[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-DEBIAN-CVE-2022-0108":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-07T21:11:43.830Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":11,"aliases":12,"duplicate_of":9,"upstream":13,"downstream":16,"duplicates":25,"related":26,"reserved_at":9,"published_at":27,"modified_at":28,"state":9,"summary":29,"references_raw":31,"kevs":38,"epss":9,"epss_history":39,"metrics":40,"affected":47},"DEBIAN-CVE-2022-0108","Inappropriate implementation in Navigation in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to leak cross-origin data via a crafted HTML page.",null,[],[],[],[14],{"_key":15},"CVE-2022-0108",[17,19,21,23],{"_key":18},"DLA-3419-1",{"_key":20},"DSA-5046-1",{"_key":22},"DSA-5396-1",{"_key":24},"DSA-5397-1",[],[],"2022-02-12T00:15:07.660Z","2025-11-20T10:15:22.987083Z",{"cisa_kev":30,"cisa_ransomware":30,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":9,"severity_score":9,"severity_version":9,"severity_source":9,"severity_vector":9,"severity_status":9},false,[32],{"url":33,"sources":34,"tags":36},"https://security-tracker.debian.org/tracker/CVE-2022-0108",[35],"osv_debian",[37],"Advisory",[],[],[41],{"source":35,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":42,"cvss_v4_0":9},{"baseScore":43,"baseSeverity":9,"vectorString":44,"impactScore":45,"exploitabilityScore":46},6.5,"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",6,7.2,[48,65,76],{"ecosystem":49,"name":50,"vendor":51,"product":50,"cpe_part":9,"purl_type":52,"purl_namespace":51,"purl_name":50,"source":9,"versions":53},"Debian","chromium","debian","deb",[54,60,63,64],{"version":55,"is_range":56,"range_type":57,"version_start":9,"version_start_type":9,"version_end":58,"version_end_type":59,"fixed_in":9},"lt97_0_4692_71_0_1~deb11u1",true,"ecosystem","97.0.4692.71-0.1~deb11u1","excluding",{"version":61,"is_range":56,"range_type":57,"version_start":9,"version_start_type":9,"version_end":62,"version_end_type":59,"fixed_in":9},"lt97_0_4692_71_0_1","97.0.4692.71-0.1",{"version":61,"is_range":56,"range_type":57,"version_start":9,"version_start_type":9,"version_end":62,"version_end_type":59,"fixed_in":9},{"version":61,"is_range":56,"range_type":57,"version_start":9,"version_start_type":9,"version_end":62,"version_end_type":59,"fixed_in":9},{"ecosystem":49,"name":66,"vendor":51,"product":66,"cpe_part":9,"purl_type":52,"purl_namespace":51,"purl_name":66,"source":9,"versions":67},"webkit2gtk",[68,71,74,75],{"version":69,"is_range":56,"range_type":57,"version_start":9,"version_start_type":9,"version_end":70,"version_end_type":59,"fixed_in":9},"lt2_40_1_1~deb11u1","2.40.1-1~deb11u1",{"version":72,"is_range":56,"range_type":57,"version_start":9,"version_start_type":9,"version_end":73,"version_end_type":59,"fixed_in":9},"lt2_40_1_1","2.40.1-1",{"version":72,"is_range":56,"range_type":57,"version_start":9,"version_start_type":9,"version_end":73,"version_end_type":59,"fixed_in":9},{"version":72,"is_range":56,"range_type":57,"version_start":9,"version_start_type":9,"version_end":73,"version_end_type":59,"fixed_in":9},{"ecosystem":49,"name":77,"vendor":51,"product":77,"cpe_part":9,"purl_type":52,"purl_namespace":51,"purl_name":77,"source":9,"versions":78},"wpewebkit",[79,82,85,86],{"version":80,"is_range":56,"range_type":57,"version_start":9,"version_start_type":9,"version_end":81,"version_end_type":59,"fixed_in":9},"lt2_38_6_1~deb11u1","2.38.6-1~deb11u1",{"version":83,"is_range":56,"range_type":57,"version_start":9,"version_start_type":9,"version_end":84,"version_end_type":59,"fixed_in":9},"lt2_38_6_1","2.38.6-1",{"version":83,"is_range":56,"range_type":57,"version_start":9,"version_start_type":9,"version_end":84,"version_end_type":59,"fixed_in":9},{"version":83,"is_range":56,"range_type":57,"version_start":9,"version_start_type":9,"version_end":84,"version_end_type":59,"fixed_in":9}]