Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.23&reponame=community
Typeapk
Namespacealpine
Nameqt5-qtwebengine
Version5.15.11-r3
Qualifiers
arch riscv64
distroversion v3.23
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version5.15.11-r4
Latest_non_vulnerable_version5.15.17-r10
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-5znu-xyg6-a7fh
vulnerability_id VCID-5znu-xyg6-a7fh
summary Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3041
reference_id
reference_type
scores
0
value 0.00583
scoring_system epss
scoring_elements 0.68919
published_at 2026-04-07T12:55:00Z
1
value 0.00583
scoring_system epss
scoring_elements 0.68939
published_at 2026-04-04T12:55:00Z
2
value 0.00583
scoring_system epss
scoring_elements 0.68969
published_at 2026-04-08T12:55:00Z
3
value 0.00583
scoring_system epss
scoring_elements 0.68988
published_at 2026-04-09T12:55:00Z
4
value 0.00583
scoring_system epss
scoring_elements 0.69011
published_at 2026-04-11T12:55:00Z
5
value 0.00583
scoring_system epss
scoring_elements 0.68996
published_at 2026-04-12T12:55:00Z
6
value 0.00583
scoring_system epss
scoring_elements 0.68967
published_at 2026-04-13T12:55:00Z
7
value 0.00583
scoring_system epss
scoring_elements 0.69008
published_at 2026-04-16T12:55:00Z
8
value 0.00583
scoring_system epss
scoring_elements 0.69018
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3041
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3038
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3038
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3039
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3039
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3040
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3041
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3042
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3043
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3044
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3044
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3045
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3046
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3046
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3047
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3048
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3049
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3050
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3050
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3051
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3051
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3052
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3052
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3053
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3054
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3054
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3055
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3055
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3056
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3056
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3057
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3057
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3058
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3058
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3071
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3071
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4912
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4913
25
reference_url https://crbug.com/1345947
reference_id 1345947
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-21T19:02:20Z/
url https://crbug.com/1345947
26
reference_url https://security.gentoo.org/glsa/202209-23
reference_id GLSA-202209-23
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-21T19:02:20Z/
url https://security.gentoo.org/glsa/202209-23
27
reference_url https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html
reference_id stable-channel-update-for-desktop_30.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-21T19:02:20Z/
url https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html
28
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/
reference_id T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-21T19:02:20Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/
fixed_packages
0
url pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3%3Farch=riscv64&distroversion=v3.23&reponame=community
aliases CVE-2022-3041
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5znu-xyg6-a7fh
1
url VCID-7es8-7d9x-xfgm
vulnerability_id VCID-7es8-7d9x-xfgm
summary
Improper Validation of Array Index
SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35737.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35737.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-35737
reference_id
reference_type
scores
0
value 0.51941
scoring_system epss
scoring_elements 0.9792
published_at 2026-04-18T12:55:00Z
1
value 0.51941
scoring_system epss
scoring_elements 0.97919
published_at 2026-04-16T12:55:00Z
2
value 0.51941
scoring_system epss
scoring_elements 0.97912
published_at 2026-04-13T12:55:00Z
3
value 0.51941
scoring_system epss
scoring_elements 0.97907
published_at 2026-04-09T12:55:00Z
4
value 0.51941
scoring_system epss
scoring_elements 0.9791
published_at 2026-04-11T12:55:00Z
5
value 0.51941
scoring_system epss
scoring_elements 0.97904
published_at 2026-04-08T12:55:00Z
6
value 0.51941
scoring_system epss
scoring_elements 0.97899
published_at 2026-04-07T12:55:00Z
7
value 0.51941
scoring_system epss
scoring_elements 0.97896
published_at 2026-04-04T12:55:00Z
8
value 0.51941
scoring_system epss
scoring_elements 0.97895
published_at 2026-04-02T12:55:00Z
9
value 0.51941
scoring_system epss
scoring_elements 0.97911
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-35737
2
reference_url https://blog.trailofbits.com/2022/10/25/sqlite-vulnerability-july-2022-library-api
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://blog.trailofbits.com/2022/10/25/sqlite-vulnerability-july-2022-library-api
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35737
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/rusqlite/rusqlite
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/rusqlite/rusqlite
6
reference_url https://kb.cert.org/vuls/id/720344
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:53:26Z/
url https://kb.cert.org/vuls/id/720344
7
reference_url https://rustsec.org/advisories/RUSTSEC-2022-0090.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://rustsec.org/advisories/RUSTSEC-2022-0090.html
8
reference_url https://security.gentoo.org/glsa/202210-40
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:53:26Z/
url https://security.gentoo.org/glsa/202210-40
9
reference_url https://security.netapp.com/advisory/ntap-20220915-0009
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20220915-0009
10
reference_url https://sqlite.org/releaselog/3_39_2.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:53:26Z/
url https://sqlite.org/releaselog/3_39_2.html
11
reference_url https://www.sqlite.org/cves.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:53:26Z/
url https://www.sqlite.org/cves.html
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2110291
reference_id 2110291
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2110291
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-35737
reference_id CVE-2022-35737
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-35737
14
reference_url https://github.com/advisories/GHSA-jw36-hf63-69r9
reference_id GHSA-jw36-hf63-69r9
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-jw36-hf63-69r9
15
reference_url https://security.netapp.com/advisory/ntap-20220915-0009/
reference_id ntap-20220915-0009
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:53:26Z/
url https://security.netapp.com/advisory/ntap-20220915-0009/
16
reference_url https://access.redhat.com/errata/RHSA-2023:0110
reference_id RHSA-2023:0110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0110
17
reference_url https://access.redhat.com/errata/RHSA-2023:0339
reference_id RHSA-2023:0339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0339
18
reference_url https://access.redhat.com/errata/RHSA-2024:0425
reference_id RHSA-2024:0425
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0425
19
reference_url https://blog.trailofbits.com/2022/10/25/sqlite-vulnerability-july-2022-library-api/
reference_id sqlite-vulnerability-july-2022-library-api
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:53:26Z/
url https://blog.trailofbits.com/2022/10/25/sqlite-vulnerability-july-2022-library-api/
20
reference_url https://usn.ubuntu.com/5712-1/
reference_id USN-5712-1
reference_type
scores
url https://usn.ubuntu.com/5712-1/
21
reference_url https://usn.ubuntu.com/5716-1/
reference_id USN-5716-1
reference_type
scores
url https://usn.ubuntu.com/5716-1/
22
reference_url https://usn.ubuntu.com/5716-2/
reference_id USN-5716-2
reference_type
scores
url https://usn.ubuntu.com/5716-2/
fixed_packages
0
url pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3%3Farch=riscv64&distroversion=v3.23&reponame=community
aliases CVE-2022-35737, GHSA-jw36-hf63-69r9
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7es8-7d9x-xfgm
2
url VCID-7kh2-tzby-ybg6
vulnerability_id VCID-7kh2-tzby-ybg6
summary Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3446
reference_id
reference_type
scores
0
value 0.0043
scoring_system epss
scoring_elements 0.62505
published_at 2026-04-02T12:55:00Z
1
value 0.0043
scoring_system epss
scoring_elements 0.62503
published_at 2026-04-07T12:55:00Z
2
value 0.0043
scoring_system epss
scoring_elements 0.62554
published_at 2026-04-08T12:55:00Z
3
value 0.0043
scoring_system epss
scoring_elements 0.6257
published_at 2026-04-09T12:55:00Z
4
value 0.0043
scoring_system epss
scoring_elements 0.62589
published_at 2026-04-11T12:55:00Z
5
value 0.0043
scoring_system epss
scoring_elements 0.62578
published_at 2026-04-12T12:55:00Z
6
value 0.0043
scoring_system epss
scoring_elements 0.62555
published_at 2026-04-13T12:55:00Z
7
value 0.0043
scoring_system epss
scoring_elements 0.62597
published_at 2026-04-16T12:55:00Z
8
value 0.0043
scoring_system epss
scoring_elements 0.62538
published_at 2026-04-04T12:55:00Z
9
value 0.00487
scoring_system epss
scoring_elements 0.65484
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3446
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3445
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3445
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3446
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3446
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3447
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3447
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3448
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3449
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3449
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3450
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3450
7
reference_url https://crbug.com/1368076
reference_id 1368076
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-24T13:18:30Z/
url https://crbug.com/1368076
8
reference_url https://security.gentoo.org/glsa/202210-16
reference_id GLSA-202210-16
reference_type
scores
url https://security.gentoo.org/glsa/202210-16
9
reference_url https://security.gentoo.org/glsa/202305-10
reference_id GLSA-202305-10
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-24T13:18:30Z/
url https://security.gentoo.org/glsa/202305-10
10
reference_url https://chromereleases.googleblog.com/2022/10/stable-channel-update-for-desktop_11.html
reference_id stable-channel-update-for-desktop_11.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-24T13:18:30Z/
url https://chromereleases.googleblog.com/2022/10/stable-channel-update-for-desktop_11.html
fixed_packages
0
url pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3%3Farch=riscv64&distroversion=v3.23&reponame=community
aliases CVE-2022-3446
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7kh2-tzby-ybg6
3
url VCID-acj5-49vp-q3dj
vulnerability_id VCID-acj5-49vp-q3dj
summary Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3197
reference_id
reference_type
scores
0
value 0.00701
scoring_system epss
scoring_elements 0.7207
published_at 2026-04-18T12:55:00Z
1
value 0.00701
scoring_system epss
scoring_elements 0.71978
published_at 2026-04-07T12:55:00Z
2
value 0.00701
scoring_system epss
scoring_elements 0.72016
published_at 2026-04-08T12:55:00Z
3
value 0.00701
scoring_system epss
scoring_elements 0.72029
published_at 2026-04-09T12:55:00Z
4
value 0.00701
scoring_system epss
scoring_elements 0.72052
published_at 2026-04-11T12:55:00Z
5
value 0.00701
scoring_system epss
scoring_elements 0.72036
published_at 2026-04-12T12:55:00Z
6
value 0.00701
scoring_system epss
scoring_elements 0.72021
published_at 2026-04-13T12:55:00Z
7
value 0.00701
scoring_system epss
scoring_elements 0.72062
published_at 2026-04-16T12:55:00Z
8
value 0.00701
scoring_system epss
scoring_elements 0.71982
published_at 2026-04-02T12:55:00Z
9
value 0.00701
scoring_system epss
scoring_elements 0.72002
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3197
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3195
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3196
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3197
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3198
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3199
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3200
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3200
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3201
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3201
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3842
9
reference_url https://crbug.com/1358075
reference_id 1358075
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-21T19:38:51Z/
url https://crbug.com/1358075
10
reference_url https://security.gentoo.org/glsa/202209-23
reference_id GLSA-202209-23
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-21T19:38:51Z/
url https://security.gentoo.org/glsa/202209-23
11
reference_url https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html
reference_id stable-channel-update-for-desktop_14.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-21T19:38:51Z/
url https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/
reference_id T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-21T19:38:51Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/
fixed_packages
0
url pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3%3Farch=riscv64&distroversion=v3.23&reponame=community
aliases CVE-2022-3197
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-acj5-49vp-q3dj
4
url VCID-dxd4-qcnc-xbfv
vulnerability_id VCID-dxd4-qcnc-xbfv
summary Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3370
reference_id
reference_type
scores
0
value 0.00811
scoring_system epss
scoring_elements 0.74191
published_at 2026-04-07T12:55:00Z
1
value 0.00811
scoring_system epss
scoring_elements 0.74218
published_at 2026-04-04T12:55:00Z
2
value 0.00811
scoring_system epss
scoring_elements 0.74224
published_at 2026-04-08T12:55:00Z
3
value 0.00811
scoring_system epss
scoring_elements 0.74239
published_at 2026-04-09T12:55:00Z
4
value 0.00811
scoring_system epss
scoring_elements 0.7426
published_at 2026-04-11T12:55:00Z
5
value 0.00811
scoring_system epss
scoring_elements 0.74241
published_at 2026-04-12T12:55:00Z
6
value 0.00811
scoring_system epss
scoring_elements 0.74234
published_at 2026-04-13T12:55:00Z
7
value 0.00811
scoring_system epss
scoring_elements 0.74272
published_at 2026-04-16T12:55:00Z
8
value 0.00811
scoring_system epss
scoring_elements 0.74282
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3370
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3370
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3373
3
reference_url https://security.gentoo.org/glsa/202210-16
reference_id GLSA-202210-16
reference_type
scores
url https://security.gentoo.org/glsa/202210-16
fixed_packages
0
url pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3%3Farch=riscv64&distroversion=v3.23&reponame=community
aliases CVE-2022-3370
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dxd4-qcnc-xbfv
5
url VCID-e6yq-n39b-33gf
vulnerability_id VCID-e6yq-n39b-33gf
summary Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3196
reference_id
reference_type
scores
0
value 0.00636
scoring_system epss
scoring_elements 0.70496
published_at 2026-04-18T12:55:00Z
1
value 0.00636
scoring_system epss
scoring_elements 0.70391
published_at 2026-04-07T12:55:00Z
2
value 0.00636
scoring_system epss
scoring_elements 0.70436
published_at 2026-04-08T12:55:00Z
3
value 0.00636
scoring_system epss
scoring_elements 0.70451
published_at 2026-04-09T12:55:00Z
4
value 0.00636
scoring_system epss
scoring_elements 0.70475
published_at 2026-04-11T12:55:00Z
5
value 0.00636
scoring_system epss
scoring_elements 0.7046
published_at 2026-04-12T12:55:00Z
6
value 0.00636
scoring_system epss
scoring_elements 0.70446
published_at 2026-04-13T12:55:00Z
7
value 0.00636
scoring_system epss
scoring_elements 0.70488
published_at 2026-04-16T12:55:00Z
8
value 0.00636
scoring_system epss
scoring_elements 0.70394
published_at 2026-04-02T12:55:00Z
9
value 0.00636
scoring_system epss
scoring_elements 0.70411
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3196
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3195
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3196
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3197
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3198
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3199
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3200
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3200
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3201
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3201
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3842
9
reference_url https://crbug.com/1358090
reference_id 1358090
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-21T20:32:16Z/
url https://crbug.com/1358090
10
reference_url https://security.gentoo.org/glsa/202209-23
reference_id GLSA-202209-23
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-21T20:32:16Z/
url https://security.gentoo.org/glsa/202209-23
11
reference_url https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html
reference_id stable-channel-update-for-desktop_14.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-21T20:32:16Z/
url https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/
reference_id T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-21T20:32:16Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/
fixed_packages
0
url pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3%3Farch=riscv64&distroversion=v3.23&reponame=community
aliases CVE-2022-3196
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e6yq-n39b-33gf
6
url VCID-gbch-qjs9-s7g5
vulnerability_id VCID-gbch-qjs9-s7g5
summary Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3198
reference_id
reference_type
scores
0
value 0.00701
scoring_system epss
scoring_elements 0.7207
published_at 2026-04-18T12:55:00Z
1
value 0.00701
scoring_system epss
scoring_elements 0.71978
published_at 2026-04-07T12:55:00Z
2
value 0.00701
scoring_system epss
scoring_elements 0.72016
published_at 2026-04-08T12:55:00Z
3
value 0.00701
scoring_system epss
scoring_elements 0.72029
published_at 2026-04-09T12:55:00Z
4
value 0.00701
scoring_system epss
scoring_elements 0.72052
published_at 2026-04-11T12:55:00Z
5
value 0.00701
scoring_system epss
scoring_elements 0.72036
published_at 2026-04-12T12:55:00Z
6
value 0.00701
scoring_system epss
scoring_elements 0.72021
published_at 2026-04-13T12:55:00Z
7
value 0.00701
scoring_system epss
scoring_elements 0.72062
published_at 2026-04-16T12:55:00Z
8
value 0.00701
scoring_system epss
scoring_elements 0.71982
published_at 2026-04-02T12:55:00Z
9
value 0.00701
scoring_system epss
scoring_elements 0.72002
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3198
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3195
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3196
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3197
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3198
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3199
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3200
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3200
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3201
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3201
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3842
9
reference_url https://crbug.com/1355682
reference_id 1355682
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-21T18:00:53Z/
url https://crbug.com/1355682
10
reference_url https://security.gentoo.org/glsa/202209-23
reference_id GLSA-202209-23
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-21T18:00:53Z/
url https://security.gentoo.org/glsa/202209-23
11
reference_url https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html
reference_id stable-channel-update-for-desktop_14.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-21T18:00:53Z/
url https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/
reference_id T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-21T18:00:53Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/
fixed_packages
0
url pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3%3Farch=riscv64&distroversion=v3.23&reponame=community
aliases CVE-2022-3198
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gbch-qjs9-s7g5
7
url VCID-penr-by9s-f3dm
vulnerability_id VCID-penr-by9s-f3dm
summary Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3304
reference_id
reference_type
scores
0
value 0.00715
scoring_system epss
scoring_elements 0.72401
published_at 2026-04-18T12:55:00Z
1
value 0.00715
scoring_system epss
scoring_elements 0.72363
published_at 2026-04-12T12:55:00Z
2
value 0.00715
scoring_system epss
scoring_elements 0.72351
published_at 2026-04-13T12:55:00Z
3
value 0.00715
scoring_system epss
scoring_elements 0.72392
published_at 2026-04-16T12:55:00Z
4
value 0.00715
scoring_system epss
scoring_elements 0.72311
published_at 2026-04-02T12:55:00Z
5
value 0.00715
scoring_system epss
scoring_elements 0.72329
published_at 2026-04-04T12:55:00Z
6
value 0.00715
scoring_system epss
scoring_elements 0.72306
published_at 2026-04-07T12:55:00Z
7
value 0.00715
scoring_system epss
scoring_elements 0.72345
published_at 2026-04-08T12:55:00Z
8
value 0.00715
scoring_system epss
scoring_elements 0.72357
published_at 2026-04-09T12:55:00Z
9
value 0.00715
scoring_system epss
scoring_elements 0.7238
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3304
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3201
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3201
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3304
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3304
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3305
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3306
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3306
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3307
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3308
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3309
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3310
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3311
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3312
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3313
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3314
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3315
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3315
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3316
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3316
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3317
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3318
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3443
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3443
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3444
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3444
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4911
20
reference_url https://crbug.com/1358907
reference_id 1358907
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T17:58:53Z/
url https://crbug.com/1358907
21
reference_url https://security.gentoo.org/glsa/202210-16
reference_id GLSA-202210-16
reference_type
scores
url https://security.gentoo.org/glsa/202210-16
22
reference_url https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_27.html
reference_id stable-channel-update-for-desktop_27.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T17:58:53Z/
url https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_27.html
fixed_packages
0
url pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3%3Farch=riscv64&distroversion=v3.23&reponame=community
aliases CVE-2022-3304
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-penr-by9s-f3dm
8
url VCID-wd92-g154-uqdg
vulnerability_id VCID-wd92-g154-uqdg
summary Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3040
reference_id
reference_type
scores
0
value 0.00608
scoring_system epss
scoring_elements 0.69752
published_at 2026-04-18T12:55:00Z
1
value 0.00608
scoring_system epss
scoring_elements 0.69641
published_at 2026-04-07T12:55:00Z
2
value 0.00608
scoring_system epss
scoring_elements 0.69692
published_at 2026-04-08T12:55:00Z
3
value 0.00608
scoring_system epss
scoring_elements 0.69709
published_at 2026-04-09T12:55:00Z
4
value 0.00608
scoring_system epss
scoring_elements 0.69731
published_at 2026-04-11T12:55:00Z
5
value 0.00608
scoring_system epss
scoring_elements 0.69716
published_at 2026-04-12T12:55:00Z
6
value 0.00608
scoring_system epss
scoring_elements 0.69703
published_at 2026-04-13T12:55:00Z
7
value 0.00608
scoring_system epss
scoring_elements 0.69743
published_at 2026-04-16T12:55:00Z
8
value 0.00608
scoring_system epss
scoring_elements 0.69648
published_at 2026-04-02T12:55:00Z
9
value 0.00608
scoring_system epss
scoring_elements 0.69664
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3040
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3038
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3038
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3039
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3039
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3040
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3041
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3042
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3043
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3044
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3044
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3045
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3046
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3046
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3047
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3048
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3049
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3050
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3050
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3051
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3051
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3052
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3052
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3053
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3054
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3054
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3055
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3055
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3056
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3056
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3057
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3057
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3058
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3058
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3071
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3071
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4912
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4913
25
reference_url https://crbug.com/1341539
reference_id 1341539
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-21T19:03:05Z/
url https://crbug.com/1341539
26
reference_url https://security.gentoo.org/glsa/202209-23
reference_id GLSA-202209-23
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-21T19:03:05Z/
url https://security.gentoo.org/glsa/202209-23
27
reference_url https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html
reference_id stable-channel-update-for-desktop_30.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-21T19:03:05Z/
url https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html
28
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/
reference_id T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-21T19:03:05Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/
fixed_packages
0
url pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3%3Farch=riscv64&distroversion=v3.23&reponame=community
aliases CVE-2022-3040
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wd92-g154-uqdg
9
url VCID-xjnq-ytf1-jkgw
vulnerability_id VCID-xjnq-ytf1-jkgw
summary Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3075
reference_id
reference_type
scores
0
value 0.0212
scoring_system epss
scoring_elements 0.84162
published_at 2026-04-18T12:55:00Z
1
value 0.0212
scoring_system epss
scoring_elements 0.84102
published_at 2026-04-07T12:55:00Z
2
value 0.0212
scoring_system epss
scoring_elements 0.84125
published_at 2026-04-08T12:55:00Z
3
value 0.0212
scoring_system epss
scoring_elements 0.84131
published_at 2026-04-09T12:55:00Z
4
value 0.0212
scoring_system epss
scoring_elements 0.84148
published_at 2026-04-11T12:55:00Z
5
value 0.0212
scoring_system epss
scoring_elements 0.84142
published_at 2026-04-12T12:55:00Z
6
value 0.0212
scoring_system epss
scoring_elements 0.84138
published_at 2026-04-13T12:55:00Z
7
value 0.0212
scoring_system epss
scoring_elements 0.84161
published_at 2026-04-16T12:55:00Z
8
value 0.0212
scoring_system epss
scoring_elements 0.84083
published_at 2026-04-02T12:55:00Z
9
value 0.0212
scoring_system epss
scoring_elements 0.841
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3075
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3075
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3075
2
reference_url https://crbug.com/1358134
reference_id 1358134
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:24:45Z/
url https://crbug.com/1358134
3
reference_url https://security.gentoo.org/glsa/202209-23
reference_id GLSA-202209-23
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:24:45Z/
url https://security.gentoo.org/glsa/202209-23
4
reference_url https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop.html
reference_id stable-channel-update-for-desktop.html
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:24:45Z/
url https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop.html
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/
reference_id T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:24:45Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/
fixed_packages
0
url pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3%3Farch=riscv64&distroversion=v3.23&reponame=community
aliases CVE-2022-3075
risk_score 10.0
exploitability 2.0
weighted_severity 8.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xjnq-ytf1-jkgw
10
url VCID-ysw9-wrag-gqde
vulnerability_id VCID-ysw9-wrag-gqde
summary Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3199
reference_id
reference_type
scores
0
value 0.008
scoring_system epss
scoring_elements 0.74086
published_at 2026-04-18T12:55:00Z
1
value 0.008
scoring_system epss
scoring_elements 0.73994
published_at 2026-04-07T12:55:00Z
2
value 0.008
scoring_system epss
scoring_elements 0.74028
published_at 2026-04-08T12:55:00Z
3
value 0.008
scoring_system epss
scoring_elements 0.74042
published_at 2026-04-09T12:55:00Z
4
value 0.008
scoring_system epss
scoring_elements 0.74064
published_at 2026-04-11T12:55:00Z
5
value 0.008
scoring_system epss
scoring_elements 0.74045
published_at 2026-04-12T12:55:00Z
6
value 0.008
scoring_system epss
scoring_elements 0.74038
published_at 2026-04-13T12:55:00Z
7
value 0.008
scoring_system epss
scoring_elements 0.74077
published_at 2026-04-16T12:55:00Z
8
value 0.008
scoring_system epss
scoring_elements 0.73997
published_at 2026-04-02T12:55:00Z
9
value 0.008
scoring_system epss
scoring_elements 0.74023
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3199
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3195
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3196
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3197
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3198
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3199
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3200
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3200
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3201
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3201
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3842
9
reference_url https://crbug.com/1355237
reference_id 1355237
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-21T17:58:21Z/
url https://crbug.com/1355237
10
reference_url http://packetstormsecurity.com/files/170012/Chrome-blink-LocalFrameView-PerformLayout-Use-After-Free.html
reference_id Chrome-blink-LocalFrameView-PerformLayout-Use-After-Free.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-21T17:58:21Z/
url http://packetstormsecurity.com/files/170012/Chrome-blink-LocalFrameView-PerformLayout-Use-After-Free.html
11
reference_url https://security.gentoo.org/glsa/202209-23
reference_id GLSA-202209-23
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-21T17:58:21Z/
url https://security.gentoo.org/glsa/202209-23
12
reference_url https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html
reference_id stable-channel-update-for-desktop_14.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-21T17:58:21Z/
url https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/
reference_id T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-21T17:58:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/
fixed_packages
0
url pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3%3Farch=riscv64&distroversion=v3.23&reponame=community
aliases CVE-2022-3199
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ysw9-wrag-gqde
11
url VCID-z4ap-a8wt-87d4
vulnerability_id VCID-z4ap-a8wt-87d4
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3201
reference_id
reference_type
scores
0
value 0.00092
scoring_system epss
scoring_elements 0.25893
published_at 2026-04-02T12:55:00Z
1
value 0.00092
scoring_system epss
scoring_elements 0.25936
published_at 2026-04-04T12:55:00Z
2
value 0.00092
scoring_system epss
scoring_elements 0.25704
published_at 2026-04-07T12:55:00Z
3
value 0.00092
scoring_system epss
scoring_elements 0.25775
published_at 2026-04-08T12:55:00Z
4
value 0.00092
scoring_system epss
scoring_elements 0.25824
published_at 2026-04-09T12:55:00Z
5
value 0.00092
scoring_system epss
scoring_elements 0.25832
published_at 2026-04-11T12:55:00Z
6
value 0.00098
scoring_system epss
scoring_elements 0.26958
published_at 2026-04-12T12:55:00Z
7
value 0.00098
scoring_system epss
scoring_elements 0.26901
published_at 2026-04-13T12:55:00Z
8
value 0.00098
scoring_system epss
scoring_elements 0.26912
published_at 2026-04-16T12:55:00Z
9
value 0.00098
scoring_system epss
scoring_elements 0.26888
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3201
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3195
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3196
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3197
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3198
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3199
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3200
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3200
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3201
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3201
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3304
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3304
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3305
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3306
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3306
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3307
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3308
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3309
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3310
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3311
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3312
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3313
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3314
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3315
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3315
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3316
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3316
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3317
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3318
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3443
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3443
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3444
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3444
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3842
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4911
27
reference_url https://security.gentoo.org/glsa/202209-23
reference_id GLSA-202209-23
reference_type
scores
url https://security.gentoo.org/glsa/202209-23
28
reference_url https://security.gentoo.org/glsa/202210-16
reference_id GLSA-202210-16
reference_type
scores
url https://security.gentoo.org/glsa/202210-16
29
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
url https://security.gentoo.org/glsa/202311-11
fixed_packages
0
url pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3%3Farch=riscv64&distroversion=v3.23&reponame=community
1
url pkg:apk/alpine/qt5-qtwebengine@5.15.11-r7?arch=riscv64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt5-qtwebengine@5.15.11-r7?arch=riscv64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.11-r7%3Farch=riscv64&distroversion=v3.23&reponame=community
aliases CVE-2022-3201
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z4ap-a8wt-87d4
12
url VCID-zj3g-w5ak-xbfa
vulnerability_id VCID-zj3g-w5ak-xbfa
summary Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3038
reference_id
reference_type
scores
0
value 0.35994
scoring_system epss
scoring_elements 0.97097
published_at 2026-04-18T12:55:00Z
1
value 0.35994
scoring_system epss
scoring_elements 0.9707
published_at 2026-04-07T12:55:00Z
2
value 0.35994
scoring_system epss
scoring_elements 0.9708
published_at 2026-04-08T12:55:00Z
3
value 0.35994
scoring_system epss
scoring_elements 0.97081
published_at 2026-04-09T12:55:00Z
4
value 0.35994
scoring_system epss
scoring_elements 0.97084
published_at 2026-04-11T12:55:00Z
5
value 0.35994
scoring_system epss
scoring_elements 0.97085
published_at 2026-04-13T12:55:00Z
6
value 0.35994
scoring_system epss
scoring_elements 0.97095
published_at 2026-04-16T12:55:00Z
7
value 0.35994
scoring_system epss
scoring_elements 0.97066
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3038
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3038
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3038
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3039
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3039
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3040
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3041
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3042
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3043
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3044
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3044
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3045
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3046
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3046
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3047
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3048
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3049
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3049
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3050
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3050
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3051
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3051
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3052
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3052
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3053
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3054
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3054
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3055
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3055
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3056
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3056
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3057
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3057
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3058
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3058
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3071
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3071
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4912
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4913
25
reference_url https://crbug.com/1340253
reference_id 1340253
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-05-13T17:55:04Z/
url https://crbug.com/1340253
26
reference_url https://security.gentoo.org/glsa/202209-23
reference_id GLSA-202209-23
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-05-13T17:55:04Z/
url https://security.gentoo.org/glsa/202209-23
27
reference_url http://packetstormsecurity.com/files/168596/Google-Chrome-103.0.5060.53-network-URLLoader-NotifyCompleted-Heap-Use-After-Free.html
reference_id Google-Chrome-103.0.5060.53-network-URLLoader-NotifyCompleted-Heap-Use-After-Free.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-05-13T17:55:04Z/
url http://packetstormsecurity.com/files/168596/Google-Chrome-103.0.5060.53-network-URLLoader-NotifyCompleted-Heap-Use-After-Free.html
28
reference_url https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html
reference_id stable-channel-update-for-desktop_30.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-05-13T17:55:04Z/
url https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html
29
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/
reference_id T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-05-13T17:55:04Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/
fixed_packages
0
url pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3%3Farch=riscv64&distroversion=v3.23&reponame=community
aliases CVE-2022-3038
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zj3g-w5ak-xbfa
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3%3Farch=riscv64&distroversion=v3.23&reponame=community