Lookup for vulnerable packages by Package URL.

GET /api/packages/516752?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/516752?format=api",
    "purl": "pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.22&reponame=community",
    "type": "apk",
    "namespace": "alpine",
    "name": "qt5-qtwebengine",
    "version": "5.15.11-r3",
    "qualifiers": {
        "arch": "riscv64",
        "distroversion": "v3.22",
        "reponame": "community"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "5.15.11-r4",
    "latest_non_vulnerable_version": "5.15.17-r10",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/44948?format=api",
            "vulnerability_id": "VCID-5znu-xyg6-a7fh",
            "summary": "Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3041",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69062",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68996",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68967",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69008",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69018",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68998",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69049",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69056",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68919",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68939",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68969",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68988",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69011",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3041"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3038",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3038"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3039",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3039"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3040",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3040"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3041",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3041"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3042",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3042"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3043",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3043"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3044",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3044"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3045",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3045"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3046",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3046"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3047",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3047"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3048",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3048"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3049",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3049"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3050",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3050"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3051",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3051"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3052",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3052"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3053",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3053"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3054",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3054"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3055",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3055"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3056",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3056"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3057",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3057"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3058",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3058"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3071",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3071"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4912",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4912"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4913",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4913"
                },
                {
                    "reference_url": "https://crbug.com/1345947",
                    "reference_id": "1345947",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-21T19:02:20Z/"
                        }
                    ],
                    "url": "https://crbug.com/1345947"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202209-23",
                    "reference_id": "GLSA-202209-23",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-21T19:02:20Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202209-23"
                },
                {
                    "reference_url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html",
                    "reference_id": "stable-channel-update-for-desktop_30.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-21T19:02:20Z/"
                        }
                    ],
                    "url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/",
                    "reference_id": "T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-21T19:02:20Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/516752?format=api",
                    "purl": "pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.22&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3%3Farch=riscv64&distroversion=v3.22&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2022-3041"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5znu-xyg6-a7fh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/13197?format=api",
            "vulnerability_id": "VCID-7es8-7d9x-xfgm",
            "summary": "Improper Validation of Array Index\nSQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35737.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35737.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-35737",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.51941",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97924",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.51941",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97917",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.51941",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97895",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.51941",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97912",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.51941",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97911",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.51941",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9791",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.51941",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97907",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.51941",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97904",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.51941",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97899",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.51941",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97896",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.51941",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97918",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.51941",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9792",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.51941",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97919",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-35737"
                },
                {
                    "reference_url": "https://blog.trailofbits.com/2022/10/25/sqlite-vulnerability-july-2022-library-api",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://blog.trailofbits.com/2022/10/25/sqlite-vulnerability-july-2022-library-api"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35737",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35737"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/rusqlite/rusqlite",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rusqlite/rusqlite"
                },
                {
                    "reference_url": "https://kb.cert.org/vuls/id/720344",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:53:26Z/"
                        }
                    ],
                    "url": "https://kb.cert.org/vuls/id/720344"
                },
                {
                    "reference_url": "https://rustsec.org/advisories/RUSTSEC-2022-0090.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://rustsec.org/advisories/RUSTSEC-2022-0090.html"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-40",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:53:26Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202210-40"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20220915-0009",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20220915-0009"
                },
                {
                    "reference_url": "https://sqlite.org/releaselog/3_39_2.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:53:26Z/"
                        }
                    ],
                    "url": "https://sqlite.org/releaselog/3_39_2.html"
                },
                {
                    "reference_url": "https://www.sqlite.org/cves.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:53:26Z/"
                        }
                    ],
                    "url": "https://www.sqlite.org/cves.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2110291",
                    "reference_id": "2110291",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2110291"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-35737",
                    "reference_id": "CVE-2022-35737",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-35737"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-jw36-hf63-69r9",
                    "reference_id": "GHSA-jw36-hf63-69r9",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-jw36-hf63-69r9"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20220915-0009/",
                    "reference_id": "ntap-20220915-0009",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:53:26Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20220915-0009/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0110",
                    "reference_id": "RHSA-2023:0110",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0110"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0339",
                    "reference_id": "RHSA-2023:0339",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0339"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0425",
                    "reference_id": "RHSA-2024:0425",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0425"
                },
                {
                    "reference_url": "https://blog.trailofbits.com/2022/10/25/sqlite-vulnerability-july-2022-library-api/",
                    "reference_id": "sqlite-vulnerability-july-2022-library-api",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:53:26Z/"
                        }
                    ],
                    "url": "https://blog.trailofbits.com/2022/10/25/sqlite-vulnerability-july-2022-library-api/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5712-1/",
                    "reference_id": "USN-5712-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5712-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5716-1/",
                    "reference_id": "USN-5716-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5716-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5716-2/",
                    "reference_id": "USN-5716-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5716-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/516752?format=api",
                    "purl": "pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.22&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3%3Farch=riscv64&distroversion=v3.22&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2022-35737",
                "GHSA-jw36-hf63-69r9"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7es8-7d9x-xfgm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35591?format=api",
            "vulnerability_id": "VCID-7kh2-tzby-ybg6",
            "summary": "Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3446",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62505",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62538",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62503",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62554",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6257",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62589",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62578",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62555",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0043",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62597",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65495",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65484",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65469",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65486",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65498",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3446"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3445",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3445"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3446",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3446"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3447",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3447"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3448",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3448"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3449",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3449"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3450",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3450"
                },
                {
                    "reference_url": "https://crbug.com/1368076",
                    "reference_id": "1368076",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-24T13:18:30Z/"
                        }
                    ],
                    "url": "https://crbug.com/1368076"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-16",
                    "reference_id": "GLSA-202210-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202210-16"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202305-10",
                    "reference_id": "GLSA-202305-10",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-24T13:18:30Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202305-10"
                },
                {
                    "reference_url": "https://chromereleases.googleblog.com/2022/10/stable-channel-update-for-desktop_11.html",
                    "reference_id": "stable-channel-update-for-desktop_11.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-24T13:18:30Z/"
                        }
                    ],
                    "url": "https://chromereleases.googleblog.com/2022/10/stable-channel-update-for-desktop_11.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/516752?format=api",
                    "purl": "pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.22&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3%3Farch=riscv64&distroversion=v3.22&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2022-3446"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7kh2-tzby-ybg6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/45076?format=api",
            "vulnerability_id": "VCID-acj5-49vp-q3dj",
            "summary": "Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3197",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00701",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72099",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00701",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72036",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00701",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72021",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00701",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72062",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00701",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7207",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00701",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72055",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00701",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72098",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00701",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72106",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00701",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71982",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00701",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72002",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00701",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71978",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00701",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72016",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00701",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72029",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00701",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72052",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3197"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3195",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3195"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3196",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3196"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3197",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3197"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3198",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3198"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3199",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3199"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3200",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3200"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3201",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3201"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3842"
                },
                {
                    "reference_url": "https://crbug.com/1358075",
                    "reference_id": "1358075",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-21T19:38:51Z/"
                        }
                    ],
                    "url": "https://crbug.com/1358075"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202209-23",
                    "reference_id": "GLSA-202209-23",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-21T19:38:51Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202209-23"
                },
                {
                    "reference_url": "https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html",
                    "reference_id": "stable-channel-update-for-desktop_14.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-21T19:38:51Z/"
                        }
                    ],
                    "url": "https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/",
                    "reference_id": "T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-21T19:38:51Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/516752?format=api",
                    "purl": "pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.22&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3%3Farch=riscv64&distroversion=v3.22&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2022-3197"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-acj5-49vp-q3dj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56252?format=api",
            "vulnerability_id": "VCID-dxd4-qcnc-xbfv",
            "summary": "Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3370",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00811",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74191",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00811",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74218",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00811",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74224",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00811",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74239",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00811",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7426",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00811",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74241",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00811",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74234",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00811",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74272",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00811",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74282",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00811",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74274",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00811",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74307",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00811",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74316",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00811",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74315",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3370"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3370",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3370"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3373",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3373"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-16",
                    "reference_id": "GLSA-202210-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202210-16"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/516752?format=api",
                    "purl": "pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.22&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3%3Farch=riscv64&distroversion=v3.22&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2022-3370"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dxd4-qcnc-xbfv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/45074?format=api",
            "vulnerability_id": "VCID-e6yq-n39b-33gf",
            "summary": "Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3196",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00636",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70535",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00636",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7046",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00636",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70446",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00636",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70488",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00636",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70496",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00636",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70476",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00636",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70528",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00636",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70536",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00636",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70394",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00636",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70411",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00636",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70391",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00636",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70436",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00636",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70451",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00636",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70475",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3196"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3195",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3195"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3196",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3196"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3197",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3197"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3198",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3198"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3199",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3199"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3200",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3200"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3201",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3201"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3842"
                },
                {
                    "reference_url": "https://crbug.com/1358090",
                    "reference_id": "1358090",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-21T20:32:16Z/"
                        }
                    ],
                    "url": "https://crbug.com/1358090"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202209-23",
                    "reference_id": "GLSA-202209-23",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-21T20:32:16Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202209-23"
                },
                {
                    "reference_url": "https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html",
                    "reference_id": "stable-channel-update-for-desktop_14.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-21T20:32:16Z/"
                        }
                    ],
                    "url": "https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/",
                    "reference_id": "T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-21T20:32:16Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/516752?format=api",
                    "purl": "pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.22&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3%3Farch=riscv64&distroversion=v3.22&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2022-3196"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e6yq-n39b-33gf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/45092?format=api",
            "vulnerability_id": "VCID-gbch-qjs9-s7g5",
            "summary": "Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3198",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00701",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72099",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00701",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72036",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00701",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72021",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00701",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72062",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00701",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7207",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00701",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72055",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00701",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72098",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00701",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72106",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00701",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71982",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00701",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72002",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00701",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71978",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00701",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72016",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00701",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72029",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00701",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72052",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3198"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3195",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3195"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3196",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3196"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3197",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3197"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3198",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3198"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3199",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3199"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3200",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3200"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3201",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3201"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3842"
                },
                {
                    "reference_url": "https://crbug.com/1355682",
                    "reference_id": "1355682",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-21T18:00:53Z/"
                        }
                    ],
                    "url": "https://crbug.com/1355682"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202209-23",
                    "reference_id": "GLSA-202209-23",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-21T18:00:53Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202209-23"
                },
                {
                    "reference_url": "https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html",
                    "reference_id": "stable-channel-update-for-desktop_14.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-21T18:00:53Z/"
                        }
                    ],
                    "url": "https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/",
                    "reference_id": "T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-21T18:00:53Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/516752?format=api",
                    "purl": "pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.22&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3%3Farch=riscv64&distroversion=v3.22&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2022-3198"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gbch-qjs9-s7g5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56237?format=api",
            "vulnerability_id": "VCID-penr-by9s-f3dm",
            "summary": "Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3304",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00711",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72327",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00711",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72333",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00711",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72337",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7238",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72351",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72392",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72401",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72389",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72329",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72306",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72345",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72357",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72311",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00715",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72363",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3304"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3201",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3201"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3304",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3304"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3305",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3305"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3306",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3306"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3307",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3307"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3308",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3308"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3309",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3309"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3310",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3310"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3311",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3311"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3312",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3312"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3313",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3313"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3314",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3314"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3315",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3315"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3316",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3316"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3317"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3318",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3318"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3443",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3443"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3444",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3444"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4911"
                },
                {
                    "reference_url": "https://crbug.com/1358907",
                    "reference_id": "1358907",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T17:58:53Z/"
                        }
                    ],
                    "url": "https://crbug.com/1358907"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-16",
                    "reference_id": "GLSA-202210-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202210-16"
                },
                {
                    "reference_url": "https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_27.html",
                    "reference_id": "stable-channel-update-for-desktop_27.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T17:58:53Z/"
                        }
                    ],
                    "url": "https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_27.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/516752?format=api",
                    "purl": "pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.22&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3%3Farch=riscv64&distroversion=v3.22&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2022-3304"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-penr-by9s-f3dm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/44940?format=api",
            "vulnerability_id": "VCID-wd92-g154-uqdg",
            "summary": "Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3040",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69798",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69716",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69703",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69743",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69752",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69733",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69784",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69792",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69648",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69664",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69641",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69692",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69709",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00608",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69731",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3040"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3038",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3038"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3039",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3039"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3040",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3040"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3041",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3041"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3042",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3042"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3043",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3043"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3044",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3044"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3045",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3045"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3046",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3046"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3047",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3047"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3048",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3048"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3049",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3049"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3050",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3050"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3051",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3051"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3052",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3052"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3053",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3053"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3054",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3054"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3055",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3055"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3056",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3056"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3057",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3057"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3058",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3058"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3071",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3071"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4912",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4912"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4913",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4913"
                },
                {
                    "reference_url": "https://crbug.com/1341539",
                    "reference_id": "1341539",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-21T19:03:05Z/"
                        }
                    ],
                    "url": "https://crbug.com/1341539"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202209-23",
                    "reference_id": "GLSA-202209-23",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-21T19:03:05Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202209-23"
                },
                {
                    "reference_url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html",
                    "reference_id": "stable-channel-update-for-desktop_30.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-21T19:03:05Z/"
                        }
                    ],
                    "url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/",
                    "reference_id": "T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-21T19:03:05Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/516752?format=api",
                    "purl": "pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.22&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3%3Farch=riscv64&distroversion=v3.22&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2022-3040"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wd92-g154-uqdg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/45068?format=api",
            "vulnerability_id": "VCID-xjnq-ytf1-jkgw",
            "summary": "Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3075",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84204",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84142",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84138",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84161",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84162",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84166",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84191",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84198",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84083",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.841",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84102",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84125",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84131",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84148",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3075"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3075",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3075"
                },
                {
                    "reference_url": "https://crbug.com/1358134",
                    "reference_id": "1358134",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:24:45Z/"
                        }
                    ],
                    "url": "https://crbug.com/1358134"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202209-23",
                    "reference_id": "GLSA-202209-23",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:24:45Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202209-23"
                },
                {
                    "reference_url": "https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop.html",
                    "reference_id": "stable-channel-update-for-desktop.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:24:45Z/"
                        }
                    ],
                    "url": "https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop.html"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/",
                    "reference_id": "T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:24:45Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/516752?format=api",
                    "purl": "pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.22&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3%3Farch=riscv64&distroversion=v3.22&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2022-3075"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "8.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xjnq-ytf1-jkgw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/45117?format=api",
            "vulnerability_id": "VCID-ysw9-wrag-gqde",
            "summary": "Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3199",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7412",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74045",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74038",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74077",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74086",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74078",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74113",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74121",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73997",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74023",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73994",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74028",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74042",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74064",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3199"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3195",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3195"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3196",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3196"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3197",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3197"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3198",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3198"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3199",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3199"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3200",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3200"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3201",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3201"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3842"
                },
                {
                    "reference_url": "https://crbug.com/1355237",
                    "reference_id": "1355237",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-21T17:58:21Z/"
                        }
                    ],
                    "url": "https://crbug.com/1355237"
                },
                {
                    "reference_url": "http://packetstormsecurity.com/files/170012/Chrome-blink-LocalFrameView-PerformLayout-Use-After-Free.html",
                    "reference_id": "Chrome-blink-LocalFrameView-PerformLayout-Use-After-Free.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-21T17:58:21Z/"
                        }
                    ],
                    "url": "http://packetstormsecurity.com/files/170012/Chrome-blink-LocalFrameView-PerformLayout-Use-After-Free.html"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202209-23",
                    "reference_id": "GLSA-202209-23",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-21T17:58:21Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202209-23"
                },
                {
                    "reference_url": "https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html",
                    "reference_id": "stable-channel-update-for-desktop_14.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-21T17:58:21Z/"
                        }
                    ],
                    "url": "https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/",
                    "reference_id": "T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-21T17:58:21Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/516752?format=api",
                    "purl": "pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.22&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3%3Farch=riscv64&distroversion=v3.22&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2022-3199"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ysw9-wrag-gqde"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42143?format=api",
            "vulnerability_id": "VCID-z4ap-a8wt-87d4",
            "summary": "Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3201",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25893",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25936",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25704",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25775",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25824",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25832",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26958",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26901",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26912",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26888",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26852",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26803",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26795",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26729",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3201"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3195",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3195"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3196",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3196"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3197",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3197"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3198",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3198"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3199",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3199"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3200",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3200"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3201",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3201"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3304",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3304"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3305",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3305"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3306",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3306"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3307",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3307"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3308",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3308"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3309",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3309"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3310",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3310"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3311",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3311"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3312",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3312"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3313",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3313"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3314",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3314"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3315",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3315"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3316",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3316"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3317"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3318",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3318"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3443",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3443"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3444",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3444"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3842"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4911"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202209-23",
                    "reference_id": "GLSA-202209-23",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202209-23"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-16",
                    "reference_id": "GLSA-202210-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202210-16"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202311-11",
                    "reference_id": "GLSA-202311-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202311-11"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/516752?format=api",
                    "purl": "pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.22&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3%3Farch=riscv64&distroversion=v3.22&reponame=community"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/976699?format=api",
                    "purl": "pkg:apk/alpine/qt5-qtwebengine@5.15.11-r7?arch=riscv64&distroversion=v3.22&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.11-r7%3Farch=riscv64&distroversion=v3.22&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2022-3201"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z4ap-a8wt-87d4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/44917?format=api",
            "vulnerability_id": "VCID-zj3g-w5ak-xbfa",
            "summary": "Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3038",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.35994",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97106",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.35994",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97084",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.35994",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97085",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.35994",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97095",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.35994",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97097",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.35994",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97102",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.35994",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97103",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.35994",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97105",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.35994",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97066",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.35994",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9707",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.35994",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9708",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.35994",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97081",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3038"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3038",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3038"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3039",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3039"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3040",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3040"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3041",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3041"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3042",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3042"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3043",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3043"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3044",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3044"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3045",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3045"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3046",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3046"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3047",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3047"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3048",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3048"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3049",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3049"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3050",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3050"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3051",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3051"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3052",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3052"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3053",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3053"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3054",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3054"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3055",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3055"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3056",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3056"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3057",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3057"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3058",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3058"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3071",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3071"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4912",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4912"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4913",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4913"
                },
                {
                    "reference_url": "https://crbug.com/1340253",
                    "reference_id": "1340253",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-05-13T17:55:04Z/"
                        }
                    ],
                    "url": "https://crbug.com/1340253"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202209-23",
                    "reference_id": "GLSA-202209-23",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-05-13T17:55:04Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202209-23"
                },
                {
                    "reference_url": "http://packetstormsecurity.com/files/168596/Google-Chrome-103.0.5060.53-network-URLLoader-NotifyCompleted-Heap-Use-After-Free.html",
                    "reference_id": "Google-Chrome-103.0.5060.53-network-URLLoader-NotifyCompleted-Heap-Use-After-Free.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-05-13T17:55:04Z/"
                        }
                    ],
                    "url": "http://packetstormsecurity.com/files/168596/Google-Chrome-103.0.5060.53-network-URLLoader-NotifyCompleted-Heap-Use-After-Free.html"
                },
                {
                    "reference_url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html",
                    "reference_id": "stable-channel-update-for-desktop_30.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-05-13T17:55:04Z/"
                        }
                    ],
                    "url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/",
                    "reference_id": "T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-05-13T17:55:04Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/516752?format=api",
                    "purl": "pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.22&reponame=community",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3%3Farch=riscv64&distroversion=v3.22&reponame=community"
                }
            ],
            "aliases": [
                "CVE-2022-3038"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zj3g-w5ak-xbfa"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3%3Farch=riscv64&distroversion=v3.22&reponame=community"
}