{"url":"http://public2.vulnerablecode.io/api/packages/116171?format=json","purl":"pkg:rpm/redhat/chromium-browser@48.0.2564.109-1?arch=el6","type":"rpm","namespace":"redhat","name":"chromium-browser","version":"48.0.2564.109-1","qualifiers":{"arch":"el6"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62145?format=json","vulnerability_id":"VCID-5k7n-7c84-gkfx","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_9.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_9.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00104.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00104.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00119.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00119.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0241.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0241.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1624.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1624.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1624","reference_id":"","reference_type":"","scores":[{"value":"0.01418","scoring_system":"epss","scoring_elements":"0.8067","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01418","scoring_system":"epss","scoring_elements":"0.80636","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01418","scoring_system":"epss","scoring_elements":"0.80651","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01418","scoring_system":"epss","scoring_elements":"0.80519","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01418","scoring_system":"epss","scoring_elements":"0.80525","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01418","scoring_system":"epss","scoring_elements":"0.80547","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01418","scoring_system":"epss","scoring_elements":"0.80539","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01418","scoring_system":"epss","scoring_elements":"0.80568","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01418","scoring_system":"epss","scoring_elements":"0.80578","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01418","scoring_system":"epss","scoring_elements":"0.80595","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01418","scoring_system":"epss","scoring_elements":"0.80581","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01418","scoring_system":"epss","scoring_elements":"0.80574","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01418","scoring_system":"epss","scoring_elements":"0.80602","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01418","scoring_system":"epss","scoring_elements":"0.80604","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01418","scoring_system":"epss","scoring_elements":"0.80608","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01418","scoring_system":"epss","scoring_elements":"0.80633","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1624"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=583607","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/chromium/issues/detail?id=583607"},{"reference_url":"https://codereview.chromium.org/1662313002","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/1662313002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1622","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1622"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1624"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1625","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1625"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1627","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1627"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1629","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1629"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.debian.org/security/2016/dsa-3486","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3486"},{"reference_url":"http://www.securityfocus.com/bid/83125","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/83125"},{"reference_url":"http://www.securitytracker.com/id/1035183","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1035183"},{"reference_url":"http://www.ubuntu.com/usn/USN-2895-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2895-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1306154","reference_id":"1306154","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1306154"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=817233","reference_id":"817233","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=817233"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1624","reference_id":"CVE-2016-1624","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1624"},{"reference_url":"https://security.gentoo.org/glsa/201603-09","reference_id":"GLSA-201603-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0241","reference_id":"RHSA-2016:0241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0241"},{"reference_url":"https://usn.ubuntu.com/2895-1/","reference_id":"USN-2895-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2895-1/"}],"fixed_packages":[],"aliases":["CVE-2016-1624"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5k7n-7c84-gkfx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62143?format=json","vulnerability_id":"VCID-9p6d-rw2j-n7h5","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_9.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_9.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00104.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00104.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00119.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00119.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0241.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0241.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1622.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1622.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1622","reference_id":"","reference_type":"","scores":[{"value":"0.01496","scoring_system":"epss","scoring_elements":"0.81197","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01496","scoring_system":"epss","scoring_elements":"0.81183","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01496","scoring_system":"epss","scoring_elements":"0.81045","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01496","scoring_system":"epss","scoring_elements":"0.81054","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01496","scoring_system":"epss","scoring_elements":"0.81078","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01496","scoring_system":"epss","scoring_elements":"0.81106","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01496","scoring_system":"epss","scoring_elements":"0.81113","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01496","scoring_system":"epss","scoring_elements":"0.8113","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01496","scoring_system":"epss","scoring_elements":"0.81116","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01496","scoring_system":"epss","scoring_elements":"0.8111","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01496","scoring_system":"epss","scoring_elements":"0.81147","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01496","scoring_system":"epss","scoring_elements":"0.81149","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01496","scoring_system":"epss","scoring_elements":"0.81146","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01496","scoring_system":"epss","scoring_elements":"0.81169","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01496","scoring_system":"epss","scoring_elements":"0.81177","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1622"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=546677","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/chromium/issues/detail?id=546677"},{"reference_url":"https://codereview.chromium.org/1417513003","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/1417513003"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1622","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1622"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1624"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1625","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1625"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1627","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1627"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1629","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1629"},{"reference_url":"http://www.debian.org/security/2016/dsa-3486","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3486"},{"reference_url":"http://www.securityfocus.com/bid/83125","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/83125"},{"reference_url":"http://www.securitytracker.com/id/1035183","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1035183"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1306152","reference_id":"1306152","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1306152"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1622","reference_id":"CVE-2016-1622","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1622"},{"reference_url":"https://security.gentoo.org/glsa/201603-09","reference_id":"GLSA-201603-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0241","reference_id":"RHSA-2016:0241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0241"}],"fixed_packages":[],"aliases":["CVE-2016-1622"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9p6d-rw2j-n7h5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62146?format=json","vulnerability_id":"VCID-dbx9-zfat-43ca","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_9.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_9.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00104.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00104.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00119.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00119.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0241.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0241.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1625.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1625.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1625","reference_id":"","reference_type":"","scores":[{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70555","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70582","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70428","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70442","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70459","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70437","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70482","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70498","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70521","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70506","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70492","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70535","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70543","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70522","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70573","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1625"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=509313","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/chromium/issues/detail?id=509313"},{"reference_url":"https://codereview.chromium.org/1669723002","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/1669723002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1622","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1622"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1624"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1625","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1625"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1627","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1627"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1629","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1629"},{"reference_url":"http://www.debian.org/security/2016/dsa-3486","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3486"},{"reference_url":"http://www.securityfocus.com/bid/83125","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/83125"},{"reference_url":"http://www.securitytracker.com/id/1035183","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1035183"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1306155","reference_id":"1306155","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1306155"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1625","reference_id":"CVE-2016-1625","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"},{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1625"},{"reference_url":"https://security.gentoo.org/glsa/201603-09","reference_id":"GLSA-201603-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0241","reference_id":"RHSA-2016:0241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0241"}],"fixed_packages":[],"aliases":["CVE-2016-1625"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dbx9-zfat-43ca"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60046?format=json","vulnerability_id":"VCID-e76r-pz11-yfhu","summary":"Multiple vulnerabilities have been found in OpenJPEG, the worst of\n    which may allow remote attackers to execute arbitrary code.","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_9.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_9.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00104.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00104.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00119.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00119.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0241.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0241.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1626.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1626.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1626","reference_id":"","reference_type":"","scores":[{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.7055","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70577","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70423","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70436","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70454","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70432","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70477","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70492","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70516","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70501","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70487","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.7053","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70538","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70517","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70568","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1626"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=571480","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/chromium/issues/detail?id=571480"},{"reference_url":"https://codereview.chromium.org/1583233008","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/1583233008"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1622","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1622"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1624"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1625","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1625"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1627","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1627"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1629","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152"},{"reference_url":"http://www.debian.org/security/2016/dsa-3486","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3486"},{"reference_url":"http://www.securityfocus.com/bid/83125","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/83125"},{"reference_url":"http://www.securitytracker.com/id/1035183","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1035183"},{"reference_url":"http://www.zerodayinitiative.com/advisories/ZDI-16-171","reference_id":"","reference_type":"","scores":[],"url":"http://www.zerodayinitiative.com/advisories/ZDI-16-171"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1306156","reference_id":"1306156","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1306156"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:48.0.2564.103:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:48.0.2564.103:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:48.0.2564.103:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1626","reference_id":"CVE-2016-1626","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"},{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1626"},{"reference_url":"https://security.gentoo.org/glsa/201603-09","reference_id":"GLSA-201603-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-09"},{"reference_url":"https://security.gentoo.org/glsa/201710-26","reference_id":"GLSA-201710-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201710-26"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0241","reference_id":"RHSA-2016:0241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0241"}],"fixed_packages":[],"aliases":["CVE-2016-1626"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e76r-pz11-yfhu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60047?format=json","vulnerability_id":"VCID-jqup-3gmb-mqbh","summary":"Multiple vulnerabilities have been found in OpenJPEG, the worst of\n    which may allow remote attackers to execute arbitrary code.","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_9.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_9.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0241.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0241.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1628.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1628.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1628","reference_id":"","reference_type":"","scores":[{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75868","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.7586","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75715","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75718","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75749","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75727","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75761","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75773","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75797","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75778","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75772","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.7581","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75814","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75799","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75839","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00908","scoring_system":"epss","scoring_elements":"0.75849","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1628"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=571479","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/chromium/issues/detail?id=571479"},{"reference_url":"https://codereview.chromium.org/1590593002","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/1590593002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1622","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1622"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1624"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1625","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1625"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1627","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1627"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1629","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152"},{"reference_url":"http://www.debian.org/security/2016/dsa-3486","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3486"},{"reference_url":"http://www.debian.org/security/2017/dsa-4013","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2017/dsa-4013"},{"reference_url":"http://www.securityfocus.com/bid/83125","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/83125"},{"reference_url":"http://www.securitytracker.com/id/1035183","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1035183"},{"reference_url":"http://www.zerodayinitiative.com/advisories/ZDI-16-172/","reference_id":"","reference_type":"","scores":[],"url":"http://www.zerodayinitiative.com/advisories/ZDI-16-172/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1310577","reference_id":"1310577","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1310577"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1628","reference_id":"CVE-2016-1628","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"6.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1628"},{"reference_url":"https://security.gentoo.org/glsa/201603-09","reference_id":"GLSA-201603-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-09"},{"reference_url":"https://security.gentoo.org/glsa/201710-26","reference_id":"GLSA-201710-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201710-26"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0241","reference_id":"RHSA-2016:0241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0241"}],"fixed_packages":[],"aliases":["CVE-2016-1628"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jqup-3gmb-mqbh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62144?format=json","vulnerability_id":"VCID-kmf6-62y1-gke1","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_9.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_9.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00104.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00104.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00119.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00119.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0241.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0241.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1623.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1623.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1623","reference_id":"","reference_type":"","scores":[{"value":"0.0153","scoring_system":"epss","scoring_elements":"0.81397","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0153","scoring_system":"epss","scoring_elements":"0.8138","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0153","scoring_system":"epss","scoring_elements":"0.81243","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0153","scoring_system":"epss","scoring_elements":"0.81252","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0153","scoring_system":"epss","scoring_elements":"0.81275","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0153","scoring_system":"epss","scoring_elements":"0.81274","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0153","scoring_system":"epss","scoring_elements":"0.81302","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0153","scoring_system":"epss","scoring_elements":"0.81307","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0153","scoring_system":"epss","scoring_elements":"0.81328","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0153","scoring_system":"epss","scoring_elements":"0.81314","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0153","scoring_system":"epss","scoring_elements":"0.81344","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0153","scoring_system":"epss","scoring_elements":"0.81346","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0153","scoring_system":"epss","scoring_elements":"0.81368","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0153","scoring_system":"epss","scoring_elements":"0.81375","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1623"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=577105","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/chromium/issues/detail?id=577105"},{"reference_url":"https://codereview.chromium.org/1659013003","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/1659013003"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1622","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1622"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1624"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1625","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1625"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1627","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1627"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1629","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1629"},{"reference_url":"http://www.debian.org/security/2016/dsa-3486","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3486"},{"reference_url":"http://www.securityfocus.com/bid/83125","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/83125"},{"reference_url":"http://www.securitytracker.com/id/1035183","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1035183"},{"reference_url":"http://www.ubuntu.com/usn/USN-2895-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2895-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1306153","reference_id":"1306153","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1306153"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1623","reference_id":"CVE-2016-1623","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1623"},{"reference_url":"https://security.gentoo.org/glsa/201603-09","reference_id":"GLSA-201603-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0241","reference_id":"RHSA-2016:0241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0241"},{"reference_url":"https://usn.ubuntu.com/2895-1/","reference_id":"USN-2895-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2895-1/"}],"fixed_packages":[],"aliases":["CVE-2016-1623"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kmf6-62y1-gke1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62147?format=json","vulnerability_id":"VCID-kn3r-wudh-h7hc","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_9.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_9.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00104.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00104.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00119.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00119.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0241.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0241.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1627.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1627.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1627","reference_id":"","reference_type":"","scores":[{"value":"0.01244","scoring_system":"epss","scoring_elements":"0.7937","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01244","scoring_system":"epss","scoring_elements":"0.79358","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01244","scoring_system":"epss","scoring_elements":"0.7923","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01244","scoring_system":"epss","scoring_elements":"0.79237","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01244","scoring_system":"epss","scoring_elements":"0.7926","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01244","scoring_system":"epss","scoring_elements":"0.79245","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01244","scoring_system":"epss","scoring_elements":"0.79271","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01244","scoring_system":"epss","scoring_elements":"0.79278","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01244","scoring_system":"epss","scoring_elements":"0.79302","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01244","scoring_system":"epss","scoring_elements":"0.79287","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01244","scoring_system":"epss","scoring_elements":"0.79276","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01244","scoring_system":"epss","scoring_elements":"0.79303","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01244","scoring_system":"epss","scoring_elements":"0.79299","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01244","scoring_system":"epss","scoring_elements":"0.79301","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01244","scoring_system":"epss","scoring_elements":"0.79335","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01244","scoring_system":"epss","scoring_elements":"0.7934","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1627"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=571121","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/chromium/issues/detail?id=571121"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=585517","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/chromium/issues/detail?id=585517"},{"reference_url":"https://codereview.chromium.org/1586903002","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/1586903002"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1622","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1622"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1624"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1625","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1625"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1627","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1627"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1629","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1629"},{"reference_url":"http://www.debian.org/security/2016/dsa-3486","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3486"},{"reference_url":"http://www.securityfocus.com/bid/83125","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/83125"},{"reference_url":"http://www.securitytracker.com/id/1035183","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1035183"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1306157","reference_id":"1306157","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1306157"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1627","reference_id":"CVE-2016-1627","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1627"},{"reference_url":"https://security.gentoo.org/glsa/201603-09","reference_id":"GLSA-201603-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0241","reference_id":"RHSA-2016:0241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0241"}],"fixed_packages":[],"aliases":["CVE-2016-1627"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kn3r-wudh-h7hc"}],"fixing_vulnerabilities":[],"risk_score":"4.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/chromium-browser@48.0.2564.109-1%3Farch=el6"}