{"url":"http://public2.vulnerablecode.io/api/packages/116219?format=json","purl":"pkg:rpm/redhat/chromium-browser@48.0.2564.82-1?arch=el6","type":"rpm","namespace":"redhat","name":"chromium-browser","version":"48.0.2564.82-1","qualifiers":{"arch":"el6"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62137?format=json","vulnerability_id":"VCID-142p-17uw-33bc","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00035.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00035.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00036.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00036.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00046.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00046.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0072.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0072.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1616.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1616.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1616","reference_id":"","reference_type":"","scores":[{"value":"0.0118","scoring_system":"epss","scoring_elements":"0.78839","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0118","scoring_system":"epss","scoring_elements":"0.7882","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0118","scoring_system":"epss","scoring_elements":"0.78695","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0118","scoring_system":"epss","scoring_elements":"0.78701","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0118","scoring_system":"epss","scoring_elements":"0.78732","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0118","scoring_system":"epss","scoring_elements":"0.78714","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0118","scoring_system":"epss","scoring_elements":"0.78739","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0118","scoring_system":"epss","scoring_elements":"0.78746","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0118","scoring_system":"epss","scoring_elements":"0.7877","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0118","scoring_system":"epss","scoring_elements":"0.78752","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0118","scoring_system":"epss","scoring_elements":"0.78744","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0118","scoring_system":"epss","scoring_elements":"0.78773","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0118","scoring_system":"epss","scoring_elements":"0.78771","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0118","scoring_system":"epss","scoring_elements":"0.78766","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0118","scoring_system":"epss","scoring_elements":"0.78795","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0118","scoring_system":"epss","scoring_elements":"0.78802","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1616"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=541415","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/chromium/issues/detail?id=541415"},{"reference_url":"https://codereview.chromium.org/1437523005","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/1437523005"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1612","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1612"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1613","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1613"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1614","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1614"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1617","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1617"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1620"},{"reference_url":"http://www.debian.org/security/2016/dsa-3456","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3456"},{"reference_url":"http://www.securityfocus.com/bid/81430","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/81430"},{"reference_url":"http://www.securitytracker.com/id/1034801","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034801"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1300992","reference_id":"1300992","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1300992"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1616","reference_id":"CVE-2016-1616","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"},{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1616"},{"reference_url":"https://security.gentoo.org/glsa/201603-09","reference_id":"GLSA-201603-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0072","reference_id":"RHSA-2016:0072","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0072"}],"fixed_packages":[],"aliases":["CVE-2016-1616"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-142p-17uw-33bc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85360?format=json","vulnerability_id":"VCID-1vtn-5f2w-aqd1","summary":"chromium-browser: Multiple unspecified vulnerabilities in Google V8 before 4.8.271.17","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0072.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0072.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2051.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2051.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2051","reference_id":"","reference_type":"","scores":[{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53227","published_at":"2026-05-05T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53307","published_at":"2026-04-26T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.5327","published_at":"2026-04-29T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.5322","published_at":"2026-04-01T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53243","published_at":"2026-04-02T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53269","published_at":"2026-04-04T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53236","published_at":"2026-04-07T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53288","published_at":"2026-04-08T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53283","published_at":"2026-04-09T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53333","published_at":"2026-04-11T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53317","published_at":"2026-04-12T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53301","published_at":"2026-04-13T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53339","published_at":"2026-04-16T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53344","published_at":"2026-04-18T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53324","published_at":"2026-04-21T12:55:00Z"},{"value":"0.003","scoring_system":"epss","scoring_elements":"0.53296","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2051"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securityfocus.com/bid/81431","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/81431"},{"reference_url":"http://www.securitytracker.com/id/1034801","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034801"},{"reference_url":"http://www.ubuntu.com/usn/USN-2877-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2877-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1301550","reference_id":"1301550","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1301550"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7.z:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7.z:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7.z:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-2051","reference_id":"CVE-2016-2051","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-2051"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0072","reference_id":"RHSA-2016:0072","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0072"},{"reference_url":"https://usn.ubuntu.com/2877-1/","reference_id":"USN-2877-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2877-1/"}],"fixed_packages":[],"aliases":["CVE-2016-2051"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1vtn-5f2w-aqd1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51177?format=json","vulnerability_id":"VCID-5xxu-cjy5-ekdd","summary":"Multiple vulnerabilities have been found in HarfBuzz, the worst of\n    which could allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00070.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00070.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0072.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0072.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8947.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8947.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8947","reference_id":"","reference_type":"","scores":[{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65245","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65267","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65266","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65131","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65181","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65207","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65173","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65222","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65235","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65253","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.6524","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65213","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65248","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65257","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00483","scoring_system":"epss","scoring_elements":"0.65254","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8947"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/behdad/harfbuzz/commit/f96664974774bfeb237a7274f512f64aaafb201e","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/behdad/harfbuzz/commit/f96664974774bfeb237a7274f512f64aaafb201e"},{"reference_url":"https://github.com/behdad/harfbuzz/issues/139#issuecomment-146984679","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/behdad/harfbuzz/issues/139#issuecomment-146984679"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/12/msg00022.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/12/msg00022.html"},{"reference_url":"http://www.securityfocus.com/bid/92039","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/92039"},{"reference_url":"http://www.ubuntu.com/usn/USN-3067-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-3067-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1301553","reference_id":"1301553","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1301553"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:harfbuzz_project:harfbuzz:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:harfbuzz_project:harfbuzz:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:harfbuzz_project:harfbuzz:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8947","reference_id":"CVE-2015-8947","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"7.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8947"},{"reference_url":"https://security.gentoo.org/glsa/201701-76","reference_id":"GLSA-201701-76","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-76"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0072","reference_id":"RHSA-2016:0072","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0072"},{"reference_url":"https://usn.ubuntu.com/3067-1/","reference_id":"USN-3067-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3067-1/"}],"fixed_packages":[],"aliases":["CVE-2015-8947"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5xxu-cjy5-ekdd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62141?format=json","vulnerability_id":"VCID-8ra6-85yf-9kgw","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00035.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00035.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00036.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00036.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00046.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00046.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0072.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0072.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1620.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1620.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1620","reference_id":"","reference_type":"","scores":[{"value":"0.01427","scoring_system":"epss","scoring_elements":"0.80721","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01427","scoring_system":"epss","scoring_elements":"0.80705","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01427","scoring_system":"epss","scoring_elements":"0.80577","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01427","scoring_system":"epss","scoring_elements":"0.80584","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01427","scoring_system":"epss","scoring_elements":"0.80606","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01427","scoring_system":"epss","scoring_elements":"0.80599","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01427","scoring_system":"epss","scoring_elements":"0.80627","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01427","scoring_system":"epss","scoring_elements":"0.80636","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01427","scoring_system":"epss","scoring_elements":"0.80652","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01427","scoring_system":"epss","scoring_elements":"0.80639","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01427","scoring_system":"epss","scoring_elements":"0.80631","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01427","scoring_system":"epss","scoring_elements":"0.8066","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01427","scoring_system":"epss","scoring_elements":"0.80662","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01427","scoring_system":"epss","scoring_elements":"0.80664","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01427","scoring_system":"epss","scoring_elements":"0.80688","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01427","scoring_system":"epss","scoring_elements":"0.80692","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1620"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=472618","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/chromium/issues/detail?id=472618"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=514080","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/chromium/issues/detail?id=514080"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=531259","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/chromium/issues/detail?id=531259"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=537656","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/chromium/issues/detail?id=537656"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=539563","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/chromium/issues/detail?id=539563"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=545520","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/chromium/issues/detail?id=545520"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=546814","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/chromium/issues/detail?id=546814"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=549155","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/chromium/issues/detail?id=549155"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=551028","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/chromium/issues/detail?id=551028"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=551143","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/chromium/issues/detail?id=551143"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=552681","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/chromium/issues/detail?id=552681"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=553595","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/chromium/issues/detail?id=553595"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=554129","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/chromium/issues/detail?id=554129"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=554172","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/chromium/issues/detail?id=554172"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=561478","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/chromium/issues/detail?id=561478"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=561488","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/chromium/issues/detail?id=561488"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=561497","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/chromium/issues/detail?id=561497"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=562984","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/chromium/issues/detail?id=562984"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=562986","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/chromium/issues/detail?id=562986"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=565049","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/chromium/issues/detail?id=565049"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=565967","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/chromium/issues/detail?id=565967"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=566231","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/chromium/issues/detail?id=566231"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=569170","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/chromium/issues/detail?id=569170"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=570427","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/chromium/issues/detail?id=570427"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=572406","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/chromium/issues/detail?id=572406"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=576383","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/chromium/issues/detail?id=576383"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=579625","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/chromium/issues/detail?id=579625"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1612","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1612"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1613","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1613"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1614","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1614"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1617","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1617"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1620"},{"reference_url":"http://www.debian.org/security/2016/dsa-3456","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3456"},{"reference_url":"http://www.securityfocus.com/bid/81430","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/81430"},{"reference_url":"http://www.securitytracker.com/id/1034801","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034801"},{"reference_url":"http://www.ubuntu.com/usn/USN-2877-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2877-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1300996","reference_id":"1300996","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1300996"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1620","reference_id":"CVE-2016-1620","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1620"},{"reference_url":"https://security.gentoo.org/glsa/201603-09","reference_id":"GLSA-201603-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0072","reference_id":"RHSA-2016:0072","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0072"},{"reference_url":"https://usn.ubuntu.com/2877-1/","reference_id":"USN-2877-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2877-1/"}],"fixed_packages":[],"aliases":["CVE-2016-1620"],"risk_score":4.2,"exploitability":"0.5","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8ra6-85yf-9kgw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62133?format=json","vulnerability_id":"VCID-9gjq-q754-1bb4","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00035.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00035.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00036.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00036.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00046.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00046.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0072.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0072.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1612.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1612.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1612","reference_id":"","reference_type":"","scores":[{"value":"0.01029","scoring_system":"epss","scoring_elements":"0.77403","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01029","scoring_system":"epss","scoring_elements":"0.77394","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01029","scoring_system":"epss","scoring_elements":"0.77249","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01029","scoring_system":"epss","scoring_elements":"0.77256","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01029","scoring_system":"epss","scoring_elements":"0.77284","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01029","scoring_system":"epss","scoring_elements":"0.77266","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01029","scoring_system":"epss","scoring_elements":"0.77298","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01029","scoring_system":"epss","scoring_elements":"0.77306","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01029","scoring_system":"epss","scoring_elements":"0.77334","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01029","scoring_system":"epss","scoring_elements":"0.77313","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01029","scoring_system":"epss","scoring_elements":"0.7731","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01029","scoring_system":"epss","scoring_elements":"0.7735","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01029","scoring_system":"epss","scoring_elements":"0.77349","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01029","scoring_system":"epss","scoring_elements":"0.77341","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01029","scoring_system":"epss","scoring_elements":"0.77375","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01029","scoring_system":"epss","scoring_elements":"0.77382","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1612"},{"reference_url":"https://chromium.googlesource.com/v8/v8/+/cfbd16172fa165cc33ce0e2e72f74e5561168a61","reference_id":"","reference_type":"","scores":[],"url":"https://chromium.googlesource.com/v8/v8/+/cfbd16172fa165cc33ce0e2e72f74e5561168a61"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=497632","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/chromium/issues/detail?id=497632"},{"reference_url":"https://codereview.chromium.org/1531583005","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/1531583005"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1612","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1612"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1613","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1613"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1614","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1614"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1617","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1617"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1620"},{"reference_url":"http://www.debian.org/security/2016/dsa-3456","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3456"},{"reference_url":"http://www.securityfocus.com/bid/81431","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/81431"},{"reference_url":"http://www.securitytracker.com/id/1034801","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034801"},{"reference_url":"http://www.ubuntu.com/usn/USN-2877-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2877-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1300988","reference_id":"1300988","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1300988"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1612","reference_id":"CVE-2016-1612","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"7.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1612"},{"reference_url":"https://security.gentoo.org/glsa/201603-09","reference_id":"GLSA-201603-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0072","reference_id":"RHSA-2016:0072","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0072"},{"reference_url":"https://usn.ubuntu.com/2877-1/","reference_id":"USN-2877-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2877-1/"}],"fixed_packages":[],"aliases":["CVE-2016-1612"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9gjq-q754-1bb4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62138?format=json","vulnerability_id":"VCID-d5eb-pucd-p7bp","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00035.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00035.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00036.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00036.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00046.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00046.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0072.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0072.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1617.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1617.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1617","reference_id":"","reference_type":"","scores":[{"value":"0.00635","scoring_system":"epss","scoring_elements":"0.70468","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00635","scoring_system":"epss","scoring_elements":"0.70493","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00635","scoring_system":"epss","scoring_elements":"0.70339","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00635","scoring_system":"epss","scoring_elements":"0.70352","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00635","scoring_system":"epss","scoring_elements":"0.70369","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00635","scoring_system":"epss","scoring_elements":"0.70348","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00635","scoring_system":"epss","scoring_elements":"0.70393","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00635","scoring_system":"epss","scoring_elements":"0.70408","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00635","scoring_system":"epss","scoring_elements":"0.70432","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00635","scoring_system":"epss","scoring_elements":"0.70417","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00635","scoring_system":"epss","scoring_elements":"0.70402","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00635","scoring_system":"epss","scoring_elements":"0.70445","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00635","scoring_system":"epss","scoring_elements":"0.70453","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00635","scoring_system":"epss","scoring_elements":"0.70433","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00635","scoring_system":"epss","scoring_elements":"0.70485","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1617"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=544765","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/chromium/issues/detail?id=544765"},{"reference_url":"https://codereview.chromium.org/1455973003","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/1455973003"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1612","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1612"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1613","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1613"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1614","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1614"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1617","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1617"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1620"},{"reference_url":"http://www.debian.org/security/2016/dsa-3456","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3456"},{"reference_url":"http://www.securityfocus.com/bid/81430","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/81430"},{"reference_url":"http://www.securitytracker.com/id/1034801","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034801"},{"reference_url":"http://www.ubuntu.com/usn/USN-2877-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2877-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1300993","reference_id":"1300993","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1300993"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1617","reference_id":"CVE-2016-1617","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"},{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1617"},{"reference_url":"https://security.gentoo.org/glsa/201603-09","reference_id":"GLSA-201603-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0072","reference_id":"RHSA-2016:0072","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0072"},{"reference_url":"https://usn.ubuntu.com/2877-1/","reference_id":"USN-2877-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2877-1/"}],"fixed_packages":[],"aliases":["CVE-2016-1617"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d5eb-pucd-p7bp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62140?format=json","vulnerability_id":"VCID-h79s-h95e-qqdq","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00035.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00035.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00036.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00036.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00046.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00046.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0072.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0072.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1619.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1619.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1619","reference_id":"","reference_type":"","scores":[{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74106","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74113","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.73983","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.7399","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74015","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.73986","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.7402","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74035","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74057","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74038","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74031","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.7407","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74079","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74071","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74105","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1619"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=557223","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/chromium/issues/detail?id=557223"},{"reference_url":"https://codereview.chromium.org/1521473003","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/1521473003"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1612","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1612"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1613","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1613"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1614","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1614"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1617","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1617"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1620"},{"reference_url":"http://www.debian.org/security/2016/dsa-3456","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3456"},{"reference_url":"http://www.securityfocus.com/bid/81430","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/81430"},{"reference_url":"http://www.securitytracker.com/id/1034801","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034801"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1300995","reference_id":"1300995","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1300995"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1619","reference_id":"CVE-2016-1619","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"7.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1619"},{"reference_url":"https://security.gentoo.org/glsa/201603-09","reference_id":"GLSA-201603-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0072","reference_id":"RHSA-2016:0072","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0072"}],"fixed_packages":[],"aliases":["CVE-2016-1619"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h79s-h95e-qqdq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62134?format=json","vulnerability_id":"VCID-krmz-5411-tyb6","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00035.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00035.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00036.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00036.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00046.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00046.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0072.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0072.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1613.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1613.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1613","reference_id":"","reference_type":"","scores":[{"value":"0.0087","scoring_system":"epss","scoring_elements":"0.7528","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0087","scoring_system":"epss","scoring_elements":"0.75271","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0087","scoring_system":"epss","scoring_elements":"0.75148","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0087","scoring_system":"epss","scoring_elements":"0.75151","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0087","scoring_system":"epss","scoring_elements":"0.75182","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0087","scoring_system":"epss","scoring_elements":"0.75159","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0087","scoring_system":"epss","scoring_elements":"0.75193","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0087","scoring_system":"epss","scoring_elements":"0.75205","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0087","scoring_system":"epss","scoring_elements":"0.75227","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0087","scoring_system":"epss","scoring_elements":"0.7523","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0087","scoring_system":"epss","scoring_elements":"0.75236","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0087","scoring_system":"epss","scoring_elements":"0.75226","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0087","scoring_system":"epss","scoring_elements":"0.75263","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0087","scoring_system":"epss","scoring_elements":"0.75267","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1613"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=572871","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/chromium/issues/detail?id=572871"},{"reference_url":"https://codereview.chromium.org/1564773003","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/1564773003"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1612","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1612"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1613","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1613"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1614","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1614"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1617","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1617"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1620"},{"reference_url":"https://pdfium.googlesource.com/pdfium/+/dcac57bc8b64fdc870d79d11a498ae7021cf8ae7","reference_id":"","reference_type":"","scores":[],"url":"https://pdfium.googlesource.com/pdfium/+/dcac57bc8b64fdc870d79d11a498ae7021cf8ae7"},{"reference_url":"http://www.debian.org/security/2016/dsa-3456","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3456"},{"reference_url":"http://www.securityfocus.com/bid/81430","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/81430"},{"reference_url":"http://www.securitytracker.com/id/1034801","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034801"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1300989","reference_id":"1300989","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1300989"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1613","reference_id":"CVE-2016-1613","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"7.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1613"},{"reference_url":"https://security.gentoo.org/glsa/201603-09","reference_id":"GLSA-201603-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0072","reference_id":"RHSA-2016:0072","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0072"}],"fixed_packages":[],"aliases":["CVE-2016-1613"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-krmz-5411-tyb6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62135?format=json","vulnerability_id":"VCID-qmtf-faub-nyhr","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00035.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00035.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00036.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00036.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00046.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00046.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0072.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0072.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1614.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1614.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1614","reference_id":"","reference_type":"","scores":[{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.74026","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.74032","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73901","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.7391","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73934","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73906","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.7394","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73953","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73976","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73958","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.7395","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73991","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.74","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.73992","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.74025","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.74034","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1614"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=544691","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/chromium/issues/detail?id=544691"},{"reference_url":"https://codereview.chromium.org/1407393002/","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/1407393002/"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1612","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1612"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1613","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1613"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1614","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1614"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1617","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1617"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1620"},{"reference_url":"http://www.debian.org/security/2016/dsa-3456","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3456"},{"reference_url":"http://www.securityfocus.com/bid/81430","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/81430"},{"reference_url":"http://www.securitytracker.com/id/1034801","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034801"},{"reference_url":"http://www.ubuntu.com/usn/USN-2877-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2877-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1300990","reference_id":"1300990","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1300990"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1614","reference_id":"CVE-2016-1614","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"},{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1614"},{"reference_url":"https://security.gentoo.org/glsa/201603-09","reference_id":"GLSA-201603-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0072","reference_id":"RHSA-2016:0072","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0072"},{"reference_url":"https://usn.ubuntu.com/2877-1/","reference_id":"USN-2877-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2877-1/"}],"fixed_packages":[],"aliases":["CVE-2016-1614"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qmtf-faub-nyhr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51179?format=json","vulnerability_id":"VCID-rnfc-n53j-9yfb","summary":"Multiple vulnerabilities have been found in HarfBuzz, the worst of\n    which could allow remote attackers to cause a Denial of Service condition.","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00070.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00070.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0072.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0072.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2052.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2052.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2052","reference_id":"","reference_type":"","scores":[{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61177","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61228","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61081","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61159","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61187","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61152","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61201","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61216","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61236","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61223","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61204","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61244","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.6125","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61231","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.6122","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61235","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2052"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=544270","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/chromium/issues/detail?id=544270"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=579625","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/chromium/issues/detail?id=579625"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2052","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2052"},{"reference_url":"https://github.com/behdad/harfbuzz/commit/63ef0b41dc48d6112d1918c1b1de9de8ea90adb5","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/behdad/harfbuzz/commit/63ef0b41dc48d6112d1918c1b1de9de8ea90adb5"},{"reference_url":"https://github.com/behdad/harfbuzz/issues/139#issuecomment-148289957","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/behdad/harfbuzz/issues/139#issuecomment-148289957"},{"reference_url":"http://www.securityfocus.com/bid/81812","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/81812"},{"reference_url":"http://www.securitytracker.com/id/1034801","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034801"},{"reference_url":"http://www.ubuntu.com/usn/USN-2877-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2877-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-3067-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-3067-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1301553","reference_id":"1301553","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1301553"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:harfbuzz_project:harfbuzz:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:harfbuzz_project:harfbuzz:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:harfbuzz_project:harfbuzz:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-2052","reference_id":"CVE-2016-2052","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"7.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-2052"},{"reference_url":"https://security.gentoo.org/glsa/201701-76","reference_id":"GLSA-201701-76","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-76"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0072","reference_id":"RHSA-2016:0072","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0072"},{"reference_url":"https://usn.ubuntu.com/2877-1/","reference_id":"USN-2877-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2877-1/"},{"reference_url":"https://usn.ubuntu.com/3067-1/","reference_id":"USN-3067-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3067-1/"}],"fixed_packages":[],"aliases":["CVE-2016-2052"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rnfc-n53j-9yfb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62139?format=json","vulnerability_id":"VCID-stn4-q7wv-uubm","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00035.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00035.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00036.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00036.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00046.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00046.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0072.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0072.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1618.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1618.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1618","reference_id":"","reference_type":"","scores":[{"value":"0.00913","scoring_system":"epss","scoring_elements":"0.75962","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00913","scoring_system":"epss","scoring_elements":"0.75953","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00913","scoring_system":"epss","scoring_elements":"0.7581","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00913","scoring_system":"epss","scoring_elements":"0.75814","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00913","scoring_system":"epss","scoring_elements":"0.75847","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00913","scoring_system":"epss","scoring_elements":"0.75825","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00913","scoring_system":"epss","scoring_elements":"0.75858","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00913","scoring_system":"epss","scoring_elements":"0.7587","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00913","scoring_system":"epss","scoring_elements":"0.75893","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00913","scoring_system":"epss","scoring_elements":"0.75874","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00913","scoring_system":"epss","scoring_elements":"0.75868","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00913","scoring_system":"epss","scoring_elements":"0.75905","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00913","scoring_system":"epss","scoring_elements":"0.75909","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00913","scoring_system":"epss","scoring_elements":"0.75895","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00913","scoring_system":"epss","scoring_elements":"0.75933","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00913","scoring_system":"epss","scoring_elements":"0.75942","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1618"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=552749","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/chromium/issues/detail?id=552749"},{"reference_url":"https://codereview.chromium.org/1419293005","reference_id":"","reference_type":"","scores":[],"url":"https://codereview.chromium.org/1419293005"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1612","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1612"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1613","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1613"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1614","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1614"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1617","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1617"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1620"},{"reference_url":"http://www.debian.org/security/2016/dsa-3456","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3456"},{"reference_url":"http://www.securityfocus.com/bid/81430","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/81430"},{"reference_url":"http://www.securitytracker.com/id/1034801","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034801"},{"reference_url":"http://www.ubuntu.com/usn/USN-2877-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2877-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1300994","reference_id":"1300994","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1300994"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1618","reference_id":"CVE-2016-1618","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1618"},{"reference_url":"https://security.gentoo.org/glsa/201603-09","reference_id":"GLSA-201603-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0072","reference_id":"RHSA-2016:0072","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0072"},{"reference_url":"https://usn.ubuntu.com/2877-1/","reference_id":"USN-2877-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2877-1/"}],"fixed_packages":[],"aliases":["CVE-2016-1618"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-stn4-q7wv-uubm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62136?format=json","vulnerability_id":"VCID-zy24-y9c2-cqec","summary":"Multiple vulnerabilities have been found in the Chromium web\n    browser, the worst of which allows remote attackers to execute arbitrary\n    code.","references":[{"reference_url":"http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html","reference_id":"","reference_type":"","scores":[],"url":"http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00035.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00035.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00036.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00036.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00046.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00046.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0072.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0072.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1615.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1615.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1615","reference_id":"","reference_type":"","scores":[{"value":"0.00403","scoring_system":"epss","scoring_elements":"0.60926","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00403","scoring_system":"epss","scoring_elements":"0.60875","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00403","scoring_system":"epss","scoring_elements":"0.60921","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00403","scoring_system":"epss","scoring_elements":"0.60934","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73223","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73237","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73262","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73183","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73235","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73278","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73287","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73279","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73242","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73193","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73214","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73187","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1615"},{"reference_url":"https://code.google.com/p/chromium/issues/detail?id=468179","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/chromium/issues/detail?id=468179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1612","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1612"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1613","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1613"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1614","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1614"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1617","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1617"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1620"},{"reference_url":"http://www.debian.org/security/2016/dsa-3456","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3456"},{"reference_url":"http://www.securityfocus.com/bid/81430","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/81430"},{"reference_url":"http://www.securitytracker.com/id/1034801","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034801"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1300991","reference_id":"1300991","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1300991"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1615","reference_id":"CVE-2016-1615","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1615"},{"reference_url":"https://security.gentoo.org/glsa/201603-09","reference_id":"GLSA-201603-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0072","reference_id":"RHSA-2016:0072","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0072"}],"fixed_packages":[],"aliases":["CVE-2016-1615"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zy24-y9c2-cqec"}],"fixing_vulnerabilities":[],"risk_score":"4.4","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/chromium-browser@48.0.2564.82-1%3Farch=el6"}