Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/117046?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/117046?format=api", "purl": "pkg:rpm/redhat/chromium-browser@46.0.2490.71-1?arch=el6", "type": "rpm", "namespace": "redhat", "name": "chromium-browser", "version": "46.0.2490.71-1", "qualifiers": { "arch": "el6" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62096?format=api", "vulnerability_id": "VCID-6fkv-nbax-muh5", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6758.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6758.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-6758", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00964", "scoring_system": "epss", "scoring_elements": "0.76482", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00964", "scoring_system": "epss", "scoring_elements": "0.76486", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00964", "scoring_system": "epss", "scoring_elements": "0.76515", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00964", "scoring_system": "epss", "scoring_elements": "0.76497", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00964", "scoring_system": "epss", "scoring_elements": "0.7653", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00964", "scoring_system": "epss", "scoring_elements": "0.76541", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00964", "scoring_system": "epss", "scoring_elements": "0.76567", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00964", "scoring_system": "epss", "scoring_elements": "0.76546", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00964", "scoring_system": "epss", "scoring_elements": "0.76582", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00964", "scoring_system": "epss", "scoring_elements": "0.76586", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00964", "scoring_system": "epss", "scoring_elements": "0.76574", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00964", "scoring_system": "epss", "scoring_elements": "0.76605", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00964", "scoring_system": "epss", "scoring_elements": "0.7661", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00964", "scoring_system": "epss", "scoring_elements": "0.76624", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00964", "scoring_system": "epss", "scoring_elements": "0.76611", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00964", "scoring_system": "epss", "scoring_elements": "0.76641", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00964", "scoring_system": "epss", "scoring_elements": "0.76658", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00964", "scoring_system": "epss", "scoring_elements": "0.76645", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00964", "scoring_system": "epss", "scoring_elements": "0.76663", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00964", "scoring_system": "epss", "scoring_elements": "0.76711", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00964", "scoring_system": "epss", "scoring_elements": "0.76725", "published_at": "2026-05-15T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-6758" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1303", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1303" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1304", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1304" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6755", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6755" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6756", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6756" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6757", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6757" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6758", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6758" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6759", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6759" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6760", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6760" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6761", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6761" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6762", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6762" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6763", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6763" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271554", "reference_id": "1271554", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271554" }, { "reference_url": "https://security.gentoo.org/glsa/201603-09", "reference_id": "GLSA-201603-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1912", "reference_id": "RHSA-2015:1912", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1912" } ], "fixed_packages": [], "aliases": [ "CVE-2015-6758" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6fkv-nbax-muh5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62098?format=api", "vulnerability_id": "VCID-du5t-x1z6-cfe4", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6760.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6760.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-6760", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0103", "scoring_system": "epss", "scoring_elements": "0.77253", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0103", "scoring_system": "epss", "scoring_elements": "0.7726", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0103", "scoring_system": "epss", "scoring_elements": "0.77288", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0103", "scoring_system": "epss", "scoring_elements": "0.7727", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0103", "scoring_system": "epss", "scoring_elements": "0.77301", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0103", "scoring_system": "epss", "scoring_elements": "0.7731", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0103", "scoring_system": "epss", "scoring_elements": "0.77337", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0103", "scoring_system": "epss", "scoring_elements": "0.77317", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0103", "scoring_system": "epss", "scoring_elements": "0.77313", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0103", "scoring_system": "epss", "scoring_elements": "0.77353", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0103", "scoring_system": "epss", "scoring_elements": "0.77352", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0103", "scoring_system": "epss", "scoring_elements": "0.77344", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0103", "scoring_system": "epss", "scoring_elements": "0.77379", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0103", "scoring_system": "epss", "scoring_elements": "0.77385", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0103", "scoring_system": "epss", "scoring_elements": "0.77398", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0103", "scoring_system": "epss", "scoring_elements": "0.77406", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0103", "scoring_system": "epss", "scoring_elements": "0.77433", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0103", "scoring_system": "epss", "scoring_elements": "0.77456", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0103", "scoring_system": "epss", "scoring_elements": "0.77445", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0103", "scoring_system": "epss", "scoring_elements": "0.77463", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.0103", "scoring_system": "epss", "scoring_elements": "0.77509", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.0103", "scoring_system": "epss", "scoring_elements": "0.77524", "published_at": "2026-05-15T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-6760" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1303", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1303" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1304", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1304" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6755", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6755" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6756", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6756" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6757", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6757" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6758", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6758" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6759", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6759" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6760", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6760" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6761", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6761" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6762", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6762" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6763", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6763" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271556", "reference_id": "1271556", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271556" }, { "reference_url": "https://security.gentoo.org/glsa/201603-09", "reference_id": "GLSA-201603-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1912", "reference_id": "RHSA-2015:1912", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1912" } ], "fixed_packages": [], "aliases": [ "CVE-2015-6760" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-du5t-x1z6-cfe4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62095?format=api", "vulnerability_id": "VCID-fpn7-ypzk-u7hn", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6757.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6757.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-6757", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01583", "scoring_system": "epss", "scoring_elements": "0.81516", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01583", "scoring_system": "epss", "scoring_elements": "0.81528", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01583", "scoring_system": "epss", "scoring_elements": "0.81549", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01583", "scoring_system": "epss", "scoring_elements": "0.81548", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01583", "scoring_system": "epss", "scoring_elements": "0.81576", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01583", "scoring_system": "epss", "scoring_elements": "0.81581", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01583", "scoring_system": "epss", "scoring_elements": "0.81601", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01583", "scoring_system": "epss", "scoring_elements": "0.81589", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01583", "scoring_system": "epss", "scoring_elements": "0.81582", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01583", "scoring_system": "epss", "scoring_elements": "0.8162", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01583", "scoring_system": "epss", "scoring_elements": "0.81623", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01583", "scoring_system": "epss", "scoring_elements": "0.81647", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01583", "scoring_system": "epss", "scoring_elements": "0.81656", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01583", "scoring_system": "epss", "scoring_elements": "0.81661", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01583", "scoring_system": "epss", "scoring_elements": "0.81677", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01583", "scoring_system": "epss", "scoring_elements": "0.81699", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01583", "scoring_system": "epss", "scoring_elements": "0.81723", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01583", "scoring_system": "epss", "scoring_elements": "0.81722", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01583", "scoring_system": "epss", "scoring_elements": "0.81739", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01583", "scoring_system": "epss", "scoring_elements": "0.81779", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.01583", "scoring_system": "epss", "scoring_elements": "0.81782", "published_at": "2026-05-15T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-6757" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1303", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1303" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1304", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1304" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6755", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6755" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6756", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6756" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6757", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6757" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6758", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6758" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6759", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6759" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6760", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6760" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6761", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6761" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6762", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6762" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6763", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6763" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271553", "reference_id": "1271553", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271553" }, { "reference_url": "https://security.gentoo.org/glsa/201603-09", "reference_id": "GLSA-201603-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1912", "reference_id": "RHSA-2015:1912", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1912" }, { "reference_url": "https://usn.ubuntu.com/2770-1/", "reference_id": "USN-2770-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2770-1/" }, { "reference_url": "https://usn.ubuntu.com/2770-2/", "reference_id": "USN-2770-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2770-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2015-6757" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fpn7-ypzk-u7hn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62097?format=api", "vulnerability_id": "VCID-n2tr-kxme-v7at", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6759.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6759.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-6759", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00803", "scoring_system": "epss", "scoring_elements": "0.74048", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00803", "scoring_system": "epss", "scoring_elements": "0.74054", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00803", "scoring_system": "epss", "scoring_elements": "0.7408", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00803", "scoring_system": "epss", "scoring_elements": "0.74051", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00803", "scoring_system": "epss", "scoring_elements": "0.74084", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00803", "scoring_system": "epss", "scoring_elements": "0.74099", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00803", "scoring_system": "epss", "scoring_elements": "0.7412", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00803", "scoring_system": "epss", "scoring_elements": "0.74102", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00803", "scoring_system": "epss", "scoring_elements": "0.74096", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00803", "scoring_system": "epss", "scoring_elements": "0.74135", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00803", "scoring_system": "epss", "scoring_elements": "0.74143", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00803", "scoring_system": "epss", "scoring_elements": "0.74134", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00803", "scoring_system": "epss", "scoring_elements": "0.7417", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00803", "scoring_system": "epss", "scoring_elements": "0.74178", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00803", "scoring_system": "epss", "scoring_elements": "0.74171", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00803", "scoring_system": "epss", "scoring_elements": "0.74199", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00803", "scoring_system": "epss", "scoring_elements": "0.74222", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00803", "scoring_system": "epss", "scoring_elements": "0.74183", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00803", "scoring_system": "epss", "scoring_elements": "0.74207", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00803", "scoring_system": "epss", "scoring_elements": "0.74263", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00803", "scoring_system": "epss", "scoring_elements": "0.74268", "published_at": "2026-05-15T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-6759" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1303", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1303" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1304", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1304" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6755", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6755" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6756", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6756" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6757", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6757" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6758", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6758" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6759", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6759" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6760", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6760" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6761", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6761" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6762", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6762" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6763", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6763" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271555", "reference_id": "1271555", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271555" }, { "reference_url": "https://security.gentoo.org/glsa/201603-09", "reference_id": "GLSA-201603-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1912", "reference_id": "RHSA-2015:1912", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1912" }, { "reference_url": "https://usn.ubuntu.com/2770-1/", "reference_id": "USN-2770-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2770-1/" }, { "reference_url": "https://usn.ubuntu.com/2770-2/", "reference_id": "USN-2770-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2770-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2015-6759" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n2tr-kxme-v7at" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62100?format=api", "vulnerability_id": "VCID-pdz5-nb2j-7ue2", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6762.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6762.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-6762", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00699", "scoring_system": "epss", "scoring_elements": "0.71918", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00699", "scoring_system": "epss", "scoring_elements": "0.71926", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00699", "scoring_system": "epss", "scoring_elements": "0.71945", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00699", "scoring_system": "epss", "scoring_elements": "0.71922", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00699", "scoring_system": "epss", "scoring_elements": "0.71961", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00699", "scoring_system": "epss", "scoring_elements": "0.71973", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00699", "scoring_system": "epss", "scoring_elements": "0.71997", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00699", "scoring_system": "epss", "scoring_elements": "0.7198", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00699", "scoring_system": "epss", "scoring_elements": "0.71964", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00699", "scoring_system": "epss", "scoring_elements": "0.72005", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00699", "scoring_system": "epss", "scoring_elements": "0.72012", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00699", "scoring_system": "epss", "scoring_elements": "0.71998", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00699", "scoring_system": "epss", "scoring_elements": "0.72042", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00699", "scoring_system": "epss", "scoring_elements": "0.72049", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00699", "scoring_system": "epss", "scoring_elements": "0.72043", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00699", "scoring_system": "epss", "scoring_elements": "0.72036", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00699", "scoring_system": "epss", "scoring_elements": "0.72069", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00699", "scoring_system": "epss", "scoring_elements": "0.72095", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00699", "scoring_system": "epss", "scoring_elements": "0.72059", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00699", "scoring_system": "epss", "scoring_elements": "0.72086", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00699", "scoring_system": "epss", "scoring_elements": "0.72143", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00699", "scoring_system": "epss", "scoring_elements": "0.72153", "published_at": "2026-05-15T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-6762" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1303", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1303" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1304", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1304" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6755", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6755" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6756", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6756" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6757", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6757" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6758", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6758" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6759", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6759" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6760", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6760" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6761", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6761" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6762", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6762" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6763", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6763" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271558", "reference_id": "1271558", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271558" }, { "reference_url": "https://security.gentoo.org/glsa/201603-09", "reference_id": "GLSA-201603-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1912", "reference_id": "RHSA-2015:1912", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1912" }, { "reference_url": "https://usn.ubuntu.com/2770-1/", "reference_id": "USN-2770-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2770-1/" }, { "reference_url": "https://usn.ubuntu.com/2770-2/", "reference_id": "USN-2770-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2770-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2015-6762" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pdz5-nb2j-7ue2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62101?format=api", "vulnerability_id": "VCID-pnt4-n54c-b3dw", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6763.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6763.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-6763", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.09224", "scoring_system": "epss", "scoring_elements": "0.92683", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.09224", "scoring_system": "epss", "scoring_elements": "0.92691", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.09224", "scoring_system": "epss", "scoring_elements": "0.92697", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.09224", "scoring_system": "epss", "scoring_elements": "0.92695", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.09224", "scoring_system": "epss", "scoring_elements": "0.92705", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.09224", "scoring_system": "epss", "scoring_elements": "0.9271", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.09224", "scoring_system": "epss", "scoring_elements": "0.92716", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.09224", "scoring_system": "epss", "scoring_elements": "0.92715", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.09224", "scoring_system": "epss", "scoring_elements": "0.92714", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.09224", "scoring_system": "epss", "scoring_elements": "0.92726", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.09224", "scoring_system": "epss", "scoring_elements": "0.92731", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.09224", "scoring_system": "epss", "scoring_elements": "0.92734", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.09224", "scoring_system": "epss", "scoring_elements": "0.92735", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.09224", "scoring_system": "epss", "scoring_elements": "0.9273", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.09224", "scoring_system": "epss", "scoring_elements": "0.92738", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.09224", "scoring_system": "epss", "scoring_elements": "0.92751", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.09224", "scoring_system": "epss", "scoring_elements": "0.92763", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.09224", "scoring_system": "epss", "scoring_elements": "0.92767", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.09224", "scoring_system": "epss", "scoring_elements": "0.92772", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.09224", "scoring_system": "epss", "scoring_elements": "0.92796", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.09224", "scoring_system": "epss", "scoring_elements": "0.92802", "published_at": "2026-05-15T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-6763" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1303", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1303" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1304", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1304" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6755", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6755" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6756", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6756" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6757", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6757" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6758", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6758" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6759", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6759" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6760", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6760" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6761", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6761" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6762", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6762" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6763", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6763" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271559", "reference_id": "1271559", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271559" }, { "reference_url": "https://code.google.com/p/google-security-research/issues/detail?id=513", "reference_id": "CVE-2015-6763;OSVDB-128817", "reference_type": "exploit", "scores": [], "url": "https://code.google.com/p/google-security-research/issues/detail?id=513" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86/dos/38763.txt", "reference_id": "CVE-2015-6763;OSVDB-128817", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86/dos/38763.txt" }, { "reference_url": "https://security.gentoo.org/glsa/201603-09", "reference_id": "GLSA-201603-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1912", "reference_id": "RHSA-2015:1912", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1912" }, { "reference_url": "https://usn.ubuntu.com/2770-1/", "reference_id": "USN-2770-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2770-1/" }, { "reference_url": "https://usn.ubuntu.com/2770-2/", "reference_id": "USN-2770-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2770-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2015-6763" ], "risk_score": 0.2, "exploitability": "2.0", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pnt4-n54c-b3dw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62093?format=api", "vulnerability_id": "VCID-rzej-wk2y-zkb7", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6755.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6755.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-6755", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01042", "scoring_system": "epss", "scoring_elements": "0.77393", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01042", "scoring_system": "epss", "scoring_elements": "0.774", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01042", "scoring_system": "epss", "scoring_elements": "0.77426", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01042", "scoring_system": "epss", "scoring_elements": "0.77406", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01042", "scoring_system": "epss", "scoring_elements": "0.77436", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01042", "scoring_system": "epss", "scoring_elements": "0.77446", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01042", "scoring_system": "epss", "scoring_elements": "0.77471", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01042", "scoring_system": "epss", "scoring_elements": "0.77452", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01042", "scoring_system": "epss", "scoring_elements": "0.77448", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01042", "scoring_system": "epss", "scoring_elements": "0.77488", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01042", "scoring_system": "epss", "scoring_elements": "0.77486", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01042", "scoring_system": "epss", "scoring_elements": "0.77479", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01042", "scoring_system": "epss", "scoring_elements": "0.77514", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01042", "scoring_system": "epss", "scoring_elements": "0.77521", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01042", "scoring_system": "epss", "scoring_elements": "0.77535", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01042", "scoring_system": "epss", "scoring_elements": "0.77541", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01042", "scoring_system": "epss", "scoring_elements": "0.77569", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01042", "scoring_system": "epss", "scoring_elements": "0.77592", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01042", "scoring_system": "epss", "scoring_elements": "0.77579", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01042", "scoring_system": "epss", "scoring_elements": "0.77597", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01042", "scoring_system": "epss", "scoring_elements": "0.77645", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.01042", "scoring_system": "epss", "scoring_elements": "0.77659", "published_at": "2026-05-15T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-6755" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1303", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1303" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1304", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1304" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6755", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6755" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6756", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6756" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6757", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6757" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6758", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6758" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6759", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6759" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6760", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6760" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6761", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6761" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6762", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6762" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6763", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6763" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271480", "reference_id": "1271480", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271480" }, { "reference_url": "https://security.gentoo.org/glsa/201603-09", "reference_id": "GLSA-201603-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1912", "reference_id": "RHSA-2015:1912", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1912" }, { "reference_url": "https://usn.ubuntu.com/2770-1/", "reference_id": "USN-2770-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2770-1/" }, { "reference_url": "https://usn.ubuntu.com/2770-2/", "reference_id": "USN-2770-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2770-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2015-6755" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rzej-wk2y-zkb7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62094?format=api", "vulnerability_id": "VCID-smee-ck9m-1faj", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6756.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6756.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-6756", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00964", "scoring_system": "epss", "scoring_elements": "0.76482", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00964", "scoring_system": "epss", "scoring_elements": "0.76486", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00964", "scoring_system": "epss", "scoring_elements": "0.76515", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00964", "scoring_system": "epss", "scoring_elements": "0.76497", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00964", "scoring_system": "epss", "scoring_elements": "0.7653", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00964", "scoring_system": "epss", "scoring_elements": "0.76541", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00964", "scoring_system": "epss", "scoring_elements": "0.76567", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00964", "scoring_system": "epss", "scoring_elements": "0.76546", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00964", "scoring_system": "epss", "scoring_elements": "0.76582", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00964", "scoring_system": "epss", "scoring_elements": "0.76586", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00964", "scoring_system": "epss", "scoring_elements": "0.76574", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00964", "scoring_system": "epss", "scoring_elements": "0.76605", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00964", "scoring_system": "epss", "scoring_elements": "0.7661", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00964", "scoring_system": "epss", "scoring_elements": "0.76624", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00964", "scoring_system": "epss", "scoring_elements": "0.76611", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00964", "scoring_system": "epss", "scoring_elements": "0.76641", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00964", "scoring_system": "epss", "scoring_elements": "0.76658", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00964", "scoring_system": "epss", "scoring_elements": "0.76645", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00964", "scoring_system": "epss", "scoring_elements": "0.76663", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00964", "scoring_system": "epss", "scoring_elements": "0.76711", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00964", "scoring_system": "epss", "scoring_elements": "0.76725", "published_at": "2026-05-15T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-6756" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1303", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1303" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1304", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1304" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6755", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6755" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6756", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6756" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6757", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6757" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6758", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6758" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6759", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6759" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6760", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6760" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6761", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6761" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6762", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6762" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6763", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6763" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271483", "reference_id": "1271483", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271483" }, { "reference_url": "https://security.gentoo.org/glsa/201603-09", "reference_id": "GLSA-201603-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1912", "reference_id": "RHSA-2015:1912", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1912" } ], "fixed_packages": [], "aliases": [ "CVE-2015-6756" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-smee-ck9m-1faj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62099?format=api", "vulnerability_id": "VCID-vqrb-wyeh-gyhv", "summary": "Multiple vulnerabilities have been found in the Chromium web\n browser, the worst of which allows remote attackers to execute arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6761.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6761.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-6761", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01459", "scoring_system": "epss", "scoring_elements": "0.80774", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01459", "scoring_system": "epss", "scoring_elements": "0.80784", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01459", "scoring_system": "epss", "scoring_elements": "0.80805", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01459", "scoring_system": "epss", "scoring_elements": "0.80802", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01459", "scoring_system": "epss", "scoring_elements": "0.80829", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01459", "scoring_system": "epss", "scoring_elements": "0.80838", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01459", "scoring_system": "epss", "scoring_elements": "0.80854", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01459", "scoring_system": "epss", "scoring_elements": "0.80839", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01459", "scoring_system": "epss", "scoring_elements": "0.80831", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01459", "scoring_system": "epss", "scoring_elements": "0.80869", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01459", "scoring_system": "epss", "scoring_elements": "0.80871", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01459", "scoring_system": "epss", "scoring_elements": "0.80872", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01459", "scoring_system": "epss", "scoring_elements": "0.80893", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01459", "scoring_system": "epss", "scoring_elements": "0.809", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01459", "scoring_system": "epss", "scoring_elements": "0.80912", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01459", "scoring_system": "epss", "scoring_elements": "0.80928", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01459", "scoring_system": "epss", "scoring_elements": "0.80949", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01459", "scoring_system": "epss", "scoring_elements": "0.80971", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01459", "scoring_system": "epss", "scoring_elements": "0.80965", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01459", "scoring_system": "epss", "scoring_elements": "0.80983", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01459", "scoring_system": "epss", "scoring_elements": "0.81026", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.01459", "scoring_system": "epss", "scoring_elements": "0.81031", "published_at": "2026-05-15T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-6761" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1303", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1303" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1304", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1304" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6755", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6755" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6756", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6756" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6757", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6757" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6758", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6758" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6759", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6759" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6760", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6760" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6761", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6761" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6762", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6762" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6763", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6763" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271557", "reference_id": "1271557", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271557" }, { "reference_url": "https://security.gentoo.org/glsa/201603-09", "reference_id": "GLSA-201603-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1912", "reference_id": "RHSA-2015:1912", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1912" }, { "reference_url": "https://usn.ubuntu.com/2770-1/", "reference_id": "USN-2770-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2770-1/" }, { "reference_url": "https://usn.ubuntu.com/2770-2/", "reference_id": "USN-2770-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2770-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2015-6761" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vqrb-wyeh-gyhv" } ], "fixing_vulnerabilities": [], "risk_score": "0.2", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/chromium-browser@46.0.2490.71-1%3Farch=el6" }