Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/116219?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/116219?format=api", "purl": "pkg:rpm/redhat/chromium-browser@48.0.2564.82-1?arch=el6", "type": "rpm", "namespace": "redhat", "name": "chromium-browser", "version": "48.0.2564.82-1", "qualifiers": { "arch": "el6" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62137?format=api", "vulnerability_id": "VCID-142p-17uw-33bc", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00035.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00035.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00036.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00036.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00046.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00046.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0072.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0072.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1616.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1616.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1616", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0118", "scoring_system": "epss", "scoring_elements": "0.78839", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0118", "scoring_system": "epss", "scoring_elements": "0.7882", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0118", "scoring_system": "epss", "scoring_elements": "0.78695", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0118", "scoring_system": "epss", "scoring_elements": "0.78701", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0118", "scoring_system": "epss", "scoring_elements": "0.78732", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0118", "scoring_system": "epss", "scoring_elements": "0.78714", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0118", "scoring_system": "epss", "scoring_elements": "0.78739", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0118", "scoring_system": "epss", "scoring_elements": "0.78746", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0118", "scoring_system": "epss", "scoring_elements": "0.7877", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0118", "scoring_system": "epss", "scoring_elements": "0.78752", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0118", "scoring_system": "epss", "scoring_elements": "0.78744", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0118", "scoring_system": "epss", "scoring_elements": "0.78773", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0118", "scoring_system": "epss", "scoring_elements": "0.78771", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0118", "scoring_system": "epss", "scoring_elements": "0.78766", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0118", "scoring_system": "epss", "scoring_elements": "0.78795", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0118", "scoring_system": "epss", "scoring_elements": "0.78802", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1616" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=541415", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=541415" }, { "reference_url": "https://codereview.chromium.org/1437523005", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/1437523005" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6792", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6792" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1612", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1612" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1613", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1613" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1614", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1614" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1615", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1615" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1616", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1616" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1617", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1617" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1618", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1618" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1619", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1619" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1620", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1620" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3456", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3456" }, { "reference_url": "http://www.securityfocus.com/bid/81430", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/81430" }, { "reference_url": "http://www.securitytracker.com/id/1034801", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034801" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300992", "reference_id": "1300992", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300992" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1616", "reference_id": "CVE-2016-1616", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N" }, { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1616" }, { "reference_url": "https://security.gentoo.org/glsa/201603-09", "reference_id": "GLSA-201603-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0072", "reference_id": "RHSA-2016:0072", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0072" } ], "fixed_packages": [], "aliases": [ "CVE-2016-1616" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-142p-17uw-33bc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85360?format=api", "vulnerability_id": "VCID-1vtn-5f2w-aqd1", "summary": "chromium-browser: Multiple unspecified vulnerabilities in Google V8 before 4.8.271.17", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0072.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0072.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2051.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2051.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2051", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.003", "scoring_system": "epss", "scoring_elements": "0.53227", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.003", "scoring_system": "epss", "scoring_elements": "0.53307", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.003", "scoring_system": "epss", "scoring_elements": "0.5327", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.003", "scoring_system": "epss", "scoring_elements": "0.5322", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.003", "scoring_system": "epss", "scoring_elements": "0.53243", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.003", "scoring_system": "epss", "scoring_elements": "0.53269", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.003", "scoring_system": "epss", "scoring_elements": "0.53236", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.003", "scoring_system": "epss", "scoring_elements": "0.53288", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.003", "scoring_system": "epss", "scoring_elements": "0.53283", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.003", "scoring_system": "epss", "scoring_elements": "0.53333", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.003", "scoring_system": "epss", "scoring_elements": "0.53317", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.003", "scoring_system": "epss", "scoring_elements": "0.53301", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.003", "scoring_system": "epss", "scoring_elements": "0.53339", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.003", "scoring_system": "epss", "scoring_elements": "0.53344", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.003", "scoring_system": "epss", "scoring_elements": "0.53324", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.003", "scoring_system": "epss", "scoring_elements": "0.53296", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2051" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securityfocus.com/bid/81431", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/81431" }, { "reference_url": "http://www.securitytracker.com/id/1034801", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034801" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2877-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2877-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1301550", "reference_id": "1301550", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1301550" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7.z:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7.z:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7.z:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2051", "reference_id": "CVE-2016-2051", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2051" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0072", "reference_id": "RHSA-2016:0072", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0072" }, { "reference_url": "https://usn.ubuntu.com/2877-1/", "reference_id": "USN-2877-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2877-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-2051" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1vtn-5f2w-aqd1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51177?format=api", "vulnerability_id": "VCID-5xxu-cjy5-ekdd", "summary": "Multiple vulnerabilities have been found in HarfBuzz, the worst of\n which could allow remote attackers to cause a Denial of Service condition.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00070.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00070.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0072.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0072.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8947.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8947.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8947", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00483", "scoring_system": "epss", "scoring_elements": "0.65245", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00483", "scoring_system": "epss", "scoring_elements": "0.65267", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00483", "scoring_system": "epss", "scoring_elements": "0.65266", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00483", "scoring_system": "epss", "scoring_elements": "0.65131", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00483", "scoring_system": "epss", "scoring_elements": "0.65181", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00483", "scoring_system": "epss", "scoring_elements": "0.65207", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00483", "scoring_system": "epss", "scoring_elements": "0.65173", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00483", "scoring_system": "epss", "scoring_elements": "0.65222", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00483", "scoring_system": "epss", "scoring_elements": "0.65235", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00483", "scoring_system": "epss", "scoring_elements": "0.65253", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00483", "scoring_system": "epss", "scoring_elements": "0.6524", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00483", "scoring_system": "epss", "scoring_elements": "0.65213", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00483", "scoring_system": "epss", "scoring_elements": "0.65248", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00483", "scoring_system": "epss", "scoring_elements": "0.65257", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00483", "scoring_system": "epss", "scoring_elements": "0.65254", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8947" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8947", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8947" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/behdad/harfbuzz/commit/f96664974774bfeb237a7274f512f64aaafb201e", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/behdad/harfbuzz/commit/f96664974774bfeb237a7274f512f64aaafb201e" }, { "reference_url": "https://github.com/behdad/harfbuzz/issues/139#issuecomment-146984679", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/behdad/harfbuzz/issues/139#issuecomment-146984679" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00022.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2019/12/msg00022.html" }, { "reference_url": "http://www.securityfocus.com/bid/92039", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/92039" }, { "reference_url": "http://www.ubuntu.com/usn/USN-3067-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-3067-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1301553", "reference_id": "1301553", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1301553" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:harfbuzz_project:harfbuzz:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:harfbuzz_project:harfbuzz:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:harfbuzz_project:harfbuzz:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8947", "reference_id": "CVE-2015-8947", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "7.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8947" }, { "reference_url": "https://security.gentoo.org/glsa/201701-76", "reference_id": "GLSA-201701-76", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-76" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0072", "reference_id": "RHSA-2016:0072", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0072" }, { "reference_url": "https://usn.ubuntu.com/3067-1/", "reference_id": "USN-3067-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3067-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2015-8947" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5xxu-cjy5-ekdd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62141?format=api", "vulnerability_id": "VCID-8ra6-85yf-9kgw", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00035.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00035.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00036.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00036.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00046.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00046.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0072.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0072.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1620.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1620.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1620", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01427", "scoring_system": "epss", "scoring_elements": "0.80721", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01427", "scoring_system": "epss", "scoring_elements": "0.80705", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01427", "scoring_system": "epss", "scoring_elements": "0.80577", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01427", "scoring_system": "epss", "scoring_elements": "0.80584", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01427", "scoring_system": "epss", "scoring_elements": "0.80606", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01427", "scoring_system": "epss", "scoring_elements": "0.80599", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01427", "scoring_system": "epss", "scoring_elements": "0.80627", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01427", "scoring_system": "epss", "scoring_elements": "0.80636", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01427", "scoring_system": "epss", "scoring_elements": "0.80652", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01427", "scoring_system": "epss", "scoring_elements": "0.80639", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01427", "scoring_system": "epss", "scoring_elements": "0.80631", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01427", "scoring_system": "epss", "scoring_elements": "0.8066", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01427", "scoring_system": "epss", "scoring_elements": "0.80662", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01427", "scoring_system": "epss", "scoring_elements": "0.80664", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01427", "scoring_system": "epss", "scoring_elements": "0.80688", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01427", "scoring_system": "epss", "scoring_elements": "0.80692", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1620" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=472618", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=472618" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=514080", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=514080" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=531259", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=531259" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=537656", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=537656" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=539563", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=539563" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=545520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=545520" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=546814", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=546814" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=549155", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=549155" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=551028", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=551028" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=551143", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=551143" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=552681", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=552681" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=553595", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=553595" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=554129", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=554129" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=554172", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=554172" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=561478", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=561478" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=561488", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=561488" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=561497", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=561497" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=562984", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=562984" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=562986", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=562986" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=565049", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=565049" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=565967", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=565967" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=566231", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=566231" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=569170", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=569170" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=570427", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=570427" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=572406", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=572406" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=576383", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=576383" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=579625", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=579625" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6792", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6792" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1612", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1612" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1613", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1613" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1614", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1614" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1615", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1615" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1616", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1616" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1617", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1617" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1618", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1618" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1619", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1619" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1620", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1620" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3456", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3456" }, { "reference_url": "http://www.securityfocus.com/bid/81430", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/81430" }, { "reference_url": "http://www.securitytracker.com/id/1034801", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034801" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2877-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2877-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300996", "reference_id": "1300996", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300996" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1620", "reference_id": "CVE-2016-1620", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1620" }, { "reference_url": "https://security.gentoo.org/glsa/201603-09", "reference_id": "GLSA-201603-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0072", "reference_id": "RHSA-2016:0072", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0072" }, { "reference_url": "https://usn.ubuntu.com/2877-1/", "reference_id": "USN-2877-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2877-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-1620" ], "risk_score": 4.2, "exploitability": "0.5", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8ra6-85yf-9kgw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62133?format=api", "vulnerability_id": "VCID-9gjq-q754-1bb4", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00035.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00035.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00036.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00036.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00046.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00046.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0072.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0072.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1612.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1612.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1612", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01029", "scoring_system": "epss", "scoring_elements": "0.77403", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01029", "scoring_system": "epss", "scoring_elements": "0.77394", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01029", "scoring_system": "epss", "scoring_elements": "0.77249", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01029", "scoring_system": "epss", "scoring_elements": "0.77256", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01029", "scoring_system": "epss", "scoring_elements": "0.77284", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01029", "scoring_system": "epss", "scoring_elements": "0.77266", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01029", "scoring_system": "epss", "scoring_elements": "0.77298", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01029", "scoring_system": "epss", "scoring_elements": "0.77306", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01029", "scoring_system": "epss", "scoring_elements": "0.77334", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01029", "scoring_system": "epss", "scoring_elements": "0.77313", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01029", "scoring_system": "epss", "scoring_elements": "0.7731", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01029", "scoring_system": "epss", "scoring_elements": "0.7735", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01029", "scoring_system": "epss", "scoring_elements": "0.77349", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01029", "scoring_system": "epss", "scoring_elements": "0.77341", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01029", "scoring_system": "epss", "scoring_elements": "0.77375", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01029", "scoring_system": "epss", "scoring_elements": "0.77382", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1612" }, { "reference_url": "https://chromium.googlesource.com/v8/v8/+/cfbd16172fa165cc33ce0e2e72f74e5561168a61", "reference_id": "", "reference_type": "", "scores": [], "url": "https://chromium.googlesource.com/v8/v8/+/cfbd16172fa165cc33ce0e2e72f74e5561168a61" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=497632", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=497632" }, { "reference_url": "https://codereview.chromium.org/1531583005", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/1531583005" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6792", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6792" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1612", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1612" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1613", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1613" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1614", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1614" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1615", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1615" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1616", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1616" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1617", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1617" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1618", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1618" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1619", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1619" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1620", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1620" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3456", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3456" }, { "reference_url": "http://www.securityfocus.com/bid/81431", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/81431" }, { "reference_url": "http://www.securitytracker.com/id/1034801", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034801" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2877-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2877-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300988", "reference_id": "1300988", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300988" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1612", "reference_id": "CVE-2016-1612", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "7.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1612" }, { "reference_url": "https://security.gentoo.org/glsa/201603-09", "reference_id": "GLSA-201603-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0072", "reference_id": "RHSA-2016:0072", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0072" }, { "reference_url": "https://usn.ubuntu.com/2877-1/", "reference_id": "USN-2877-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2877-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-1612" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9gjq-q754-1bb4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62138?format=api", "vulnerability_id": "VCID-d5eb-pucd-p7bp", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00035.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00035.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00036.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00036.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00046.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00046.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0072.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0072.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1617.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1617.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1617", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00635", "scoring_system": "epss", "scoring_elements": "0.70468", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00635", "scoring_system": "epss", "scoring_elements": "0.70493", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00635", "scoring_system": "epss", "scoring_elements": "0.70339", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00635", "scoring_system": "epss", "scoring_elements": "0.70352", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00635", "scoring_system": "epss", "scoring_elements": "0.70369", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00635", "scoring_system": "epss", "scoring_elements": "0.70348", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00635", "scoring_system": "epss", "scoring_elements": "0.70393", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00635", "scoring_system": "epss", "scoring_elements": "0.70408", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00635", "scoring_system": "epss", "scoring_elements": "0.70432", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00635", "scoring_system": "epss", "scoring_elements": "0.70417", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00635", "scoring_system": "epss", "scoring_elements": "0.70402", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00635", "scoring_system": "epss", "scoring_elements": "0.70445", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00635", "scoring_system": "epss", "scoring_elements": "0.70453", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00635", "scoring_system": "epss", "scoring_elements": "0.70433", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00635", "scoring_system": "epss", "scoring_elements": "0.70485", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1617" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=544765", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=544765" }, { "reference_url": "https://codereview.chromium.org/1455973003", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/1455973003" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6792", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6792" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1612", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1612" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1613", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1613" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1614", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1614" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1615", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1615" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1616", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1616" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1617", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1617" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1618", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1618" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1619", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1619" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1620", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1620" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3456", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3456" }, { "reference_url": "http://www.securityfocus.com/bid/81430", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/81430" }, { "reference_url": "http://www.securitytracker.com/id/1034801", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034801" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2877-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2877-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300993", "reference_id": "1300993", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300993" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1617", "reference_id": "CVE-2016-1617", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" }, { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1617" }, { "reference_url": "https://security.gentoo.org/glsa/201603-09", "reference_id": "GLSA-201603-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0072", "reference_id": "RHSA-2016:0072", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0072" }, { "reference_url": "https://usn.ubuntu.com/2877-1/", "reference_id": "USN-2877-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2877-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-1617" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d5eb-pucd-p7bp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62140?format=api", "vulnerability_id": "VCID-h79s-h95e-qqdq", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00035.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00035.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00036.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00036.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00046.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00046.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0072.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0072.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1619.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1619.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1619", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00799", "scoring_system": "epss", "scoring_elements": "0.74106", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00799", "scoring_system": "epss", "scoring_elements": "0.74113", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00799", "scoring_system": "epss", "scoring_elements": "0.73983", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00799", "scoring_system": "epss", "scoring_elements": "0.7399", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00799", "scoring_system": "epss", "scoring_elements": "0.74015", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00799", "scoring_system": "epss", "scoring_elements": "0.73986", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00799", "scoring_system": "epss", "scoring_elements": "0.7402", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00799", "scoring_system": "epss", "scoring_elements": "0.74035", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00799", "scoring_system": "epss", "scoring_elements": "0.74057", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00799", "scoring_system": "epss", "scoring_elements": "0.74038", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00799", "scoring_system": "epss", "scoring_elements": "0.74031", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00799", "scoring_system": "epss", "scoring_elements": "0.7407", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00799", "scoring_system": "epss", "scoring_elements": "0.74079", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00799", "scoring_system": "epss", "scoring_elements": "0.74071", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00799", "scoring_system": "epss", "scoring_elements": "0.74105", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1619" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=557223", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=557223" }, { "reference_url": "https://codereview.chromium.org/1521473003", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/1521473003" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6792", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6792" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1612", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1612" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1613", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1613" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1614", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1614" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1615", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1615" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1616", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1616" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1617", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1617" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1618", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1618" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1619", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1619" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1620", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1620" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3456", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3456" }, { "reference_url": "http://www.securityfocus.com/bid/81430", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/81430" }, { "reference_url": "http://www.securitytracker.com/id/1034801", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034801" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300995", "reference_id": "1300995", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300995" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1619", "reference_id": "CVE-2016-1619", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "7.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1619" }, { "reference_url": "https://security.gentoo.org/glsa/201603-09", "reference_id": "GLSA-201603-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0072", "reference_id": "RHSA-2016:0072", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0072" } ], "fixed_packages": [], "aliases": [ "CVE-2016-1619" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h79s-h95e-qqdq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62134?format=api", "vulnerability_id": "VCID-krmz-5411-tyb6", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00035.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00035.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00036.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00036.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00046.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00046.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0072.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0072.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1613.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1613.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1613", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0087", "scoring_system": "epss", "scoring_elements": "0.7528", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0087", "scoring_system": "epss", "scoring_elements": "0.75271", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0087", "scoring_system": "epss", "scoring_elements": "0.75148", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0087", "scoring_system": "epss", "scoring_elements": "0.75151", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0087", "scoring_system": "epss", "scoring_elements": "0.75182", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0087", "scoring_system": "epss", "scoring_elements": "0.75159", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0087", "scoring_system": "epss", "scoring_elements": "0.75193", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0087", "scoring_system": "epss", "scoring_elements": "0.75205", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0087", "scoring_system": "epss", "scoring_elements": "0.75227", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0087", "scoring_system": "epss", "scoring_elements": "0.7523", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0087", "scoring_system": "epss", "scoring_elements": "0.75236", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0087", "scoring_system": "epss", "scoring_elements": "0.75226", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0087", "scoring_system": "epss", "scoring_elements": "0.75263", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0087", "scoring_system": "epss", "scoring_elements": "0.75267", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1613" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=572871", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=572871" }, { "reference_url": "https://codereview.chromium.org/1564773003", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/1564773003" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6792", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6792" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1612", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1612" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1613", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1613" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1614", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1614" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1615", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1615" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1616", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1616" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1617", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1617" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1618", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1618" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1619", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1619" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1620", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1620" }, { "reference_url": "https://pdfium.googlesource.com/pdfium/+/dcac57bc8b64fdc870d79d11a498ae7021cf8ae7", "reference_id": "", "reference_type": "", "scores": [], "url": "https://pdfium.googlesource.com/pdfium/+/dcac57bc8b64fdc870d79d11a498ae7021cf8ae7" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3456", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3456" }, { "reference_url": "http://www.securityfocus.com/bid/81430", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/81430" }, { "reference_url": "http://www.securitytracker.com/id/1034801", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034801" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300989", "reference_id": "1300989", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300989" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1613", "reference_id": "CVE-2016-1613", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "7.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1613" }, { "reference_url": "https://security.gentoo.org/glsa/201603-09", "reference_id": "GLSA-201603-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0072", "reference_id": "RHSA-2016:0072", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0072" } ], "fixed_packages": [], "aliases": [ "CVE-2016-1613" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-krmz-5411-tyb6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62135?format=api", "vulnerability_id": "VCID-qmtf-faub-nyhr", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00035.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00035.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00036.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00036.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00046.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00046.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0072.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0072.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1614.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1614.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1614", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00794", "scoring_system": "epss", "scoring_elements": "0.74026", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00794", "scoring_system": "epss", "scoring_elements": "0.74032", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00794", "scoring_system": "epss", "scoring_elements": "0.73901", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00794", "scoring_system": "epss", "scoring_elements": "0.7391", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00794", "scoring_system": "epss", "scoring_elements": "0.73934", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00794", "scoring_system": "epss", "scoring_elements": "0.73906", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00794", "scoring_system": "epss", "scoring_elements": "0.7394", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00794", "scoring_system": "epss", "scoring_elements": "0.73953", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00794", "scoring_system": "epss", "scoring_elements": "0.73976", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00794", "scoring_system": "epss", "scoring_elements": "0.73958", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00794", "scoring_system": "epss", "scoring_elements": "0.7395", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00794", "scoring_system": "epss", "scoring_elements": "0.73991", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00794", "scoring_system": "epss", "scoring_elements": "0.74", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00794", "scoring_system": "epss", "scoring_elements": "0.73992", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00794", "scoring_system": "epss", "scoring_elements": "0.74025", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00794", "scoring_system": "epss", "scoring_elements": "0.74034", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1614" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=544691", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=544691" }, { "reference_url": "https://codereview.chromium.org/1407393002/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/1407393002/" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6792", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6792" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1612", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1612" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1613", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1613" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1614", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1614" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1615", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1615" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1616", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1616" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1617", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1617" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1618", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1618" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1619", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1619" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1620", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1620" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3456", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3456" }, { "reference_url": "http://www.securityfocus.com/bid/81430", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/81430" }, { "reference_url": "http://www.securitytracker.com/id/1034801", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034801" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2877-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2877-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300990", "reference_id": "1300990", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300990" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1614", "reference_id": "CVE-2016-1614", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" }, { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1614" }, { "reference_url": "https://security.gentoo.org/glsa/201603-09", "reference_id": "GLSA-201603-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0072", "reference_id": "RHSA-2016:0072", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0072" }, { "reference_url": "https://usn.ubuntu.com/2877-1/", "reference_id": "USN-2877-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2877-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-1614" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qmtf-faub-nyhr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51179?format=api", "vulnerability_id": "VCID-rnfc-n53j-9yfb", "summary": "Multiple vulnerabilities have been found in HarfBuzz, the worst of\n which could allow remote attackers to cause a Denial of Service condition.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00070.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00070.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0072.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0072.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2052.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2052.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2052", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61177", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61228", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61081", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61159", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61187", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61152", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61201", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61216", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61236", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61223", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61204", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61244", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.6125", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61231", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.6122", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00408", "scoring_system": "epss", "scoring_elements": "0.61235", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2052" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=544270", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=544270" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=579625", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=579625" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2052", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2052" }, { "reference_url": "https://github.com/behdad/harfbuzz/commit/63ef0b41dc48d6112d1918c1b1de9de8ea90adb5", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/behdad/harfbuzz/commit/63ef0b41dc48d6112d1918c1b1de9de8ea90adb5" }, { "reference_url": "https://github.com/behdad/harfbuzz/issues/139#issuecomment-148289957", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/behdad/harfbuzz/issues/139#issuecomment-148289957" }, { "reference_url": "http://www.securityfocus.com/bid/81812", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/81812" }, { "reference_url": "http://www.securitytracker.com/id/1034801", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034801" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2877-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2877-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-3067-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-3067-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1301553", "reference_id": "1301553", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1301553" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:harfbuzz_project:harfbuzz:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:harfbuzz_project:harfbuzz:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:harfbuzz_project:harfbuzz:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2052", "reference_id": "CVE-2016-2052", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "7.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2052" }, { "reference_url": "https://security.gentoo.org/glsa/201701-76", "reference_id": "GLSA-201701-76", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-76" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0072", "reference_id": "RHSA-2016:0072", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0072" }, { "reference_url": "https://usn.ubuntu.com/2877-1/", "reference_id": "USN-2877-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2877-1/" }, { "reference_url": "https://usn.ubuntu.com/3067-1/", "reference_id": "USN-3067-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3067-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-2052" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rnfc-n53j-9yfb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62139?format=api", "vulnerability_id": "VCID-stn4-q7wv-uubm", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00035.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00035.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00036.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00036.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00046.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00046.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0072.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0072.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1618.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1618.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1618", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00913", "scoring_system": "epss", "scoring_elements": "0.75962", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00913", "scoring_system": "epss", "scoring_elements": "0.75953", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00913", "scoring_system": "epss", "scoring_elements": "0.7581", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00913", "scoring_system": "epss", "scoring_elements": "0.75814", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00913", "scoring_system": "epss", "scoring_elements": "0.75847", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00913", "scoring_system": "epss", "scoring_elements": "0.75825", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00913", "scoring_system": "epss", "scoring_elements": "0.75858", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00913", "scoring_system": "epss", "scoring_elements": "0.7587", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00913", "scoring_system": "epss", "scoring_elements": "0.75893", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00913", "scoring_system": "epss", "scoring_elements": "0.75874", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00913", "scoring_system": "epss", "scoring_elements": "0.75868", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00913", "scoring_system": "epss", "scoring_elements": "0.75905", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00913", "scoring_system": "epss", "scoring_elements": "0.75909", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00913", "scoring_system": "epss", "scoring_elements": "0.75895", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00913", "scoring_system": "epss", "scoring_elements": "0.75933", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00913", "scoring_system": "epss", "scoring_elements": "0.75942", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1618" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=552749", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=552749" }, { "reference_url": "https://codereview.chromium.org/1419293005", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/1419293005" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6792", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6792" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1612", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1612" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1613", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1613" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1614", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1614" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1615", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1615" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1616", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1616" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1617", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1617" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1618", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1618" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1619", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1619" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1620", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1620" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3456", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3456" }, { "reference_url": "http://www.securityfocus.com/bid/81430", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/81430" }, { "reference_url": "http://www.securitytracker.com/id/1034801", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034801" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2877-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2877-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300994", "reference_id": "1300994", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300994" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1618", "reference_id": "CVE-2016-1618", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1618" }, { "reference_url": "https://security.gentoo.org/glsa/201603-09", "reference_id": "GLSA-201603-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0072", "reference_id": "RHSA-2016:0072", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0072" }, { "reference_url": "https://usn.ubuntu.com/2877-1/", "reference_id": "USN-2877-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2877-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-1618" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-stn4-q7wv-uubm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62136?format=api", "vulnerability_id": "VCID-zy24-y9c2-cqec", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00035.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00035.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00036.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00036.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00046.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00046.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0072.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0072.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1615.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1615.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1615", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00403", "scoring_system": "epss", "scoring_elements": "0.60926", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00403", "scoring_system": "epss", "scoring_elements": "0.60875", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00403", "scoring_system": "epss", "scoring_elements": "0.60921", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00403", "scoring_system": "epss", "scoring_elements": "0.60934", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73223", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73237", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73262", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73183", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73235", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73278", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73287", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73279", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73242", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73193", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73214", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73187", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1615" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=468179", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=468179" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6792", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6792" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1612", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1612" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1613", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1613" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1614", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1614" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1615", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1615" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1616", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1616" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1617", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1617" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1618", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1618" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1619", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1619" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1620", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1620" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3456", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3456" }, { "reference_url": "http://www.securityfocus.com/bid/81430", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/81430" }, { "reference_url": "http://www.securitytracker.com/id/1034801", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1034801" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300991", "reference_id": "1300991", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300991" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1615", "reference_id": "CVE-2016-1615", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1615" }, { "reference_url": "https://security.gentoo.org/glsa/201603-09", "reference_id": "GLSA-201603-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0072", "reference_id": "RHSA-2016:0072", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0072" } ], "fixed_packages": [], "aliases": [ "CVE-2016-1615" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zy24-y9c2-cqec" } ], "fixing_vulnerabilities": [], "risk_score": "4.4", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/chromium-browser@48.0.2564.82-1%3Farch=el6" }