{"url":"http://public2.vulnerablecode.io/api/packages/516752?format=json","purl":"pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.22&reponame=community","type":"apk","namespace":"alpine","name":"qt5-qtwebengine","version":"5.15.11-r3","qualifiers":{"arch":"riscv64","distroversion":"v3.22","reponame":"community"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"5.15.11-r4","latest_non_vulnerable_version":"5.15.17-r10","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/44948?format=json","vulnerability_id":"VCID-5znu-xyg6-a7fh","summary":"Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3041","reference_id":"","reference_type":"","scores":[{"value":"0.00583","scoring_system":"epss","scoring_elements":"0.69062","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00583","scoring_system":"epss","scoring_elements":"0.68996","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00583","scoring_system":"epss","scoring_elements":"0.68967","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00583","scoring_system":"epss","scoring_elements":"0.69008","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00583","scoring_system":"epss","scoring_elements":"0.69018","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00583","scoring_system":"epss","scoring_elements":"0.68998","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00583","scoring_system":"epss","scoring_elements":"0.69049","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00583","scoring_system":"epss","scoring_elements":"0.69056","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00583","scoring_system":"epss","scoring_elements":"0.68919","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00583","scoring_system":"epss","scoring_elements":"0.68939","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00583","scoring_system":"epss","scoring_elements":"0.68969","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00583","scoring_system":"epss","scoring_elements":"0.68988","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00583","scoring_system":"epss","scoring_elements":"0.69011","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3041"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3038","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3038"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3039","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3039"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3040","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3040"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3041","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3041"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3042","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3042"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3043","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3043"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3044","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3044"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3045","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3045"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3046","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3046"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3047","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3047"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3048","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3048"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3049","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3049"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3050","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3050"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3051","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3051"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3052","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3052"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3053","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3053"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3054","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3054"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3055","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3055"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3056","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3056"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3057","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3057"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3058","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3058"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3071","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3071"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4912","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4912"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4913","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4913"},{"reference_url":"https://crbug.com/1345947","reference_id":"1345947","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-21T19:02:20Z/"}],"url":"https://crbug.com/1345947"},{"reference_url":"https://security.gentoo.org/glsa/202209-23","reference_id":"GLSA-202209-23","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-21T19:02:20Z/"}],"url":"https://security.gentoo.org/glsa/202209-23"},{"reference_url":"https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html","reference_id":"stable-channel-update-for-desktop_30.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-21T19:02:20Z/"}],"url":"https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/","reference_id":"T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-21T19:02:20Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/516752?format=json","purl":"pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.22&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3%3Farch=riscv64&distroversion=v3.22&reponame=community"}],"aliases":["CVE-2022-3041"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5znu-xyg6-a7fh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/13197?format=json","vulnerability_id":"VCID-7es8-7d9x-xfgm","summary":"Improper Validation of Array Index\nSQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35737.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35737.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-35737","reference_id":"","reference_type":"","scores":[{"value":"0.51941","scoring_system":"epss","scoring_elements":"0.97924","published_at":"2026-04-29T12:55:00Z"},{"value":"0.51941","scoring_system":"epss","scoring_elements":"0.97917","published_at":"2026-04-24T12:55:00Z"},{"value":"0.51941","scoring_system":"epss","scoring_elements":"0.97895","published_at":"2026-04-02T12:55:00Z"},{"value":"0.51941","scoring_system":"epss","scoring_elements":"0.97912","published_at":"2026-04-13T12:55:00Z"},{"value":"0.51941","scoring_system":"epss","scoring_elements":"0.97911","published_at":"2026-04-12T12:55:00Z"},{"value":"0.51941","scoring_system":"epss","scoring_elements":"0.9791","published_at":"2026-04-11T12:55:00Z"},{"value":"0.51941","scoring_system":"epss","scoring_elements":"0.97907","published_at":"2026-04-09T12:55:00Z"},{"value":"0.51941","scoring_system":"epss","scoring_elements":"0.97904","published_at":"2026-04-08T12:55:00Z"},{"value":"0.51941","scoring_system":"epss","scoring_elements":"0.97899","published_at":"2026-04-07T12:55:00Z"},{"value":"0.51941","scoring_system":"epss","scoring_elements":"0.97896","published_at":"2026-04-04T12:55:00Z"},{"value":"0.51941","scoring_system":"epss","scoring_elements":"0.97918","published_at":"2026-04-21T12:55:00Z"},{"value":"0.51941","scoring_system":"epss","scoring_elements":"0.9792","published_at":"2026-04-18T12:55:00Z"},{"value":"0.51941","scoring_system":"epss","scoring_elements":"0.97919","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-35737"},{"reference_url":"https://blog.trailofbits.com/2022/10/25/sqlite-vulnerability-july-2022-library-api","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://blog.trailofbits.com/2022/10/25/sqlite-vulnerability-july-2022-library-api"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35737","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35737"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/rusqlite/rusqlite","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/rusqlite/rusqlite"},{"reference_url":"https://kb.cert.org/vuls/id/720344","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:53:26Z/"}],"url":"https://kb.cert.org/vuls/id/720344"},{"reference_url":"https://rustsec.org/advisories/RUSTSEC-2022-0090.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://rustsec.org/advisories/RUSTSEC-2022-0090.html"},{"reference_url":"https://security.gentoo.org/glsa/202210-40","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:53:26Z/"}],"url":"https://security.gentoo.org/glsa/202210-40"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220915-0009","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security.netapp.com/advisory/ntap-20220915-0009"},{"reference_url":"https://sqlite.org/releaselog/3_39_2.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:53:26Z/"}],"url":"https://sqlite.org/releaselog/3_39_2.html"},{"reference_url":"https://www.sqlite.org/cves.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:53:26Z/"}],"url":"https://www.sqlite.org/cves.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2110291","reference_id":"2110291","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2110291"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2022-35737","reference_id":"CVE-2022-35737","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-35737"},{"reference_url":"https://github.com/advisories/GHSA-jw36-hf63-69r9","reference_id":"GHSA-jw36-hf63-69r9","reference_type":"","scores":[{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-jw36-hf63-69r9"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220915-0009/","reference_id":"ntap-20220915-0009","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:53:26Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220915-0009/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0110","reference_id":"RHSA-2023:0110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0339","reference_id":"RHSA-2023:0339","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0339"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0425","reference_id":"RHSA-2024:0425","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0425"},{"reference_url":"https://blog.trailofbits.com/2022/10/25/sqlite-vulnerability-july-2022-library-api/","reference_id":"sqlite-vulnerability-july-2022-library-api","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:53:26Z/"}],"url":"https://blog.trailofbits.com/2022/10/25/sqlite-vulnerability-july-2022-library-api/"},{"reference_url":"https://usn.ubuntu.com/5712-1/","reference_id":"USN-5712-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5712-1/"},{"reference_url":"https://usn.ubuntu.com/5716-1/","reference_id":"USN-5716-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5716-1/"},{"reference_url":"https://usn.ubuntu.com/5716-2/","reference_id":"USN-5716-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5716-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/516752?format=json","purl":"pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.22&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3%3Farch=riscv64&distroversion=v3.22&reponame=community"}],"aliases":["CVE-2022-35737","GHSA-jw36-hf63-69r9"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7es8-7d9x-xfgm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35591?format=json","vulnerability_id":"VCID-7kh2-tzby-ybg6","summary":"Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3446","reference_id":"","reference_type":"","scores":[{"value":"0.0043","scoring_system":"epss","scoring_elements":"0.62505","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0043","scoring_system":"epss","scoring_elements":"0.62538","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0043","scoring_system":"epss","scoring_elements":"0.62503","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0043","scoring_system":"epss","scoring_elements":"0.62554","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0043","scoring_system":"epss","scoring_elements":"0.6257","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0043","scoring_system":"epss","scoring_elements":"0.62589","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0043","scoring_system":"epss","scoring_elements":"0.62578","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0043","scoring_system":"epss","scoring_elements":"0.62555","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0043","scoring_system":"epss","scoring_elements":"0.62597","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00487","scoring_system":"epss","scoring_elements":"0.65495","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00487","scoring_system":"epss","scoring_elements":"0.65484","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00487","scoring_system":"epss","scoring_elements":"0.65469","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00487","scoring_system":"epss","scoring_elements":"0.65486","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00487","scoring_system":"epss","scoring_elements":"0.65498","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3446"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3445","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3445"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3446","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3446"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3447","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3447"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3448","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3448"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3449","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3449"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3450","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3450"},{"reference_url":"https://crbug.com/1368076","reference_id":"1368076","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-24T13:18:30Z/"}],"url":"https://crbug.com/1368076"},{"reference_url":"https://security.gentoo.org/glsa/202210-16","reference_id":"GLSA-202210-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202210-16"},{"reference_url":"https://security.gentoo.org/glsa/202305-10","reference_id":"GLSA-202305-10","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-24T13:18:30Z/"}],"url":"https://security.gentoo.org/glsa/202305-10"},{"reference_url":"https://chromereleases.googleblog.com/2022/10/stable-channel-update-for-desktop_11.html","reference_id":"stable-channel-update-for-desktop_11.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-24T13:18:30Z/"}],"url":"https://chromereleases.googleblog.com/2022/10/stable-channel-update-for-desktop_11.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/516752?format=json","purl":"pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.22&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3%3Farch=riscv64&distroversion=v3.22&reponame=community"}],"aliases":["CVE-2022-3446"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7kh2-tzby-ybg6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/45076?format=json","vulnerability_id":"VCID-acj5-49vp-q3dj","summary":"Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3197","reference_id":"","reference_type":"","scores":[{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.72099","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.72036","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.72021","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.72062","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.7207","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.72055","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.72098","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.72106","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.71982","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.72002","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.71978","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.72016","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.72029","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.72052","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3197"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3195","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3195"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3196","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3196"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3197","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3197"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3198","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3199","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3199"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3200","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3200"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3201","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3201"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3842"},{"reference_url":"https://crbug.com/1358075","reference_id":"1358075","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-21T19:38:51Z/"}],"url":"https://crbug.com/1358075"},{"reference_url":"https://security.gentoo.org/glsa/202209-23","reference_id":"GLSA-202209-23","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-21T19:38:51Z/"}],"url":"https://security.gentoo.org/glsa/202209-23"},{"reference_url":"https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html","reference_id":"stable-channel-update-for-desktop_14.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-21T19:38:51Z/"}],"url":"https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/","reference_id":"T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-21T19:38:51Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/516752?format=json","purl":"pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.22&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3%3Farch=riscv64&distroversion=v3.22&reponame=community"}],"aliases":["CVE-2022-3197"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-acj5-49vp-q3dj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56252?format=json","vulnerability_id":"VCID-dxd4-qcnc-xbfv","summary":"Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3370","reference_id":"","reference_type":"","scores":[{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74191","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74218","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74224","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74239","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.7426","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74241","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74234","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74272","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74282","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74274","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74307","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74316","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00811","scoring_system":"epss","scoring_elements":"0.74315","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3373","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3373"},{"reference_url":"https://security.gentoo.org/glsa/202210-16","reference_id":"GLSA-202210-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202210-16"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/516752?format=json","purl":"pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.22&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3%3Farch=riscv64&distroversion=v3.22&reponame=community"}],"aliases":["CVE-2022-3370"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dxd4-qcnc-xbfv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/45074?format=json","vulnerability_id":"VCID-e6yq-n39b-33gf","summary":"Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3196","reference_id":"","reference_type":"","scores":[{"value":"0.00636","scoring_system":"epss","scoring_elements":"0.70535","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00636","scoring_system":"epss","scoring_elements":"0.7046","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00636","scoring_system":"epss","scoring_elements":"0.70446","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00636","scoring_system":"epss","scoring_elements":"0.70488","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00636","scoring_system":"epss","scoring_elements":"0.70496","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00636","scoring_system":"epss","scoring_elements":"0.70476","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00636","scoring_system":"epss","scoring_elements":"0.70528","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00636","scoring_system":"epss","scoring_elements":"0.70536","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00636","scoring_system":"epss","scoring_elements":"0.70394","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00636","scoring_system":"epss","scoring_elements":"0.70411","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00636","scoring_system":"epss","scoring_elements":"0.70391","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00636","scoring_system":"epss","scoring_elements":"0.70436","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00636","scoring_system":"epss","scoring_elements":"0.70451","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00636","scoring_system":"epss","scoring_elements":"0.70475","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3196"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3195","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3195"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3196","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3196"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3197","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3197"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3198","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3199","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3199"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3200","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3200"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3201","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3201"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3842"},{"reference_url":"https://crbug.com/1358090","reference_id":"1358090","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-21T20:32:16Z/"}],"url":"https://crbug.com/1358090"},{"reference_url":"https://security.gentoo.org/glsa/202209-23","reference_id":"GLSA-202209-23","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-21T20:32:16Z/"}],"url":"https://security.gentoo.org/glsa/202209-23"},{"reference_url":"https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html","reference_id":"stable-channel-update-for-desktop_14.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-21T20:32:16Z/"}],"url":"https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/","reference_id":"T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-05-21T20:32:16Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/516752?format=json","purl":"pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.22&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3%3Farch=riscv64&distroversion=v3.22&reponame=community"}],"aliases":["CVE-2022-3196"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e6yq-n39b-33gf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/45092?format=json","vulnerability_id":"VCID-gbch-qjs9-s7g5","summary":"Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3198","reference_id":"","reference_type":"","scores":[{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.72099","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.72036","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.72021","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.72062","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.7207","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.72055","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.72098","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.72106","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.71982","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.72002","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.71978","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.72016","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.72029","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.72052","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3195","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3195"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3196","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3196"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3197","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3197"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3198","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3199","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3199"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3200","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3200"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3201","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3201"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3842"},{"reference_url":"https://crbug.com/1355682","reference_id":"1355682","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-21T18:00:53Z/"}],"url":"https://crbug.com/1355682"},{"reference_url":"https://security.gentoo.org/glsa/202209-23","reference_id":"GLSA-202209-23","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-21T18:00:53Z/"}],"url":"https://security.gentoo.org/glsa/202209-23"},{"reference_url":"https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html","reference_id":"stable-channel-update-for-desktop_14.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-21T18:00:53Z/"}],"url":"https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/","reference_id":"T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-21T18:00:53Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/516752?format=json","purl":"pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.22&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3%3Farch=riscv64&distroversion=v3.22&reponame=community"}],"aliases":["CVE-2022-3198"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gbch-qjs9-s7g5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56237?format=json","vulnerability_id":"VCID-penr-by9s-f3dm","summary":"Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3304","reference_id":"","reference_type":"","scores":[{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72327","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72333","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72337","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00715","scoring_system":"epss","scoring_elements":"0.7238","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00715","scoring_system":"epss","scoring_elements":"0.72351","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00715","scoring_system":"epss","scoring_elements":"0.72392","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00715","scoring_system":"epss","scoring_elements":"0.72401","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00715","scoring_system":"epss","scoring_elements":"0.72389","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00715","scoring_system":"epss","scoring_elements":"0.72329","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00715","scoring_system":"epss","scoring_elements":"0.72306","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00715","scoring_system":"epss","scoring_elements":"0.72345","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00715","scoring_system":"epss","scoring_elements":"0.72357","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00715","scoring_system":"epss","scoring_elements":"0.72311","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00715","scoring_system":"epss","scoring_elements":"0.72363","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3201","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3201"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3311","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3311"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3312","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3314","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3314"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3315","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3315"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3316","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3316"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3318","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3318"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3443","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3443"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3444","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3444"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4911"},{"reference_url":"https://crbug.com/1358907","reference_id":"1358907","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T17:58:53Z/"}],"url":"https://crbug.com/1358907"},{"reference_url":"https://security.gentoo.org/glsa/202210-16","reference_id":"GLSA-202210-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202210-16"},{"reference_url":"https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_27.html","reference_id":"stable-channel-update-for-desktop_27.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T17:58:53Z/"}],"url":"https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_27.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/516752?format=json","purl":"pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.22&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3%3Farch=riscv64&distroversion=v3.22&reponame=community"}],"aliases":["CVE-2022-3304"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-penr-by9s-f3dm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/44940?format=json","vulnerability_id":"VCID-wd92-g154-uqdg","summary":"Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3040","reference_id":"","reference_type":"","scores":[{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69798","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69716","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69703","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69743","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69752","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69733","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69784","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69792","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69648","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69664","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69641","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69692","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69709","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69731","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3040"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3038","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3038"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3039","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3039"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3040","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3040"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3041","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3041"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3042","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3042"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3043","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3043"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3044","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3044"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3045","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3045"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3046","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3046"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3047","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3047"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3048","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3048"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3049","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3049"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3050","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3050"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3051","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3051"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3052","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3052"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3053","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3053"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3054","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3054"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3055","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3055"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3056","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3056"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3057","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3057"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3058","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3058"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3071","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3071"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4912","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4912"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4913","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4913"},{"reference_url":"https://crbug.com/1341539","reference_id":"1341539","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-21T19:03:05Z/"}],"url":"https://crbug.com/1341539"},{"reference_url":"https://security.gentoo.org/glsa/202209-23","reference_id":"GLSA-202209-23","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-21T19:03:05Z/"}],"url":"https://security.gentoo.org/glsa/202209-23"},{"reference_url":"https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html","reference_id":"stable-channel-update-for-desktop_30.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-21T19:03:05Z/"}],"url":"https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/","reference_id":"T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-21T19:03:05Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/516752?format=json","purl":"pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.22&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3%3Farch=riscv64&distroversion=v3.22&reponame=community"}],"aliases":["CVE-2022-3040"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wd92-g154-uqdg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/45068?format=json","vulnerability_id":"VCID-xjnq-ytf1-jkgw","summary":"Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3075","reference_id":"","reference_type":"","scores":[{"value":"0.0212","scoring_system":"epss","scoring_elements":"0.84204","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0212","scoring_system":"epss","scoring_elements":"0.84142","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0212","scoring_system":"epss","scoring_elements":"0.84138","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0212","scoring_system":"epss","scoring_elements":"0.84161","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0212","scoring_system":"epss","scoring_elements":"0.84162","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0212","scoring_system":"epss","scoring_elements":"0.84166","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0212","scoring_system":"epss","scoring_elements":"0.84191","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0212","scoring_system":"epss","scoring_elements":"0.84198","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0212","scoring_system":"epss","scoring_elements":"0.84083","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0212","scoring_system":"epss","scoring_elements":"0.841","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0212","scoring_system":"epss","scoring_elements":"0.84102","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0212","scoring_system":"epss","scoring_elements":"0.84125","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0212","scoring_system":"epss","scoring_elements":"0.84131","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0212","scoring_system":"epss","scoring_elements":"0.84148","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3075"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3075","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3075"},{"reference_url":"https://crbug.com/1358134","reference_id":"1358134","reference_type":"","scores":[{"value":"9.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:24:45Z/"}],"url":"https://crbug.com/1358134"},{"reference_url":"https://security.gentoo.org/glsa/202209-23","reference_id":"GLSA-202209-23","reference_type":"","scores":[{"value":"9.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:24:45Z/"}],"url":"https://security.gentoo.org/glsa/202209-23"},{"reference_url":"https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop.html","reference_id":"stable-channel-update-for-desktop.html","reference_type":"","scores":[{"value":"9.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:24:45Z/"}],"url":"https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/","reference_id":"T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE","reference_type":"","scores":[{"value":"9.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:24:45Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/516752?format=json","purl":"pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.22&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3%3Farch=riscv64&distroversion=v3.22&reponame=community"}],"aliases":["CVE-2022-3075"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xjnq-ytf1-jkgw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/45117?format=json","vulnerability_id":"VCID-ysw9-wrag-gqde","summary":"Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3199","reference_id":"","reference_type":"","scores":[{"value":"0.008","scoring_system":"epss","scoring_elements":"0.7412","published_at":"2026-04-29T12:55:00Z"},{"value":"0.008","scoring_system":"epss","scoring_elements":"0.74045","published_at":"2026-04-12T12:55:00Z"},{"value":"0.008","scoring_system":"epss","scoring_elements":"0.74038","published_at":"2026-04-13T12:55:00Z"},{"value":"0.008","scoring_system":"epss","scoring_elements":"0.74077","published_at":"2026-04-16T12:55:00Z"},{"value":"0.008","scoring_system":"epss","scoring_elements":"0.74086","published_at":"2026-04-18T12:55:00Z"},{"value":"0.008","scoring_system":"epss","scoring_elements":"0.74078","published_at":"2026-04-21T12:55:00Z"},{"value":"0.008","scoring_system":"epss","scoring_elements":"0.74113","published_at":"2026-04-24T12:55:00Z"},{"value":"0.008","scoring_system":"epss","scoring_elements":"0.74121","published_at":"2026-04-26T12:55:00Z"},{"value":"0.008","scoring_system":"epss","scoring_elements":"0.73997","published_at":"2026-04-02T12:55:00Z"},{"value":"0.008","scoring_system":"epss","scoring_elements":"0.74023","published_at":"2026-04-04T12:55:00Z"},{"value":"0.008","scoring_system":"epss","scoring_elements":"0.73994","published_at":"2026-04-07T12:55:00Z"},{"value":"0.008","scoring_system":"epss","scoring_elements":"0.74028","published_at":"2026-04-08T12:55:00Z"},{"value":"0.008","scoring_system":"epss","scoring_elements":"0.74042","published_at":"2026-04-09T12:55:00Z"},{"value":"0.008","scoring_system":"epss","scoring_elements":"0.74064","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3199"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3195","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3195"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3196","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3196"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3197","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3197"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3198","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3199","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3199"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3200","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3200"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3201","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3201"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3842"},{"reference_url":"https://crbug.com/1355237","reference_id":"1355237","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-21T17:58:21Z/"}],"url":"https://crbug.com/1355237"},{"reference_url":"http://packetstormsecurity.com/files/170012/Chrome-blink-LocalFrameView-PerformLayout-Use-After-Free.html","reference_id":"Chrome-blink-LocalFrameView-PerformLayout-Use-After-Free.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-21T17:58:21Z/"}],"url":"http://packetstormsecurity.com/files/170012/Chrome-blink-LocalFrameView-PerformLayout-Use-After-Free.html"},{"reference_url":"https://security.gentoo.org/glsa/202209-23","reference_id":"GLSA-202209-23","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-21T17:58:21Z/"}],"url":"https://security.gentoo.org/glsa/202209-23"},{"reference_url":"https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html","reference_id":"stable-channel-update-for-desktop_14.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-21T17:58:21Z/"}],"url":"https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_14.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/","reference_id":"T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-21T17:58:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/516752?format=json","purl":"pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.22&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3%3Farch=riscv64&distroversion=v3.22&reponame=community"}],"aliases":["CVE-2022-3199"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ysw9-wrag-gqde"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42143?format=json","vulnerability_id":"VCID-z4ap-a8wt-87d4","summary":"Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3201","reference_id":"","reference_type":"","scores":[{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25893","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25936","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25704","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25775","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25824","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25832","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26958","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26901","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26912","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26888","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26852","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26803","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26795","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26729","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3201"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3195","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3195"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3196","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3196"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3197","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3197"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3198","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3199","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3199"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3200","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3200"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3201","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3201"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3308","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3310","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3310"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3311","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3311"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3312","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3313","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3314","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3314"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3315","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3315"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3316","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3316"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3317","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3317"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3318","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3318"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3443","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3443"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3444","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3444"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4911"},{"reference_url":"https://security.gentoo.org/glsa/202209-23","reference_id":"GLSA-202209-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202209-23"},{"reference_url":"https://security.gentoo.org/glsa/202210-16","reference_id":"GLSA-202210-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202210-16"},{"reference_url":"https://security.gentoo.org/glsa/202311-11","reference_id":"GLSA-202311-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202311-11"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/516752?format=json","purl":"pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.22&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3%3Farch=riscv64&distroversion=v3.22&reponame=community"},{"url":"http://public2.vulnerablecode.io/api/packages/976699?format=json","purl":"pkg:apk/alpine/qt5-qtwebengine@5.15.11-r7?arch=riscv64&distroversion=v3.22&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.11-r7%3Farch=riscv64&distroversion=v3.22&reponame=community"}],"aliases":["CVE-2022-3201"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z4ap-a8wt-87d4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/44917?format=json","vulnerability_id":"VCID-zj3g-w5ak-xbfa","summary":"Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3038","reference_id":"","reference_type":"","scores":[{"value":"0.35994","scoring_system":"epss","scoring_elements":"0.97106","published_at":"2026-04-29T12:55:00Z"},{"value":"0.35994","scoring_system":"epss","scoring_elements":"0.97084","published_at":"2026-04-11T12:55:00Z"},{"value":"0.35994","scoring_system":"epss","scoring_elements":"0.97085","published_at":"2026-04-13T12:55:00Z"},{"value":"0.35994","scoring_system":"epss","scoring_elements":"0.97095","published_at":"2026-04-16T12:55:00Z"},{"value":"0.35994","scoring_system":"epss","scoring_elements":"0.97097","published_at":"2026-04-18T12:55:00Z"},{"value":"0.35994","scoring_system":"epss","scoring_elements":"0.97102","published_at":"2026-04-21T12:55:00Z"},{"value":"0.35994","scoring_system":"epss","scoring_elements":"0.97103","published_at":"2026-04-24T12:55:00Z"},{"value":"0.35994","scoring_system":"epss","scoring_elements":"0.97105","published_at":"2026-04-26T12:55:00Z"},{"value":"0.35994","scoring_system":"epss","scoring_elements":"0.97066","published_at":"2026-04-02T12:55:00Z"},{"value":"0.35994","scoring_system":"epss","scoring_elements":"0.9707","published_at":"2026-04-07T12:55:00Z"},{"value":"0.35994","scoring_system":"epss","scoring_elements":"0.9708","published_at":"2026-04-08T12:55:00Z"},{"value":"0.35994","scoring_system":"epss","scoring_elements":"0.97081","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3038"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3038","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3038"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3039","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3039"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3040","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3040"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3041","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3041"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3042","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3042"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3043","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3043"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3044","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3044"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3045","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3045"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3046","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3046"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3047","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3047"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3048","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3048"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3049","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3049"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3050","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3050"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3051","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3051"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3052","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3052"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3053","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3053"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3054","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3054"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3055","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3055"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3056","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3056"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3057","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3057"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3058","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3058"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3071","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3071"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4912","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4912"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4913","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4913"},{"reference_url":"https://crbug.com/1340253","reference_id":"1340253","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-05-13T17:55:04Z/"}],"url":"https://crbug.com/1340253"},{"reference_url":"https://security.gentoo.org/glsa/202209-23","reference_id":"GLSA-202209-23","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-05-13T17:55:04Z/"}],"url":"https://security.gentoo.org/glsa/202209-23"},{"reference_url":"http://packetstormsecurity.com/files/168596/Google-Chrome-103.0.5060.53-network-URLLoader-NotifyCompleted-Heap-Use-After-Free.html","reference_id":"Google-Chrome-103.0.5060.53-network-URLLoader-NotifyCompleted-Heap-Use-After-Free.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-05-13T17:55:04Z/"}],"url":"http://packetstormsecurity.com/files/168596/Google-Chrome-103.0.5060.53-network-URLLoader-NotifyCompleted-Heap-Use-After-Free.html"},{"reference_url":"https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html","reference_id":"stable-channel-update-for-desktop_30.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-05-13T17:55:04Z/"}],"url":"https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/","reference_id":"T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-05-13T17:55:04Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/516752?format=json","purl":"pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3?arch=riscv64&distroversion=v3.22&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3%3Farch=riscv64&distroversion=v3.22&reponame=community"}],"aliases":["CVE-2022-3038"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zj3g-w5ak-xbfa"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.11-r3%3Farch=riscv64&distroversion=v3.22&reponame=community"}