Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/116417?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/116417?format=api", "purl": "pkg:rpm/redhat/chromium-browser@47.0.2526.80-1?arch=el6", "type": "rpm", "namespace": "redhat", "name": "chromium-browser", "version": "47.0.2526.80-1", "qualifiers": { "arch": "el6" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62128?format=api", "vulnerability_id": "VCID-crsx-z7zu-v7dk", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update_8.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update_8.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00017.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00017.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2618.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2618.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6788.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6788.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-6788", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03176", "scoring_system": "epss", "scoring_elements": "0.87094", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.03176", "scoring_system": "epss", "scoring_elements": "0.86903", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03176", "scoring_system": "epss", "scoring_elements": "0.86913", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03176", "scoring_system": "epss", "scoring_elements": "0.86932", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03176", "scoring_system": "epss", "scoring_elements": "0.86925", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03176", "scoring_system": "epss", "scoring_elements": "0.86945", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03176", "scoring_system": "epss", "scoring_elements": "0.86953", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03176", "scoring_system": "epss", "scoring_elements": "0.86967", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03176", "scoring_system": "epss", "scoring_elements": "0.86961", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03176", "scoring_system": "epss", "scoring_elements": "0.86956", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03176", "scoring_system": "epss", "scoring_elements": "0.86971", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03176", "scoring_system": "epss", "scoring_elements": "0.86975", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03176", "scoring_system": "epss", "scoring_elements": "0.86973", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03176", "scoring_system": "epss", "scoring_elements": "0.86991", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03176", "scoring_system": "epss", "scoring_elements": "0.86997", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.03176", "scoring_system": "epss", "scoring_elements": "0.86999", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.03176", "scoring_system": "epss", "scoring_elements": "0.87019", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.03176", "scoring_system": "epss", "scoring_elements": "0.87036", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.03176", "scoring_system": "epss", "scoring_elements": "0.87053", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.03176", "scoring_system": "epss", "scoring_elements": "0.87048", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.03176", "scoring_system": "epss", "scoring_elements": "0.87062", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-6788" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=548273", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=548273" }, { "reference_url": "https://codereview.chromium.org/1422383003/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/1422383003/" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6788", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6788" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6789", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6789" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6790", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6790" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6791", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6791" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8548" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3418", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3418" }, { "reference_url": "http://www.securityfocus.com/bid/78734", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/78734" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1289870", "reference_id": "1289870", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1289870" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-6788", "reference_id": "CVE-2015-6788", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-6788" }, { "reference_url": "https://security.gentoo.org/glsa/201603-09", "reference_id": "GLSA-201603-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2618", "reference_id": "RHSA-2015:2618", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2618" } ], "fixed_packages": [], "aliases": [ "CVE-2015-6788" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-crsx-z7zu-v7dk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80984?format=api", "vulnerability_id": "VCID-h9tv-1he7-eygh", "summary": "security update", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update_8.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update_8.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2618.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2618.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8548.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8548.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8548", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00818", "scoring_system": "epss", "scoring_elements": "0.74525", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00818", "scoring_system": "epss", "scoring_elements": "0.74305", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00818", "scoring_system": "epss", "scoring_elements": "0.74308", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00818", "scoring_system": "epss", "scoring_elements": "0.74336", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00818", "scoring_system": "epss", "scoring_elements": "0.74309", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00818", "scoring_system": "epss", "scoring_elements": "0.74342", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00818", "scoring_system": "epss", "scoring_elements": "0.74357", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00818", "scoring_system": "epss", "scoring_elements": "0.74378", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00818", "scoring_system": "epss", "scoring_elements": "0.74358", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00818", "scoring_system": "epss", "scoring_elements": "0.7435", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00818", "scoring_system": "epss", "scoring_elements": "0.74386", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00818", "scoring_system": "epss", "scoring_elements": "0.74395", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00818", "scoring_system": "epss", "scoring_elements": "0.74388", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00818", "scoring_system": "epss", "scoring_elements": "0.74421", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00818", "scoring_system": "epss", "scoring_elements": "0.74429", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00818", "scoring_system": "epss", "scoring_elements": "0.74428", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00818", "scoring_system": "epss", "scoring_elements": "0.74426", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00818", "scoring_system": "epss", "scoring_elements": "0.74455", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00818", "scoring_system": "epss", "scoring_elements": "0.74481", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00818", "scoring_system": "epss", "scoring_elements": "0.74447", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00818", "scoring_system": "epss", "scoring_elements": "0.74469", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8548" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6788", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6788" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6789", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6789" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6790", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6790" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6791", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6791" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8548" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2860-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2860-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291235", "reference_id": "1291235", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291235" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8548", "reference_id": "CVE-2015-8548", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8548" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2618", "reference_id": "RHSA-2015:2618", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2618" }, { "reference_url": "https://usn.ubuntu.com/2860-1/", "reference_id": "USN-2860-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2860-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2015-8548" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h9tv-1he7-eygh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62130?format=api", "vulnerability_id": "VCID-hnur-63pa-97cn", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update_8.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update_8.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00017.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00017.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2618.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2618.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6790.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6790.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-6790", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0094", "scoring_system": "epss", "scoring_elements": "0.76423", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.0094", "scoring_system": "epss", "scoring_elements": "0.7616", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0094", "scoring_system": "epss", "scoring_elements": "0.76166", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0094", "scoring_system": "epss", "scoring_elements": "0.76198", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0094", "scoring_system": "epss", "scoring_elements": "0.76179", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0094", "scoring_system": "epss", "scoring_elements": "0.76212", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0094", "scoring_system": "epss", "scoring_elements": "0.76225", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0094", "scoring_system": "epss", "scoring_elements": "0.7625", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0094", "scoring_system": "epss", "scoring_elements": "0.76228", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0094", "scoring_system": "epss", "scoring_elements": "0.76265", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0094", "scoring_system": "epss", "scoring_elements": "0.7627", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0094", "scoring_system": "epss", "scoring_elements": "0.76253", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0094", "scoring_system": "epss", "scoring_elements": "0.76291", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0094", "scoring_system": "epss", "scoring_elements": "0.76299", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0094", "scoring_system": "epss", "scoring_elements": "0.76311", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0094", "scoring_system": "epss", "scoring_elements": "0.7632", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0094", "scoring_system": "epss", "scoring_elements": "0.76349", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0094", "scoring_system": "epss", "scoring_elements": "0.7637", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0094", "scoring_system": "epss", "scoring_elements": "0.76357", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0094", "scoring_system": "epss", "scoring_elements": "0.76373", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-6790" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=542054", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=542054" }, { "reference_url": "https://codereview.chromium.org/1398453005", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/1398453005" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6788", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6788" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6789", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6789" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6790", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6790" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6791", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6791" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8548" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3418", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3418" }, { "reference_url": "http://www.securityfocus.com/bid/78734", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/78734" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2860-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2860-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1289875", "reference_id": "1289875", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1289875" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-6790", "reference_id": "CVE-2015-6790", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-6790" }, { "reference_url": "https://security.gentoo.org/glsa/201603-09", "reference_id": "GLSA-201603-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2618", "reference_id": "RHSA-2015:2618", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2618" }, { "reference_url": "https://usn.ubuntu.com/2860-1/", "reference_id": "USN-2860-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2860-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2015-6790" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hnur-63pa-97cn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62129?format=api", "vulnerability_id": "VCID-v8wc-j8qg-dkg7", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update_8.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update_8.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00017.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00017.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2618.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2618.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6789.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6789.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-6789", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01599", "scoring_system": "epss", "scoring_elements": "0.81889", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.01599", "scoring_system": "epss", "scoring_elements": "0.81627", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01599", "scoring_system": "epss", "scoring_elements": "0.81638", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01599", "scoring_system": "epss", "scoring_elements": "0.8166", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01599", "scoring_system": "epss", "scoring_elements": "0.81657", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01599", "scoring_system": "epss", "scoring_elements": "0.81684", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01599", "scoring_system": "epss", "scoring_elements": "0.81689", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01599", "scoring_system": "epss", "scoring_elements": "0.81709", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01599", "scoring_system": "epss", "scoring_elements": "0.81696", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01599", "scoring_system": "epss", "scoring_elements": "0.8169", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01599", "scoring_system": "epss", "scoring_elements": "0.81729", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01599", "scoring_system": "epss", "scoring_elements": "0.81728", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01599", "scoring_system": "epss", "scoring_elements": "0.81732", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01599", "scoring_system": "epss", "scoring_elements": "0.81756", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01599", "scoring_system": "epss", "scoring_elements": "0.81766", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01599", "scoring_system": "epss", "scoring_elements": "0.81771", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01599", "scoring_system": "epss", "scoring_elements": "0.81789", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01599", "scoring_system": "epss", "scoring_elements": "0.8181", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01599", "scoring_system": "epss", "scoring_elements": "0.81835", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01599", "scoring_system": "epss", "scoring_elements": "0.81831", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01599", "scoring_system": "epss", "scoring_elements": "0.81848", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-6789" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=557981", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=557981" }, { "reference_url": "https://codereview.chromium.org/1463433002/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://codereview.chromium.org/1463433002/" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6788", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6788" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6789", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6789" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6790", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6790" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6791", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6791" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8548" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3418", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3418" }, { "reference_url": "http://www.securityfocus.com/bid/78734", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/78734" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2860-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2860-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1289874", "reference_id": "1289874", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1289874" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-6789", "reference_id": "CVE-2015-6789", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-6789" }, { "reference_url": "https://security.gentoo.org/glsa/201603-09", "reference_id": "GLSA-201603-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2618", "reference_id": "RHSA-2015:2618", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2618" }, { "reference_url": "https://usn.ubuntu.com/2860-1/", "reference_id": "USN-2860-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2860-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2015-6789" ], "risk_score": 4.2, "exploitability": "0.5", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v8wc-j8qg-dkg7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62131?format=api", "vulnerability_id": "VCID-vka2-uuj8-ykac", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update_8.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2015/12/stable-channel-update_8.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00016.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00017.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00017.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2618.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-2618.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6791.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6791.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-6791", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.82152", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.81889", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.81901", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.81924", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.8192", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.81946", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.81954", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.81974", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.81963", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.81957", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.81992", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.81993", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.81995", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.82017", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.82028", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.82034", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.82052", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.82072", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.82097", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.82094", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01643", "scoring_system": "epss", "scoring_elements": "0.82111", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-6791" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=534994", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=534994" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=555784", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=555784" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=558840", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=558840" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=559310", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=559310" }, { "reference_url": "https://code.google.com/p/chromium/issues/detail?id=567513", "reference_id": "", "reference_type": "", "scores": [], "url": "https://code.google.com/p/chromium/issues/detail?id=567513" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6788", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6788" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6789", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6789" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6790", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6790" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6791", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6791" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8548" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3418", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3418" }, { "reference_url": "http://www.securityfocus.com/bid/78734", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/78734" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2860-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2860-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1289876", "reference_id": "1289876", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1289876" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-6791", "reference_id": "CVE-2015-6791", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-6791" }, { "reference_url": "https://security.gentoo.org/glsa/201603-09", "reference_id": "GLSA-201603-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2618", "reference_id": "RHSA-2015:2618", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2618" }, { "reference_url": "https://usn.ubuntu.com/2860-1/", "reference_id": "USN-2860-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2860-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2015-6791" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vka2-uuj8-ykac" } ], "fixing_vulnerabilities": [], "risk_score": "4.5", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/chromium-browser@47.0.2526.80-1%3Farch=el6" }