www.securityfocus.com/bid/84008", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/84008" }, { "reference_url": "http://www.securitytracker.com/id/1035185", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035185" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314216", "reference_id": "1314216", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314216" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1632", "reference_id": "CVE-2016-1632", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1632" }, { "reference_url": "https://security.gentoo.org/glsa/201603-09", "reference_id": "GLSA-201603-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0359", "reference_id": "RHSA-2016:0359", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0359" } ], "fixed_packages": [], "aliases": [ "CVE-2016-1632" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-45ct-rn2t-x7ak" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81077?format=api", "vulnerability_id": "VCID-6zf4-cwuz-fffk", "summary": "security update", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2843.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2843.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2843", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00889", "scoring_system": "epss", "scoring_elements": "0.7571", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00889", "scoring_system": "epss", "scoring_elements": "0.75654", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00889", "scoring_system": "epss", "scoring_elements": "0.75454", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00889", "scoring_system": "epss", "scoring_elements": "0.75456", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00889", "scoring_system": "epss", "scoring_elements": "0.75487", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00889", "scoring_system": "epss", "scoring_elements": "0.75468", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00889", "scoring_system": "epss", "scoring_elements": "0.7551", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00889", "scoring_system": "epss", "scoring_elements": "0.75519", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00889", "scoring_system": "epss", "scoring_elements": "0.75539", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00889", "scoring_system": "epss", "scoring_elements": "0.75518", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00889", "scoring_system": "epss", "scoring_elements": "0.75509", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00889", "scoring_system": "epss", "scoring_elements": "0.75551", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00889", "scoring_system": "epss", "scoring_elements": "0.75556", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00889", "scoring_system": "epss", "scoring_elements": "0.75543", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00889", "scoring_system": "epss", "scoring_elements": "0.75581", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00889", "scoring_system": "epss", "scoring_elements": "0.75585", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00889", "scoring_system": "epss", "scoring_elements": "0.7559", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00889", "scoring_system": "epss", "scoring_elements": "0.75601", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00889", "scoring_system": "epss", "scoring_elements": "0.7563", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00889", "scoring_system": "epss", "scoring_elements": "0.75656", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00889", "scoring_system": "epss", "scoring_elements": "0.75638", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8126", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1630", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1630" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1631", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1631" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1632", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1632" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1633", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1633" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1634", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1634" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1635", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1635" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1636", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1636" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1637", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1637" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1638", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1638" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1639", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1639" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1640", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1640" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1641", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1641" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1642", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1642" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2843", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2844", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2844" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2845" }, { "reference_url": "http://www.securitytracker.com/id/1035185", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035185" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2920-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2920-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1315359", "reference_id": "1315359", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1315359" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2843", "reference_id": "CVE-2016-2843", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2843" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0359", "reference_id": "RHSA-2016:0359", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0359" }, { "reference_url": "https://usn.ubuntu.com/2920-1/", "reference_id": "USN-2920-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2920-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-2843" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6zf4-cwuz-fffk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62153?format=api", "vulnerability_id": "VCID-7hu5-e7gd-u7c8", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00028.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00028.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1634.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1634.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1634", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01954", "scoring_system": "epss", "scoring_elements": "0.8366", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.01954", "scoring_system": "epss", "scoring_elements": "0.83625", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01954", "scoring_system": "epss", "scoring_elements": "0.83409", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01954", "scoring_system": "epss", "scoring_elements": "0.83422", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01954", "scoring_system": "epss", "scoring_elements": "0.83436", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01954", "scoring_system": "epss", "scoring_elements": "0.83435", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01954", "scoring_system": "epss", "scoring_elements": "0.8346", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01954", "scoring_system": "epss", "scoring_elements": "0.83469", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01954", "scoring_system": "epss", "scoring_elements": "0.83484", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01954", "scoring_system": "epss", "scoring_elements": "0.83478", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01954", "scoring_system": "epss", "scoring_elements": "0.83473", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01954", "scoring_system": "epss", "scoring_elements": "0.8351", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01954", "scoring_system": "epss", "scoring_elements": "0.83511", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01954", "scoring_system": "epss", "scoring_elements": "0.83512", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01954", "scoring_system": "epss", "scoring_elements": "0.83535", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01954", "scoring_system": "epss", "scoring_elements": "0.83542", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01954", "scoring_system": "epss", "scoring_elements": "0.83545", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01954", "scoring_system": "epss", "scoring_elements": "0.83569", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01954", "scoring_system": "epss", "scoring_elements": "0.8359", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01954", "scoring_system": "epss", "scoring_elements": "0.83608", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01954", "scoring_system": "epss", "scoring_elements": "0.83609", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1634" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=559292", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=559292" }, { "reference_url": "https://codereview.chromium.org/1556963002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/1556963002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8126", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1630", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1630" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1631", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1631" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1632", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1632" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1633", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1633" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1634", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1634" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1635", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1635" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1636", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1636" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1637", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1637" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1638", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1638" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1639", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1639" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1640", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1640" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1641", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1641" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1642", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1642" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2843", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2844", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2844" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2845" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3507", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3507" }, { "reference_url": "http://www.securityfocus.com/bid/84008", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/84008" }, { "reference_url": "http://www.securitytracker.com/id/1035185", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035185" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2920-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2920-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314218", "reference_id": "1314218", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314218" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1634", "reference_id": "CVE-2016-1634", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1634" }, { "reference_url": "https://security.gentoo.org/glsa/201603-09", "reference_id": "GLSA-201603-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0359", "reference_id": "RHSA-2016:0359", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0359" }, { "reference_url": "https://usn.ubuntu.com/2920-1/", "reference_id": "USN-2920-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2920-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-1634" ], "risk_score": 4.2, "exploitability": "0.5", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7hu5-e7gd-u7c8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81076?format=api", "vulnerability_id": "VCID-7s6z-1jyy-mkdb", "summary": "security update", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2844.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2844.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2844", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01985", "scoring_system": "epss", "scoring_elements": "0.83773", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.01985", "scoring_system": "epss", "scoring_elements": "0.83738", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01985", "scoring_system": "epss", "scoring_elements": "0.83526", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01985", "scoring_system": "epss", "scoring_elements": "0.83539", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01985", "scoring_system": "epss", "scoring_elements": "0.83553", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01985", "scoring_system": "epss", "scoring_elements": "0.83554", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01985", "scoring_system": "epss", "scoring_elements": "0.83578", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01985", "scoring_system": "epss", "scoring_elements": "0.83587", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01985", "scoring_system": "epss", "scoring_elements": "0.83602", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01985", "scoring_system": "epss", "scoring_elements": "0.83596", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01985", "scoring_system": "epss", "scoring_elements": "0.83592", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01985", "scoring_system": "epss", "scoring_elements": "0.83626", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01985", "scoring_system": "epss", "scoring_elements": "0.83628", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01985", "scoring_system": "epss", "scoring_elements": "0.83627", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01985", "scoring_system": "epss", "scoring_elements": "0.83652", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01985", "scoring_system": "epss", "scoring_elements": "0.83659", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01985", "scoring_system": "epss", "scoring_elements": "0.83662", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01985", "scoring_system": "epss", "scoring_elements": "0.83685", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01985", "scoring_system": "epss", "scoring_elements": "0.83705", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01985", "scoring_system": "epss", "scoring_elements": "0.83722", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2844" }, { "reference_url": "https://bugs.chromium.org/p/chromium/issues/detail?id=546849", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.chromium.org/p/chromium/issues/detail?id=546849" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=591402", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=591402" }, { "reference_url": "https://codereview.chromium.org/1423573002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/1423573002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8126", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1630", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1630" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1631", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1631" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1632", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1632" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1633", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1633" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1634", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1634" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1635", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1635" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1636", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1636" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1637", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1637" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1638", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1638" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1639", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1639" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1640", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1640" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1641", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1641" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1642", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1642" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2843", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2844", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2844" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2845" }, { "reference_url": "http://www.securityfocus.com/bid/84170", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/84170" }, { "reference_url": "http://www.securitytracker.com/id/1035185", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035185" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2920-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2920-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1315361", "reference_id": "1315361", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1315361" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2844", "reference_id": "CVE-2016-2844", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2844" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0359", "reference_id": "RHSA-2016:0359", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0359" }, { "reference_url": "https://usn.ubuntu.com/2920-1/", "reference_id": "USN-2920-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2920-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-2844" ], "risk_score": 4.2, "exploitability": "0.5", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7s6z-1jyy-mkdb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62150?format=api", "vulnerability_id": "VCID-7ygh-1dye-nbek", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00028.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00028.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1631.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1631.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1631", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76796", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76749", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76571", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76575", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76604", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76585", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76617", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76628", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76655", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76634", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76625", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76667", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.7667", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76659", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.7669", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76697", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76709", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76696", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76727", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76744", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76732", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1631" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=569496", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=569496" }, { "reference_url": "https://codereview.chromium.org/1559113002/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/1559113002/" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8126", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1630", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1630" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1631", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1631" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1632", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1632" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1633", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1633" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1634", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1634" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1635", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1635" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1636", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1636" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1637", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1637" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1638", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1638" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1639", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1639" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1640", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1640" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1641", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1641" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1642", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1642" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2843", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2844", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2844" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2845" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3507", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3507" }, { "reference_url": "http://www.securityfocus.com/bid/84008", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/84008" }, { "reference_url": "http://www.securitytracker.com/id/1035185", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035185" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2920-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2920-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314215", "reference_id": "1314215", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314215" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1631", "reference_id": "CVE-2016-1631", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1631" }, { "reference_url": "https://security.gentoo.org/glsa/201603-09", "reference_id": "GLSA-201603-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0359", "reference_id": "RHSA-2016:0359", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0359" }, { "reference_url": "https://usn.ubuntu.com/2920-1/", "reference_id": "USN-2920-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2920-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-1631" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7ygh-1dye-nbek" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62154?format=api", "vulnerability_id": "VCID-e5sy-dqnn-wugr", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00028.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00028.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1635.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1635.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1635", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05573", "scoring_system": "epss", "scoring_elements": "0.90373", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.05573", "scoring_system": "epss", "scoring_elements": "0.9036", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.05573", "scoring_system": "epss", "scoring_elements": "0.90248", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05573", "scoring_system": "epss", "scoring_elements": "0.90251", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05573", "scoring_system": "epss", "scoring_elements": "0.90264", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05573", "scoring_system": "epss", "scoring_elements": "0.90269", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05573", "scoring_system": "epss", "scoring_elements": "0.90284", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05573", "scoring_system": "epss", "scoring_elements": "0.9029", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05573", "scoring_system": "epss", "scoring_elements": "0.90299", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05573", "scoring_system": "epss", "scoring_elements": "0.90298", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05573", "scoring_system": "epss", "scoring_elements": "0.90292", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05573", "scoring_system": "epss", "scoring_elements": "0.90309", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05573", "scoring_system": "epss", "scoring_elements": "0.90306", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.05573", "scoring_system": "epss", "scoring_elements": "0.90321", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.05573", "scoring_system": "epss", "scoring_elements": "0.9032", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.05573", "scoring_system": "epss", "scoring_elements": "0.90316", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.05573", "scoring_system": "epss", "scoring_elements": "0.90327", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.05573", "scoring_system": "epss", "scoring_elements": "0.90344", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.05573", "scoring_system": "epss", "scoring_elements": "0.90354", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.05573", "scoring_system": "epss", "scoring_elements": "0.90351", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1635" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=585268", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=585268" }, { "reference_url": "https://codereview.chromium.org/1684953002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/1684953002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8126", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1630", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1630" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1631", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1631" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1632", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1632" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1633", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1633" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1634", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1634" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1635", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1635" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1636", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1636" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1637", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1637" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1638", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1638" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1639", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1639" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1640", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1640" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1641", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1641" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1642", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1642" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2843", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2844", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2844" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2845" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3507", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3507" }, { "reference_url": "http://www.securityfocus.com/bid/84008", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/84008" }, { "reference_url": "http://www.securitytracker.com/id/1035185", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035185" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314219", "reference_id": "1314219", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314219" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1635", "reference_id": "CVE-2016-1635", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1635" }, { "reference_url": "https://security.gentoo.org/glsa/201603-09", "reference_id": "GLSA-201603-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0359", "reference_id": "RHSA-2016:0359", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0359" } ], "fixed_packages": [], "aliases": [ "CVE-2016-1635" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e5sy-dqnn-wugr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62157?format=api", "vulnerability_id": "VCID-ga8z-2yqq-hbbs", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00028.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00028.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1638.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1638.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1638", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.7361", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73552", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73392", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.734", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73422", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73395", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73432", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73445", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73469", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73449", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73441", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73483", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73492", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73486", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73519", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.7353", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73528", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73521", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73546", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.7357", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73529", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1638" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=585282", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=585282" }, { "reference_url": "https://codereview.chromium.org/1744623002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/1744623002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8126", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1630", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1630" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1631", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1631" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1632", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1632" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1633", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1633" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1634", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1634" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1635", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1635" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1636", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1636" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1637", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1637" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1638", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1638" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1639", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1639" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1640", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1640" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1641", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1641" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1642", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1642" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2843", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2844", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2844" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2845" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3507", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3507" }, { "reference_url": "http://www.securityfocus.com/bid/84008", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/84008" }, { "reference_url": "http://www.securitytracker.com/id/1035185", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035185" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314222", "reference_id": "1314222", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314222" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1638", "reference_id": "CVE-2016-1638", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1638" }, { "reference_url": "https://security.gentoo.org/glsa/201603-09", "reference_id": "GLSA-201603-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0359", "reference_id": "RHSA-2016:0359", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0359" } ], "fixed_packages": [], "aliases": [ "CVE-2016-1638" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ga8z-2yqq-hbbs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81074?format=api", "vulnerability_id": "VCID-jfsm-2a84-gbds", "summary": "security update", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00028.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00028.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1642.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1642.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1642", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01856", "scoring_system": "epss", "scoring_elements": "0.83225", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.01856", "scoring_system": "epss", "scoring_elements": "0.8319", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01856", "scoring_system": "epss", "scoring_elements": "0.82966", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01856", "scoring_system": "epss", "scoring_elements": "0.82983", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01856", "scoring_system": "epss", "scoring_elements": "0.82996", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01856", "scoring_system": "epss", "scoring_elements": "0.82993", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01856", "scoring_system": "epss", "scoring_elements": "0.83017", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01856", "scoring_system": "epss", "scoring_elements": "0.83025", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01856", "scoring_system": "epss", "scoring_elements": "0.8304", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01856", "scoring_system": "epss", "scoring_elements": "0.83034", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01856", "scoring_system": "epss", "scoring_elements": "0.83029", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01856", "scoring_system": "epss", "scoring_elements": "0.83068", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01856", "scoring_system": "epss", "scoring_elements": "0.83071", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01856", "scoring_system": "epss", "scoring_elements": "0.83094", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01856", "scoring_system": "epss", "scoring_elements": "0.83101", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01856", "scoring_system": "epss", "scoring_elements": "0.83108", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01856", "scoring_system": "epss", "scoring_elements": "0.83132", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01856", "scoring_system": "epss", "scoring_elements": "0.83152", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01856", "scoring_system": "epss", "scoring_elements": "0.83172", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01856", "scoring_system": "epss", "scoring_elements": "0.83173", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1642" }, { "reference_url": "https://bugs.chromium.org/p/chromium/issues/detail?id=472147", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.chromium.org/p/chromium/issues/detail?id=472147" }, { "reference_url": "https://bugs.chromium.org/p/chromium/issues/detail?id=563964", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.chromium.org/p/chromium/issues/detail?id=563964" }, { "reference_url": "https://bugs.chromium.org/p/chromium/issues/detail?id=565416", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.chromium.org/p/chromium/issues/detail?id=565416" }, { "reference_url": "https://bugs.chromium.org/p/chromium/issues/detail?id=565424", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.chromium.org/p/chromium/issues/detail?id=565424" }, { "reference_url": "https://bugs.chromium.org/p/chromium/issues/detail?id=582470", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.chromium.org/p/chromium/issues/detail?id=582470" }, { "reference_url": "https://bugs.chromium.org/p/chromium/issues/detail?id=582697", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.chromium.org/p/chromium/issues/detail?id=582697" }, { "reference_url": "https://bugs.chromium.org/p/chromium/issues/detail?id=582701", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.chromium.org/p/chromium/issues/detail?id=582701" }, { "reference_url": "https://bugs.chromium.org/p/chromium/issues/detail?id=582707", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.chromium.org/p/chromium/issues/detail?id=582707" }, { "reference_url": "https://bugs.chromium.org/p/chromium/issues/detail?id=589186", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.chromium.org/p/chromium/issues/detail?id=589186" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=591402", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=591402" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8126", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1630", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1630" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1631", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1631" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1632", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1632" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1633", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1633" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1634", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1634" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1635", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1635" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1636", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1636" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1637", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1637" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1638", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1638" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1639", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1639" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1640", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1640" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1641", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1641" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1642", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1642" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2843", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2844", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2844" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2845" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3507", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3507" }, { "reference_url": "http://www.securityfocus.com/bid/84008", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/84008" }, { "reference_url": "http://www.securitytracker.com/id/1035185", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035185" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2920-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2920-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314227", "reference_id": "1314227", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314227" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1642", "reference_id": "CVE-2016-1642", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1642" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0359", "reference_id": "RHSA-2016:0359", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0359" }, { "reference_url": "https://usn.ubuntu.com/2920-1/", "reference_id": "USN-2920-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2920-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-1642" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jfsm-2a84-gbds" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81075?format=api", "vulnerability_id": "VCID-px9k-cn6v-47ec", "summary": "security update", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" }, { "reference_url": "http://homakov.blogspot.com/2014/01/using-content-security-policy-for-evil.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://homakov.blogspot.com/2014/01/using-content-security-policy-for-evil.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2845.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2845.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2845", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00648", "scoring_system": "epss", "scoring_elements": "0.70977", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00648", "scoring_system": "epss", "scoring_elements": "0.70924", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00648", "scoring_system": "epss", "scoring_elements": "0.7072", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00648", "scoring_system": "epss", "scoring_elements": "0.70735", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00648", "scoring_system": "epss", "scoring_elements": "0.70753", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00648", "scoring_system": "epss", "scoring_elements": "0.70729", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00648", "scoring_system": "epss", "scoring_elements": "0.70773", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00648", "scoring_system": "epss", "scoring_elements": "0.7079", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00648", "scoring_system": "epss", "scoring_elements": "0.70812", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00648", "scoring_system": "epss", "scoring_elements": "0.70796", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00648", "scoring_system": "epss", "scoring_elements": "0.70781", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00648", "scoring_system": "epss", "scoring_elements": "0.70826", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00648", "scoring_system": "epss", "scoring_elements": "0.70832", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00648", "scoring_system": "epss", "scoring_elements": "0.7081", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00648", "scoring_system": "epss", "scoring_elements": "0.70863", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00648", "scoring_system": "epss", "scoring_elements": "0.70872", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00648", "scoring_system": "epss", "scoring_elements": "0.70871", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00648", "scoring_system": "epss", "scoring_elements": "0.70854", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00648", "scoring_system": "epss", "scoring_elements": "0.70894", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00648", "scoring_system": "epss", "scoring_elements": "0.70931", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00648", "scoring_system": "epss", "scoring_elements": "0.70897", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2845" }, { "reference_url": "https://bugs.chromium.org/p/chromium/issues/detail?id=542060", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.chromium.org/p/chromium/issues/detail?id=542060" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=591402", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=591402" }, { "reference_url": "https://codereview.chromium.org/1454003003/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/1454003003/" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8126", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1630", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1630" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1631", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1631" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1632", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1632" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1633", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1633" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1634", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1634" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1635", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1635" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1636", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1636" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1637", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1637" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1638", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1638" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1639", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1639" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1640", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1640" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1641", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1641" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1642", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1642" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2843", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2844", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2844" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2845" }, { "reference_url": "http://www.securityfocus.com/bid/84168", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/84168" }, { "reference_url": "http://www.securitytracker.com/id/1035185", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035185" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2920-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2920-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1315362", "reference_id": "1315362", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1315362" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2845", "reference_id": "CVE-2016-2845", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2845" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0359", "reference_id": "RHSA-2016:0359", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0359" }, { "reference_url": "https://usn.ubuntu.com/2920-1/", "reference_id": "USN-2920-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2920-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-2845" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-px9k-cn6v-47ec" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62155?format=api", "vulnerability_id": "VCID-rk19-6ph5-bkgf", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00028.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00028.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1636.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1636.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1636", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01448", "scoring_system": "epss", "scoring_elements": "0.80952", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.01448", "scoring_system": "epss", "scoring_elements": "0.80909", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01448", "scoring_system": "epss", "scoring_elements": "0.80698", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01448", "scoring_system": "epss", "scoring_elements": "0.80707", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01448", "scoring_system": "epss", "scoring_elements": "0.80728", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01448", "scoring_system": "epss", "scoring_elements": "0.80725", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01448", "scoring_system": "epss", "scoring_elements": "0.80753", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01448", "scoring_system": "epss", "scoring_elements": "0.80761", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01448", "scoring_system": "epss", "scoring_elements": "0.80777", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01448", "scoring_system": "epss", "scoring_elements": "0.80762", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01448", "scoring_system": "epss", "scoring_elements": "0.80754", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01448", "scoring_system": "epss", "scoring_elements": "0.8079", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01448", "scoring_system": "epss", "scoring_elements": "0.80792", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01448", "scoring_system": "epss", "scoring_elements": "0.80793", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01448", "scoring_system": "epss", "scoring_elements": "0.80816", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01448", "scoring_system": "epss", "scoring_elements": "0.80821", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01448", "scoring_system": "epss", "scoring_elements": "0.80834", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01448", "scoring_system": "epss", "scoring_elements": "0.80851", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01448", "scoring_system": "epss", "scoring_elements": "0.80874", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01448", "scoring_system": "epss", "scoring_elements": "0.80896", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01448", "scoring_system": "epss", "scoring_elements": "0.80891", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1636" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=584155", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=584155" }, { "reference_url": "https://codereview.chromium.org/1713093002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/1713093002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8126", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1630", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1630" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1631", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1631" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1632", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1632" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1633", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1633" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1634", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1634" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1635", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1635" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1636", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1636" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1637", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1637" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1638", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1638" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1639", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1639" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1640", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1640" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1641", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1641" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1642", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1642" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2843", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2844", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2844" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2845" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3507", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3507" }, { "reference_url": "http://www.securityfocus.com/bid/84008", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/84008" }, { "reference_url": "http://www.securitytracker.com/id/1035185", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035185" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2920-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2920-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314220", "reference_id": "1314220", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314220" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1636", "reference_id": "CVE-2016-1636", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1636" }, { "reference_url": "https://security.gentoo.org/glsa/201603-09", "reference_id": "GLSA-201603-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0359", "reference_id": "RHSA-2016:0359", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0359" }, { "reference_url": "https://usn.ubuntu.com/2920-1/", "reference_id": "USN-2920-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2920-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-1636" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rk19-6ph5-bkgf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62149?format=api", "vulnerability_id": "VCID-u8vz-2dbx-v3g5", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00028.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00028.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1630.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1630.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1630", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76796", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76749", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76571", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76575", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76604", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76585", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76617", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76628", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76655", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76634", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76625", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76667", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.7667", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76659", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.7669", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76697", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76709", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76696", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76727", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76744", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76732", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1630" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=560011", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=560011" }, { "reference_url": "https://codereview.chromium.org/1464223002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/1464223002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8126", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1630", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1630" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1631", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1631" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1632", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1632" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1633", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1633" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1634", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1634" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1635", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1635" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1636", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1636" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1637", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1637" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1638", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1638" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1639", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1639" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1640", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1640" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1641", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1641" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1642", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1642" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2843", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2844", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2844" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2845" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3507", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3507" }, { "reference_url": "http://www.securityfocus.com/bid/84008", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/84008" }, { "reference_url": "http://www.securitytracker.com/id/1035185", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035185" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2920-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2920-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314214", "reference_id": "1314214", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314214" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1630", "reference_id": "CVE-2016-1630", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1630" }, { "reference_url": "https://security.gentoo.org/glsa/201603-09", "reference_id": "GLSA-201603-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0359", "reference_id": "RHSA-2016:0359", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0359" }, { "reference_url": "https://usn.ubuntu.com/2920-1/", "reference_id": "USN-2920-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2920-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-1630" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u8vz-2dbx-v3g5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62156?format=api", "vulnerability_id": "VCID-uf5v-g9rs-6bh4", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00028.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00028.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1637.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1637.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1637", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01052", "scoring_system": "epss", "scoring_elements": "0.77753", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.01052", "scoring_system": "epss", "scoring_elements": "0.77707", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01052", "scoring_system": "epss", "scoring_elements": "0.77499", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01052", "scoring_system": "epss", "scoring_elements": "0.77505", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01052", "scoring_system": "epss", "scoring_elements": "0.7753", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01052", "scoring_system": "epss", "scoring_elements": "0.7751", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01052", "scoring_system": "epss", "scoring_elements": "0.77539", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01052", "scoring_system": "epss", "scoring_elements": "0.77549", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01052", "scoring_system": "epss", "scoring_elements": "0.77574", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01052", "scoring_system": "epss", "scoring_elements": "0.77559", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01052", "scoring_system": "epss", "scoring_elements": "0.77557", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01052", "scoring_system": "epss", "scoring_elements": "0.77595", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01052", "scoring_system": "epss", "scoring_elements": "0.77594", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01052", "scoring_system": "epss", "scoring_elements": "0.77588", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01052", "scoring_system": "epss", "scoring_elements": "0.77621", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01052", "scoring_system": "epss", "scoring_elements": "0.77627", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01052", "scoring_system": "epss", "scoring_elements": "0.77643", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01052", "scoring_system": "epss", "scoring_elements": "0.77653", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01052", "scoring_system": "epss", "scoring_elements": "0.77682", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01052", "scoring_system": "epss", "scoring_elements": "0.777", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01052", "scoring_system": "epss", "scoring_elements": "0.77689", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1637" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=555544", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=555544" }, { "reference_url": "https://codereview.chromium.org/1506913002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/1506913002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8126", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1630", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1630" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1631", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1631" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1632", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1632" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1633", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1633" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1634", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1634" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1635", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1635" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1636", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1636" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1637", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1637" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1638", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1638" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1639", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1639" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1640", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1640" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1641", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1641" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1642", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1642" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2843", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2844", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2844" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2845" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3507", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3507" }, { "reference_url": "http://www.securityfocus.com/bid/84008", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/84008" }, { "reference_url": "http://www.securitytracker.com/id/1035185", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035185" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2920-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2920-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314221", "reference_id": "1314221", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314221" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1637", "reference_id": "CVE-2016-1637", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1637" }, { "reference_url": "https://security.gentoo.org/glsa/201603-09", "reference_id": "GLSA-201603-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0359", "reference_id": "RHSA-2016:0359", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0359" }, { "reference_url": "https://usn.ubuntu.com/2920-1/", "reference_id": "USN-2920-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2920-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-1637" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uf5v-g9rs-6bh4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62152?format=api", "vulnerability_id": "VCID-wr2c-xmur-wbes", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00028.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00028.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1633.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1633.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1633", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05573", "scoring_system": "epss", "scoring_elements": "0.90373", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.05573", "scoring_system": "epss", "scoring_elements": "0.9036", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.05573", "scoring_system": "epss", "scoring_elements": "0.90248", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05573", "scoring_system": "epss", "scoring_elements": "0.90251", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05573", "scoring_system": "epss", "scoring_elements": "0.90264", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05573", "scoring_system": "epss", "scoring_elements": "0.90269", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05573", "scoring_system": "epss", "scoring_elements": "0.90284", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05573", "scoring_system": "epss", "scoring_elements": "0.9029", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05573", "scoring_system": "epss", "scoring_elements": "0.90299", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05573", "scoring_system": "epss", "scoring_elements": "0.90298", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05573", "scoring_system": "epss", "scoring_elements": "0.90292", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05573", "scoring_system": "epss", "scoring_elements": "0.90309", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05573", "scoring_system": "epss", "scoring_elements": "0.90306", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.05573", "scoring_system": "epss", "scoring_elements": "0.90321", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.05573", "scoring_system": "epss", "scoring_elements": "0.9032", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.05573", "scoring_system": "epss", "scoring_elements": "0.90316", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.05573", "scoring_system": "epss", "scoring_elements": "0.90327", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.05573", "scoring_system": "epss", "scoring_elements": "0.90344", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.05573", "scoring_system": "epss", "scoring_elements": "0.90354", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.05573", "scoring_system": "epss", "scoring_elements": "0.90351", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1633" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=572537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=572537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8126", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1630", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1630" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1631", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1631" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1632", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1632" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1633", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1633" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1634", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1634" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1635", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1635" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1636", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1636" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1637", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1637" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1638", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1638" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1639", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1639" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1640", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1640" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1641", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1641" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1642", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1642" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2843", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2844", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2844" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2845" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3507", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3507" }, { "reference_url": "http://www.securityfocus.com/bid/84008", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/84008" }, { "reference_url": "http://www.securitytracker.com/id/1035185", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035185" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2920-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2920-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314217", "reference_id": "1314217", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314217" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1633", "reference_id": "CVE-2016-1633", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1633" }, { "reference_url": "https://security.gentoo.org/glsa/201603-09", "reference_id": "GLSA-201603-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0359", "reference_id": "RHSA-2016:0359", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0359" }, { "reference_url": "https://usn.ubuntu.com/2920-1/", "reference_id": "USN-2920-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2920-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-1633" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wr2c-xmur-wbes" } ], "fixing_vulnerabilities": [], "risk_score": "4.5", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/chromium-browser@49.0.2623.75-1%3Farch=el6" }