Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/intel-microcode@3.20220510.1~deb10u1
Typedeb
Namespacedebian
Nameintel-microcode
Version3.20220510.1~deb10u1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version3.20260227.1
Latest_non_vulnerable_version3.20260227.1
Affected_by_vulnerabilities
0
url VCID-1xju-dcmn-ube4
vulnerability_id VCID-1xju-dcmn-ube4
summary intel-microcode: Improper input validation in some Intel(R) TDX module software
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-45745.json
reference_id
reference_type
scores
0
value 7.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-45745.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-45745
reference_id
reference_type
scores
0
value 0.00074
scoring_system epss
scoring_elements 0.22426
published_at 2026-04-02T12:55:00Z
1
value 0.00074
scoring_system epss
scoring_elements 0.22326
published_at 2026-04-18T12:55:00Z
2
value 0.00074
scoring_system epss
scoring_elements 0.22397
published_at 2026-04-09T12:55:00Z
3
value 0.00074
scoring_system epss
scoring_elements 0.22418
published_at 2026-04-11T12:55:00Z
4
value 0.00074
scoring_system epss
scoring_elements 0.22376
published_at 2026-04-12T12:55:00Z
5
value 0.00074
scoring_system epss
scoring_elements 0.22319
published_at 2026-04-13T12:55:00Z
6
value 0.00074
scoring_system epss
scoring_elements 0.22333
published_at 2026-04-16T12:55:00Z
7
value 0.00074
scoring_system epss
scoring_elements 0.22472
published_at 2026-04-04T12:55:00Z
8
value 0.00074
scoring_system epss
scoring_elements 0.22259
published_at 2026-04-07T12:55:00Z
9
value 0.00074
scoring_system epss
scoring_elements 0.22342
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-45745
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45745
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2292298
reference_id 2292298
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2292298
5
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01036.html
reference_id intel-sa-01036.html
reference_type
scores
0
value 7.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-24T15:36:31Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01036.html
6
reference_url https://security.netapp.com/advisory/ntap-20240621-0003/
reference_id ntap-20240621-0003
reference_type
scores
0
value 7.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-24T15:36:31Z/
url https://security.netapp.com/advisory/ntap-20240621-0003/
7
reference_url https://usn.ubuntu.com/6797-1/
reference_id USN-6797-1
reference_type
scores
url https://usn.ubuntu.com/6797-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
purl pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ues-wvyq-6qc9
1
vulnerability VCID-38q7-4ar3-sqcc
2
vulnerability VCID-3y3x-qqep-43ec
3
vulnerability VCID-4uuw-pm94-1kak
4
vulnerability VCID-51nr-8avm-qued
5
vulnerability VCID-5cgx-1n9u-gqbh
6
vulnerability VCID-5vkn-4rqc-qkbk
7
vulnerability VCID-6ake-v15c-k7aq
8
vulnerability VCID-6thk-vf9t-gygs
9
vulnerability VCID-75cx-avm7-tfcb
10
vulnerability VCID-7wcy-5hnc-tfh4
11
vulnerability VCID-8nyc-r2e4-17gr
12
vulnerability VCID-b55f-n1ed-g7eq
13
vulnerability VCID-eh71-uhnv-fqeb
14
vulnerability VCID-ejhc-6yqt-gkgv
15
vulnerability VCID-ejsj-eyej-huc6
16
vulnerability VCID-f859-13vd-7uef
17
vulnerability VCID-gmr7-umz8-9fhm
18
vulnerability VCID-j4ak-hjn5-guat
19
vulnerability VCID-j6j9-vj4t-bfa6
20
vulnerability VCID-kha2-8ez1-gfhr
21
vulnerability VCID-mekt-8gm1-33ej
22
vulnerability VCID-npgb-p786-d3fe
23
vulnerability VCID-qtg5-1dxw-sfdc
24
vulnerability VCID-qzcy-2xsr-vqeh
25
vulnerability VCID-r46f-12hj-7ybb
26
vulnerability VCID-t7rc-zadf-cybq
27
vulnerability VCID-t85u-116v-7uan
28
vulnerability VCID-vsda-kq13-73g1
29
vulnerability VCID-w7k1-y36j-3ye6
30
vulnerability VCID-wgce-vves-guek
31
vulnerability VCID-wqfe-hkrk-nbaj
32
vulnerability VCID-wv5f-6x7x-7fdw
33
vulnerability VCID-wyf3-shyh-qyhc
34
vulnerability VCID-zcxx-ra5c-hyh9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
aliases CVE-2023-45745
risk_score 3.5
exploitability 0.5
weighted_severity 7.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1xju-dcmn-ube4
1
url VCID-2ues-wvyq-6qc9
vulnerability_id VCID-2ues-wvyq-6qc9
summary Improperly implemented security check for standard in the DDRIO configuration for some Intel(R) Xeon(R) 6 Processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32086
reference_id
reference_type
scores
0
value 0.00013
scoring_system epss
scoring_elements 0.02098
published_at 2026-04-11T12:55:00Z
1
value 0.00013
scoring_system epss
scoring_elements 0.02101
published_at 2026-04-02T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.02053
published_at 2026-04-16T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.02079
published_at 2026-04-13T12:55:00Z
4
value 0.00013
scoring_system epss
scoring_elements 0.02084
published_at 2026-04-12T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.02108
published_at 2026-04-04T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.02103
published_at 2026-04-07T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.02104
published_at 2026-04-08T12:55:00Z
8
value 0.00013
scoring_system epss
scoring_elements 0.02122
published_at 2026-04-09T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02568
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32086
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32086
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32086
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
reference_id 1110983
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
4
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01367.html
reference_id intel-sa-01367.html
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N
1
value 4.5
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-13T15:04:21Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01367.html
5
reference_url https://usn.ubuntu.com/7866-1/
reference_id USN-7866-1
reference_type
scores
url https://usn.ubuntu.com/7866-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2025-32086
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2ues-wvyq-6qc9
2
url VCID-2ytx-vj3b-rfhb
vulnerability_id VCID-2ytx-vj3b-rfhb
summary hw: cpu: information disclosure in certain Intel processors
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21151.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21151.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21151
reference_id
reference_type
scores
0
value 0.00054
scoring_system epss
scoring_elements 0.1692
published_at 2026-04-18T12:55:00Z
1
value 0.00054
scoring_system epss
scoring_elements 0.1719
published_at 2026-04-04T12:55:00Z
2
value 0.00054
scoring_system epss
scoring_elements 0.16968
published_at 2026-04-07T12:55:00Z
3
value 0.00054
scoring_system epss
scoring_elements 0.17058
published_at 2026-04-08T12:55:00Z
4
value 0.00054
scoring_system epss
scoring_elements 0.17114
published_at 2026-04-09T12:55:00Z
5
value 0.00054
scoring_system epss
scoring_elements 0.1709
published_at 2026-04-11T12:55:00Z
6
value 0.00054
scoring_system epss
scoring_elements 0.17043
published_at 2026-04-12T12:55:00Z
7
value 0.00054
scoring_system epss
scoring_elements 0.16982
published_at 2026-04-13T12:55:00Z
8
value 0.00054
scoring_system epss
scoring_elements 0.16918
published_at 2026-04-16T12:55:00Z
9
value 0.00054
scoring_system epss
scoring_elements 0.17137
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21151
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010947
reference_id 1010947
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010947
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2086730
reference_id 2086730
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2086730
10
reference_url https://security.archlinux.org/AVG-2796
reference_id AVG-2796
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2796
11
reference_url https://www.debian.org/security/2022/dsa-5178
reference_id dsa-5178
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:47Z/
url https://www.debian.org/security/2022/dsa-5178
12
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00617.html
reference_id intel-sa-00617.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:47Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00617.html
13
reference_url https://security.netapp.com/advisory/ntap-20220826-0003/
reference_id ntap-20220826-0003
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:47Z/
url https://security.netapp.com/advisory/ntap-20220826-0003/
14
reference_url https://usn.ubuntu.com/5486-1/
reference_id USN-5486-1
reference_type
scores
url https://usn.ubuntu.com/5486-1/
15
reference_url https://usn.ubuntu.com/5535-1/
reference_id USN-5535-1
reference_type
scores
url https://usn.ubuntu.com/5535-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
purl pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ues-wvyq-6qc9
1
vulnerability VCID-38q7-4ar3-sqcc
2
vulnerability VCID-3y3x-qqep-43ec
3
vulnerability VCID-4uuw-pm94-1kak
4
vulnerability VCID-51nr-8avm-qued
5
vulnerability VCID-5cgx-1n9u-gqbh
6
vulnerability VCID-5vkn-4rqc-qkbk
7
vulnerability VCID-6ake-v15c-k7aq
8
vulnerability VCID-6thk-vf9t-gygs
9
vulnerability VCID-75cx-avm7-tfcb
10
vulnerability VCID-7wcy-5hnc-tfh4
11
vulnerability VCID-8nyc-r2e4-17gr
12
vulnerability VCID-b55f-n1ed-g7eq
13
vulnerability VCID-eh71-uhnv-fqeb
14
vulnerability VCID-ejhc-6yqt-gkgv
15
vulnerability VCID-ejsj-eyej-huc6
16
vulnerability VCID-f859-13vd-7uef
17
vulnerability VCID-gmr7-umz8-9fhm
18
vulnerability VCID-j4ak-hjn5-guat
19
vulnerability VCID-j6j9-vj4t-bfa6
20
vulnerability VCID-kha2-8ez1-gfhr
21
vulnerability VCID-mekt-8gm1-33ej
22
vulnerability VCID-npgb-p786-d3fe
23
vulnerability VCID-qtg5-1dxw-sfdc
24
vulnerability VCID-qzcy-2xsr-vqeh
25
vulnerability VCID-r46f-12hj-7ybb
26
vulnerability VCID-t7rc-zadf-cybq
27
vulnerability VCID-t85u-116v-7uan
28
vulnerability VCID-vsda-kq13-73g1
29
vulnerability VCID-w7k1-y36j-3ye6
30
vulnerability VCID-wgce-vves-guek
31
vulnerability VCID-wqfe-hkrk-nbaj
32
vulnerability VCID-wv5f-6x7x-7fdw
33
vulnerability VCID-wyf3-shyh-qyhc
34
vulnerability VCID-zcxx-ra5c-hyh9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
aliases CVE-2022-21151
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2ytx-vj3b-rfhb
3
url VCID-3dfb-1sgt-w3a8
vulnerability_id VCID-3dfb-1sgt-w3a8
summary Mirrored regions with different values in 3rd Generation Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable denial of service via local access.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-25939
reference_id
reference_type
scores
0
value 0.00061
scoring_system epss
scoring_elements 0.18992
published_at 2026-04-18T12:55:00Z
1
value 0.00061
scoring_system epss
scoring_elements 0.19123
published_at 2026-04-11T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.19077
published_at 2026-04-12T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.19024
published_at 2026-04-13T12:55:00Z
4
value 0.00061
scoring_system epss
scoring_elements 0.1898
published_at 2026-04-16T12:55:00Z
5
value 0.00061
scoring_system epss
scoring_elements 0.19217
published_at 2026-04-02T12:55:00Z
6
value 0.00061
scoring_system epss
scoring_elements 0.19269
published_at 2026-04-04T12:55:00Z
7
value 0.00061
scoring_system epss
scoring_elements 0.18984
published_at 2026-04-07T12:55:00Z
8
value 0.00061
scoring_system epss
scoring_elements 0.19064
published_at 2026-04-08T12:55:00Z
9
value 0.00061
scoring_system epss
scoring_elements 0.19117
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-25939
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25939
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078742
reference_id 1078742
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078742
4
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01118.html
reference_id intel-sa-01118.html
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
1
value 6.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T16:17:26Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01118.html
5
reference_url https://usn.ubuntu.com/6967-1/
reference_id USN-6967-1
reference_type
scores
url https://usn.ubuntu.com/6967-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
purl pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ues-wvyq-6qc9
1
vulnerability VCID-38q7-4ar3-sqcc
2
vulnerability VCID-3y3x-qqep-43ec
3
vulnerability VCID-4uuw-pm94-1kak
4
vulnerability VCID-51nr-8avm-qued
5
vulnerability VCID-5cgx-1n9u-gqbh
6
vulnerability VCID-5vkn-4rqc-qkbk
7
vulnerability VCID-6ake-v15c-k7aq
8
vulnerability VCID-6thk-vf9t-gygs
9
vulnerability VCID-75cx-avm7-tfcb
10
vulnerability VCID-7wcy-5hnc-tfh4
11
vulnerability VCID-8nyc-r2e4-17gr
12
vulnerability VCID-b55f-n1ed-g7eq
13
vulnerability VCID-eh71-uhnv-fqeb
14
vulnerability VCID-ejhc-6yqt-gkgv
15
vulnerability VCID-ejsj-eyej-huc6
16
vulnerability VCID-f859-13vd-7uef
17
vulnerability VCID-gmr7-umz8-9fhm
18
vulnerability VCID-j4ak-hjn5-guat
19
vulnerability VCID-j6j9-vj4t-bfa6
20
vulnerability VCID-kha2-8ez1-gfhr
21
vulnerability VCID-mekt-8gm1-33ej
22
vulnerability VCID-npgb-p786-d3fe
23
vulnerability VCID-qtg5-1dxw-sfdc
24
vulnerability VCID-qzcy-2xsr-vqeh
25
vulnerability VCID-r46f-12hj-7ybb
26
vulnerability VCID-t7rc-zadf-cybq
27
vulnerability VCID-t85u-116v-7uan
28
vulnerability VCID-vsda-kq13-73g1
29
vulnerability VCID-w7k1-y36j-3ye6
30
vulnerability VCID-wgce-vves-guek
31
vulnerability VCID-wqfe-hkrk-nbaj
32
vulnerability VCID-wv5f-6x7x-7fdw
33
vulnerability VCID-wyf3-shyh-qyhc
34
vulnerability VCID-zcxx-ra5c-hyh9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
aliases CVE-2024-25939
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3dfb-1sgt-w3a8
4
url VCID-3y3x-qqep-43ec
vulnerability_id VCID-3y3x-qqep-43ec
summary microcode_ctl: Improper initialization in UEFI firmware OutOfBandXML module
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31157.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31157.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-31157
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01503
published_at 2026-04-18T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.015
published_at 2026-04-12T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.01501
published_at 2026-04-13T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01487
published_at 2026-04-16T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.01499
published_at 2026-04-02T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.01502
published_at 2026-04-04T12:55:00Z
6
value 0.00012
scoring_system epss
scoring_elements 0.01509
published_at 2026-04-07T12:55:00Z
7
value 0.00012
scoring_system epss
scoring_elements 0.01513
published_at 2026-04-08T12:55:00Z
8
value 0.00012
scoring_system epss
scoring_elements 0.01516
published_at 2026-04-09T12:55:00Z
9
value 0.00012
scoring_system epss
scoring_elements 0.01508
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-31157
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31157
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31157
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
reference_id 1095805
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345421
reference_id 2345421
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2345421
5
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
reference_id intel-sa-01139.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value 6.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T15:13:26Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
6
reference_url https://access.redhat.com/errata/RHSA-2025:7043
reference_id RHSA-2025:7043
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7043
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2024-31157
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3y3x-qqep-43ec
5
url VCID-4429-qf2w-jqg3
vulnerability_id VCID-4429-qf2w-jqg3
summary x86: MMIO Stale Data vulnerabilities
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21166.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21166.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21166
reference_id
reference_type
scores
0
value 0.00185
scoring_system epss
scoring_elements 0.40284
published_at 2026-04-08T12:55:00Z
1
value 0.00185
scoring_system epss
scoring_elements 0.40266
published_at 2026-04-18T12:55:00Z
2
value 0.00185
scoring_system epss
scoring_elements 0.40309
published_at 2026-04-04T12:55:00Z
3
value 0.00185
scoring_system epss
scoring_elements 0.40231
published_at 2026-04-07T12:55:00Z
4
value 0.00185
scoring_system epss
scoring_elements 0.40296
published_at 2026-04-09T12:55:00Z
5
value 0.00185
scoring_system epss
scoring_elements 0.40308
published_at 2026-04-11T12:55:00Z
6
value 0.00185
scoring_system epss
scoring_elements 0.4027
published_at 2026-04-12T12:55:00Z
7
value 0.00185
scoring_system epss
scoring_elements 0.40251
published_at 2026-04-13T12:55:00Z
8
value 0.00185
scoring_system epss
scoring_elements 0.40298
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21166
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
46
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
47
reference_url http://www.openwall.com/lists/oss-security/2022/06/16/1
reference_id 1
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/
url http://www.openwall.com/lists/oss-security/2022/06/16/1
48
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2090241
reference_id 2090241
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2090241
49
reference_url https://www.debian.org/security/2022/dsa-5173
reference_id dsa-5173
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/
url https://www.debian.org/security/2022/dsa-5173
50
reference_url https://www.debian.org/security/2022/dsa-5178
reference_id dsa-5178
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/
url https://www.debian.org/security/2022/dsa-5178
51
reference_url https://www.debian.org/security/2022/dsa-5184
reference_id dsa-5184
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/
url https://www.debian.org/security/2022/dsa-5184
52
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV/
reference_id FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV/
53
reference_url https://security.gentoo.org/glsa/202208-23
reference_id GLSA-202208-23
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/
url https://security.gentoo.org/glsa/202208-23
54
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html
reference_id intel-sa-00615.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html
55
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS/
reference_id MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS/
56
reference_url https://security.netapp.com/advisory/ntap-20220624-0008/
reference_id ntap-20220624-0008
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/
url https://security.netapp.com/advisory/ntap-20220624-0008/
57
reference_url https://access.redhat.com/errata/RHSA-2022:5937
reference_id RHSA-2022:5937
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5937
58
reference_url https://access.redhat.com/errata/RHSA-2022:5939
reference_id RHSA-2022:5939
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5939
59
reference_url https://access.redhat.com/errata/RHSA-2022:6437
reference_id RHSA-2022:6437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6437
60
reference_url https://access.redhat.com/errata/RHSA-2022:6460
reference_id RHSA-2022:6460
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6460
61
reference_url https://access.redhat.com/errata/RHSA-2022:6872
reference_id RHSA-2022:6872
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6872
62
reference_url https://access.redhat.com/errata/RHSA-2022:6983
reference_id RHSA-2022:6983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6983
63
reference_url https://access.redhat.com/errata/RHSA-2022:6991
reference_id RHSA-2022:6991
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6991
64
reference_url https://access.redhat.com/errata/RHSA-2022:7279
reference_id RHSA-2022:7279
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7279
65
reference_url https://access.redhat.com/errata/RHSA-2022:7280
reference_id RHSA-2022:7280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7280
66
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
67
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
68
reference_url https://access.redhat.com/errata/RHSA-2022:8973
reference_id RHSA-2022:8973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8973
69
reference_url https://access.redhat.com/errata/RHSA-2022:8974
reference_id RHSA-2022:8974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8974
70
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/
reference_id RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/
71
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA/
reference_id T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA/
72
reference_url https://usn.ubuntu.com/5484-1/
reference_id USN-5484-1
reference_type
scores
url https://usn.ubuntu.com/5484-1/
73
reference_url https://usn.ubuntu.com/5485-1/
reference_id USN-5485-1
reference_type
scores
url https://usn.ubuntu.com/5485-1/
74
reference_url https://usn.ubuntu.com/5485-2/
reference_id USN-5485-2
reference_type
scores
url https://usn.ubuntu.com/5485-2/
75
reference_url https://usn.ubuntu.com/5486-1/
reference_id USN-5486-1
reference_type
scores
url https://usn.ubuntu.com/5486-1/
76
reference_url https://usn.ubuntu.com/5505-1/
reference_id USN-5505-1
reference_type
scores
url https://usn.ubuntu.com/5505-1/
77
reference_url https://usn.ubuntu.com/5513-1/
reference_id USN-5513-1
reference_type
scores
url https://usn.ubuntu.com/5513-1/
78
reference_url https://usn.ubuntu.com/5529-1/
reference_id USN-5529-1
reference_type
scores
url https://usn.ubuntu.com/5529-1/
79
reference_url https://usn.ubuntu.com/5535-1/
reference_id USN-5535-1
reference_type
scores
url https://usn.ubuntu.com/5535-1/
80
reference_url https://xenbits.xen.org/xsa/advisory-404.html
reference_id XSA-404
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-404.html
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
purl pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ues-wvyq-6qc9
1
vulnerability VCID-38q7-4ar3-sqcc
2
vulnerability VCID-3y3x-qqep-43ec
3
vulnerability VCID-4uuw-pm94-1kak
4
vulnerability VCID-51nr-8avm-qued
5
vulnerability VCID-5cgx-1n9u-gqbh
6
vulnerability VCID-5vkn-4rqc-qkbk
7
vulnerability VCID-6ake-v15c-k7aq
8
vulnerability VCID-6thk-vf9t-gygs
9
vulnerability VCID-75cx-avm7-tfcb
10
vulnerability VCID-7wcy-5hnc-tfh4
11
vulnerability VCID-8nyc-r2e4-17gr
12
vulnerability VCID-b55f-n1ed-g7eq
13
vulnerability VCID-eh71-uhnv-fqeb
14
vulnerability VCID-ejhc-6yqt-gkgv
15
vulnerability VCID-ejsj-eyej-huc6
16
vulnerability VCID-f859-13vd-7uef
17
vulnerability VCID-gmr7-umz8-9fhm
18
vulnerability VCID-j4ak-hjn5-guat
19
vulnerability VCID-j6j9-vj4t-bfa6
20
vulnerability VCID-kha2-8ez1-gfhr
21
vulnerability VCID-mekt-8gm1-33ej
22
vulnerability VCID-npgb-p786-d3fe
23
vulnerability VCID-qtg5-1dxw-sfdc
24
vulnerability VCID-qzcy-2xsr-vqeh
25
vulnerability VCID-r46f-12hj-7ybb
26
vulnerability VCID-t7rc-zadf-cybq
27
vulnerability VCID-t85u-116v-7uan
28
vulnerability VCID-vsda-kq13-73g1
29
vulnerability VCID-w7k1-y36j-3ye6
30
vulnerability VCID-wgce-vves-guek
31
vulnerability VCID-wqfe-hkrk-nbaj
32
vulnerability VCID-wv5f-6x7x-7fdw
33
vulnerability VCID-wyf3-shyh-qyhc
34
vulnerability VCID-zcxx-ra5c-hyh9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
aliases CVE-2022-21166, XSA-404
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4429-qf2w-jqg3
6
url VCID-4bw3-w5hz-ekd1
vulnerability_id VCID-4bw3-w5hz-ekd1
summary intel-microcode: Unexpected behavior in Intel(R) Core(TM) Ultra Processors
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-46103.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-46103.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-46103
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.01254
published_at 2026-04-12T12:55:00Z
1
value 0.00011
scoring_system epss
scoring_elements 0.01261
published_at 2026-04-18T12:55:00Z
2
value 0.00011
scoring_system epss
scoring_elements 0.01278
published_at 2026-04-09T12:55:00Z
3
value 0.00011
scoring_system epss
scoring_elements 0.01256
published_at 2026-04-13T12:55:00Z
4
value 0.00011
scoring_system epss
scoring_elements 0.01248
published_at 2026-04-16T12:55:00Z
5
value 0.00011
scoring_system epss
scoring_elements 0.01259
published_at 2026-04-11T12:55:00Z
6
value 0.00011
scoring_system epss
scoring_elements 0.01268
published_at 2026-04-07T12:55:00Z
7
value 0.00011
scoring_system epss
scoring_elements 0.01274
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-46103
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46103
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46103
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2292300
reference_id 2292300
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2292300
5
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01052.html
reference_id intel-sa-01052.html
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-21T15:00:27Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01052.html
6
reference_url https://access.redhat.com/errata/RHSA-2024:9401
reference_id RHSA-2024:9401
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9401
7
reference_url https://usn.ubuntu.com/6797-1/
reference_id USN-6797-1
reference_type
scores
url https://usn.ubuntu.com/6797-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
purl pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ues-wvyq-6qc9
1
vulnerability VCID-38q7-4ar3-sqcc
2
vulnerability VCID-3y3x-qqep-43ec
3
vulnerability VCID-4uuw-pm94-1kak
4
vulnerability VCID-51nr-8avm-qued
5
vulnerability VCID-5cgx-1n9u-gqbh
6
vulnerability VCID-5vkn-4rqc-qkbk
7
vulnerability VCID-6ake-v15c-k7aq
8
vulnerability VCID-6thk-vf9t-gygs
9
vulnerability VCID-75cx-avm7-tfcb
10
vulnerability VCID-7wcy-5hnc-tfh4
11
vulnerability VCID-8nyc-r2e4-17gr
12
vulnerability VCID-b55f-n1ed-g7eq
13
vulnerability VCID-eh71-uhnv-fqeb
14
vulnerability VCID-ejhc-6yqt-gkgv
15
vulnerability VCID-ejsj-eyej-huc6
16
vulnerability VCID-f859-13vd-7uef
17
vulnerability VCID-gmr7-umz8-9fhm
18
vulnerability VCID-j4ak-hjn5-guat
19
vulnerability VCID-j6j9-vj4t-bfa6
20
vulnerability VCID-kha2-8ez1-gfhr
21
vulnerability VCID-mekt-8gm1-33ej
22
vulnerability VCID-npgb-p786-d3fe
23
vulnerability VCID-qtg5-1dxw-sfdc
24
vulnerability VCID-qzcy-2xsr-vqeh
25
vulnerability VCID-r46f-12hj-7ybb
26
vulnerability VCID-t7rc-zadf-cybq
27
vulnerability VCID-t85u-116v-7uan
28
vulnerability VCID-vsda-kq13-73g1
29
vulnerability VCID-w7k1-y36j-3ye6
30
vulnerability VCID-wgce-vves-guek
31
vulnerability VCID-wqfe-hkrk-nbaj
32
vulnerability VCID-wv5f-6x7x-7fdw
33
vulnerability VCID-wyf3-shyh-qyhc
34
vulnerability VCID-zcxx-ra5c-hyh9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
aliases CVE-2023-46103
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4bw3-w5hz-ekd1
7
url VCID-4uuw-pm94-1kak
vulnerability_id VCID-4uuw-pm94-1kak
summary Missing reference to active allocated resource for some Intel(R) Xeon(R) processors may allow an authenticated user to potentially enable denial of service via local access.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-21090
reference_id
reference_type
scores
0
value 0.00031
scoring_system epss
scoring_elements 0.09017
published_at 2026-04-02T12:55:00Z
1
value 0.00031
scoring_system epss
scoring_elements 0.09104
published_at 2026-04-11T12:55:00Z
2
value 0.00031
scoring_system epss
scoring_elements 0.09071
published_at 2026-04-12T12:55:00Z
3
value 0.00031
scoring_system epss
scoring_elements 0.09058
published_at 2026-04-13T12:55:00Z
4
value 0.00031
scoring_system epss
scoring_elements 0.08952
published_at 2026-04-16T12:55:00Z
5
value 0.00031
scoring_system epss
scoring_elements 0.09068
published_at 2026-04-04T12:55:00Z
6
value 0.00031
scoring_system epss
scoring_elements 0.08992
published_at 2026-04-07T12:55:00Z
7
value 0.00031
scoring_system epss
scoring_elements 0.09072
published_at 2026-04-08T12:55:00Z
8
value 0.00031
scoring_system epss
scoring_elements 0.09103
published_at 2026-04-09T12:55:00Z
9
value 0.00032
scoring_system epss
scoring_elements 0.09145
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-21090
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21090
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
reference_id 1110983
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
3
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01313.html
reference_id intel-sa-01313.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value 4.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:P/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-12T19:09:39Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01313.html
4
reference_url https://usn.ubuntu.com/7866-1/
reference_id USN-7866-1
reference_type
scores
url https://usn.ubuntu.com/7866-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2025-21090
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4uuw-pm94-1kak
8
url VCID-51nr-8avm-qued
vulnerability_id VCID-51nr-8avm-qued
summary microcode_ctl: From CVEorg collector
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-20012.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-20012.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-20012
reference_id
reference_type
scores
0
value 0.0007
scoring_system epss
scoring_elements 0.21497
published_at 2026-04-02T12:55:00Z
1
value 0.0007
scoring_system epss
scoring_elements 0.21369
published_at 2026-04-18T12:55:00Z
2
value 0.0007
scoring_system epss
scoring_elements 0.21459
published_at 2026-04-11T12:55:00Z
3
value 0.0007
scoring_system epss
scoring_elements 0.21421
published_at 2026-04-12T12:55:00Z
4
value 0.0007
scoring_system epss
scoring_elements 0.21365
published_at 2026-04-13T12:55:00Z
5
value 0.0007
scoring_system epss
scoring_elements 0.21361
published_at 2026-04-16T12:55:00Z
6
value 0.0007
scoring_system epss
scoring_elements 0.21553
published_at 2026-04-04T12:55:00Z
7
value 0.0007
scoring_system epss
scoring_elements 0.21309
published_at 2026-04-07T12:55:00Z
8
value 0.0007
scoring_system epss
scoring_elements 0.21387
published_at 2026-04-08T12:55:00Z
9
value 0.0007
scoring_system epss
scoring_elements 0.21448
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-20012
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20012
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172
reference_id 1105172
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366114
reference_id 2366114
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366114
6
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01322.html
reference_id intel-sa-01322.html
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
1
value 4.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-14T20:19:54Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01322.html
7
reference_url https://access.redhat.com/errata/RHSA-2025:10101
reference_id RHSA-2025:10101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10101
8
reference_url https://access.redhat.com/errata/RHSA-2025:10102
reference_id RHSA-2025:10102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10102
9
reference_url https://access.redhat.com/errata/RHSA-2025:10103
reference_id RHSA-2025:10103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10103
10
reference_url https://access.redhat.com/errata/RHSA-2025:10107
reference_id RHSA-2025:10107
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10107
11
reference_url https://access.redhat.com/errata/RHSA-2025:10108
reference_id RHSA-2025:10108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10108
12
reference_url https://access.redhat.com/errata/RHSA-2025:10109
reference_id RHSA-2025:10109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10109
13
reference_url https://access.redhat.com/errata/RHSA-2025:10111
reference_id RHSA-2025:10111
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10111
14
reference_url https://access.redhat.com/errata/RHSA-2025:10126
reference_id RHSA-2025:10126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10126
15
reference_url https://access.redhat.com/errata/RHSA-2025:10162
reference_id RHSA-2025:10162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10162
16
reference_url https://access.redhat.com/errata/RHSA-2025:10991
reference_id RHSA-2025:10991
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10991
17
reference_url https://usn.ubuntu.com/7535-1/
reference_id USN-7535-1
reference_type
scores
url https://usn.ubuntu.com/7535-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2025-20012
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-51nr-8avm-qued
9
url VCID-5cgx-1n9u-gqbh
vulnerability_id VCID-5cgx-1n9u-gqbh
summary microcode_ctl: Exposure of sensitive information
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-45332.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-45332.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-45332
reference_id
reference_type
scores
0
value 0.00104
scoring_system epss
scoring_elements 0.28309
published_at 2026-04-18T12:55:00Z
1
value 0.00104
scoring_system epss
scoring_elements 0.28419
published_at 2026-04-11T12:55:00Z
2
value 0.00104
scoring_system epss
scoring_elements 0.28376
published_at 2026-04-12T12:55:00Z
3
value 0.00104
scoring_system epss
scoring_elements 0.28318
published_at 2026-04-13T12:55:00Z
4
value 0.00104
scoring_system epss
scoring_elements 0.2833
published_at 2026-04-16T12:55:00Z
5
value 0.00104
scoring_system epss
scoring_elements 0.28474
published_at 2026-04-02T12:55:00Z
6
value 0.00104
scoring_system epss
scoring_elements 0.28516
published_at 2026-04-04T12:55:00Z
7
value 0.00104
scoring_system epss
scoring_elements 0.28307
published_at 2026-04-07T12:55:00Z
8
value 0.00104
scoring_system epss
scoring_elements 0.28372
published_at 2026-04-08T12:55:00Z
9
value 0.00104
scoring_system epss
scoring_elements 0.28416
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-45332
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45332
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45332
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172
reference_id 1105172
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366162
reference_id 2366162
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366162
6
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01247.html
reference_id intel-sa-01247.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value 5.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-14T13:56:46Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01247.html
7
reference_url https://access.redhat.com/errata/RHSA-2025:10101
reference_id RHSA-2025:10101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10101
8
reference_url https://access.redhat.com/errata/RHSA-2025:10102
reference_id RHSA-2025:10102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10102
9
reference_url https://access.redhat.com/errata/RHSA-2025:10103
reference_id RHSA-2025:10103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10103
10
reference_url https://access.redhat.com/errata/RHSA-2025:10107
reference_id RHSA-2025:10107
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10107
11
reference_url https://access.redhat.com/errata/RHSA-2025:10108
reference_id RHSA-2025:10108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10108
12
reference_url https://access.redhat.com/errata/RHSA-2025:10109
reference_id RHSA-2025:10109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10109
13
reference_url https://access.redhat.com/errata/RHSA-2025:10111
reference_id RHSA-2025:10111
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10111
14
reference_url https://access.redhat.com/errata/RHSA-2025:10126
reference_id RHSA-2025:10126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10126
15
reference_url https://access.redhat.com/errata/RHSA-2025:10162
reference_id RHSA-2025:10162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10162
16
reference_url https://access.redhat.com/errata/RHSA-2025:10991
reference_id RHSA-2025:10991
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10991
17
reference_url https://usn.ubuntu.com/7535-1/
reference_id USN-7535-1
reference_type
scores
url https://usn.ubuntu.com/7535-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2024-45332
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5cgx-1n9u-gqbh
10
url VCID-5dq7-wfyt-2uhz
vulnerability_id VCID-5dq7-wfyt-2uhz
summary kernel: Possible Denial of Service on Intel(R) Processors
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39368.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39368.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-39368
reference_id
reference_type
scores
0
value 0.00204
scoring_system epss
scoring_elements 0.42555
published_at 2026-04-02T12:55:00Z
1
value 0.00204
scoring_system epss
scoring_elements 0.42585
published_at 2026-04-18T12:55:00Z
2
value 0.00204
scoring_system epss
scoring_elements 0.42583
published_at 2026-04-09T12:55:00Z
3
value 0.00204
scoring_system epss
scoring_elements 0.42522
published_at 2026-04-07T12:55:00Z
4
value 0.00204
scoring_system epss
scoring_elements 0.42574
published_at 2026-04-08T12:55:00Z
5
value 0.00204
scoring_system epss
scoring_elements 0.42605
published_at 2026-04-11T12:55:00Z
6
value 0.00204
scoring_system epss
scoring_elements 0.42568
published_at 2026-04-12T12:55:00Z
7
value 0.00204
scoring_system epss
scoring_elements 0.4254
published_at 2026-04-13T12:55:00Z
8
value 0.00204
scoring_system epss
scoring_elements 0.42599
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-39368
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39368
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066108
reference_id 1066108
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066108
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270703
reference_id 2270703
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270703
6
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00972.html
reference_id intel-sa-00972.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-15T15:31:40Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00972.html
7
reference_url https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html
reference_id msg00003.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-15T15:31:40Z/
url https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html
8
reference_url https://security.netapp.com/advisory/ntap-20240405-0007/
reference_id ntap-20240405-0007
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-15T15:31:40Z/
url https://security.netapp.com/advisory/ntap-20240405-0007/
9
reference_url https://access.redhat.com/errata/RHSA-2024:9401
reference_id RHSA-2024:9401
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9401
10
reference_url https://usn.ubuntu.com/6797-1/
reference_id USN-6797-1
reference_type
scores
url https://usn.ubuntu.com/6797-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
purl pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ues-wvyq-6qc9
1
vulnerability VCID-38q7-4ar3-sqcc
2
vulnerability VCID-3y3x-qqep-43ec
3
vulnerability VCID-4uuw-pm94-1kak
4
vulnerability VCID-51nr-8avm-qued
5
vulnerability VCID-5cgx-1n9u-gqbh
6
vulnerability VCID-5vkn-4rqc-qkbk
7
vulnerability VCID-6ake-v15c-k7aq
8
vulnerability VCID-6thk-vf9t-gygs
9
vulnerability VCID-75cx-avm7-tfcb
10
vulnerability VCID-7wcy-5hnc-tfh4
11
vulnerability VCID-8nyc-r2e4-17gr
12
vulnerability VCID-b55f-n1ed-g7eq
13
vulnerability VCID-eh71-uhnv-fqeb
14
vulnerability VCID-ejhc-6yqt-gkgv
15
vulnerability VCID-ejsj-eyej-huc6
16
vulnerability VCID-f859-13vd-7uef
17
vulnerability VCID-gmr7-umz8-9fhm
18
vulnerability VCID-j4ak-hjn5-guat
19
vulnerability VCID-j6j9-vj4t-bfa6
20
vulnerability VCID-kha2-8ez1-gfhr
21
vulnerability VCID-mekt-8gm1-33ej
22
vulnerability VCID-npgb-p786-d3fe
23
vulnerability VCID-qtg5-1dxw-sfdc
24
vulnerability VCID-qzcy-2xsr-vqeh
25
vulnerability VCID-r46f-12hj-7ybb
26
vulnerability VCID-t7rc-zadf-cybq
27
vulnerability VCID-t85u-116v-7uan
28
vulnerability VCID-vsda-kq13-73g1
29
vulnerability VCID-w7k1-y36j-3ye6
30
vulnerability VCID-wgce-vves-guek
31
vulnerability VCID-wqfe-hkrk-nbaj
32
vulnerability VCID-wv5f-6x7x-7fdw
33
vulnerability VCID-wyf3-shyh-qyhc
34
vulnerability VCID-zcxx-ra5c-hyh9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
aliases CVE-2023-39368
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5dq7-wfyt-2uhz
11
url VCID-5vkn-4rqc-qkbk
vulnerability_id VCID-5vkn-4rqc-qkbk
summary microcode_ctl: From CVEorg collector
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24495.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24495.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24495
reference_id
reference_type
scores
0
value 0.00073
scoring_system epss
scoring_elements 0.22271
published_at 2026-04-02T12:55:00Z
1
value 0.00073
scoring_system epss
scoring_elements 0.22149
published_at 2026-04-18T12:55:00Z
2
value 0.00073
scoring_system epss
scoring_elements 0.22236
published_at 2026-04-09T12:55:00Z
3
value 0.00073
scoring_system epss
scoring_elements 0.22255
published_at 2026-04-11T12:55:00Z
4
value 0.00073
scoring_system epss
scoring_elements 0.22214
published_at 2026-04-12T12:55:00Z
5
value 0.00073
scoring_system epss
scoring_elements 0.22154
published_at 2026-04-16T12:55:00Z
6
value 0.00073
scoring_system epss
scoring_elements 0.22314
published_at 2026-04-04T12:55:00Z
7
value 0.00073
scoring_system epss
scoring_elements 0.22099
published_at 2026-04-07T12:55:00Z
8
value 0.00073
scoring_system epss
scoring_elements 0.22182
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24495
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24495
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24495
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172
reference_id 1105172
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366089
reference_id 2366089
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366089
6
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01322.html
reference_id intel-sa-01322.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value 6.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-14T17:16:37Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01322.html
7
reference_url https://access.redhat.com/errata/RHSA-2025:10101
reference_id RHSA-2025:10101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10101
8
reference_url https://access.redhat.com/errata/RHSA-2025:10102
reference_id RHSA-2025:10102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10102
9
reference_url https://access.redhat.com/errata/RHSA-2025:10103
reference_id RHSA-2025:10103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10103
10
reference_url https://access.redhat.com/errata/RHSA-2025:10107
reference_id RHSA-2025:10107
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10107
11
reference_url https://access.redhat.com/errata/RHSA-2025:10108
reference_id RHSA-2025:10108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10108
12
reference_url https://access.redhat.com/errata/RHSA-2025:10109
reference_id RHSA-2025:10109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10109
13
reference_url https://access.redhat.com/errata/RHSA-2025:10111
reference_id RHSA-2025:10111
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10111
14
reference_url https://access.redhat.com/errata/RHSA-2025:10126
reference_id RHSA-2025:10126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10126
15
reference_url https://access.redhat.com/errata/RHSA-2025:10162
reference_id RHSA-2025:10162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10162
16
reference_url https://access.redhat.com/errata/RHSA-2025:10991
reference_id RHSA-2025:10991
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10991
17
reference_url https://usn.ubuntu.com/7535-1/
reference_id USN-7535-1
reference_type
scores
url https://usn.ubuntu.com/7535-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2025-24495
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5vkn-4rqc-qkbk
12
url VCID-6ake-v15c-k7aq
vulnerability_id VCID-6ake-v15c-k7aq
summary Incorrect default permissions in some Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX may allow a privileged user to potentially enable escalation of privilege via local access.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21820
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01762
published_at 2026-04-02T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02646
published_at 2026-04-18T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02672
published_at 2026-04-11T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02658
published_at 2026-04-12T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02656
published_at 2026-04-13T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02638
published_at 2026-04-16T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02669
published_at 2026-04-04T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02677
published_at 2026-04-07T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02679
published_at 2026-04-08T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02699
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21820
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21820
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087532
reference_id 1087532
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087532
4
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01079.html
reference_id intel-sa-01079.html
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N
1
value 8.5
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-14T15:11:33Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01079.html
5
reference_url https://usn.ubuntu.com/7149-1/
reference_id USN-7149-1
reference_type
scores
url https://usn.ubuntu.com/7149-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2024-21820
risk_score 2.5
exploitability 0.5
weighted_severity 5.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6ake-v15c-k7aq
13
url VCID-6mzy-wsz1-cyhf
vulnerability_id VCID-6mzy-wsz1-cyhf
summary kernel: Intel firmware update for incorrect calculation in microcode keying mechanism
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-33972.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-33972.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-33972
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10309
published_at 2026-04-02T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.10225
published_at 2026-04-18T12:55:00Z
2
value 0.00035
scoring_system epss
scoring_elements 0.10404
published_at 2026-04-12T12:55:00Z
3
value 0.00035
scoring_system epss
scoring_elements 0.10382
published_at 2026-04-13T12:55:00Z
4
value 0.00035
scoring_system epss
scoring_elements 0.10254
published_at 2026-04-16T12:55:00Z
5
value 0.00035
scoring_system epss
scoring_elements 0.10375
published_at 2026-04-04T12:55:00Z
6
value 0.00035
scoring_system epss
scoring_elements 0.10276
published_at 2026-04-07T12:55:00Z
7
value 0.00035
scoring_system epss
scoring_elements 0.10349
published_at 2026-04-08T12:55:00Z
8
value 0.00035
scoring_system epss
scoring_elements 0.10416
published_at 2026-04-09T12:55:00Z
9
value 0.00035
scoring_system epss
scoring_elements 0.10444
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-33972
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33972
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33972
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031334
reference_id 1031334
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031334
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2171243
reference_id 2171243
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2171243
6
reference_url http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00730.html
reference_id intel-sa-00730.html
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-27T17:28:30Z/
url http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00730.html
7
reference_url https://usn.ubuntu.com/5886-1/
reference_id USN-5886-1
reference_type
scores
url https://usn.ubuntu.com/5886-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
purl pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ues-wvyq-6qc9
1
vulnerability VCID-38q7-4ar3-sqcc
2
vulnerability VCID-3y3x-qqep-43ec
3
vulnerability VCID-4uuw-pm94-1kak
4
vulnerability VCID-51nr-8avm-qued
5
vulnerability VCID-5cgx-1n9u-gqbh
6
vulnerability VCID-5vkn-4rqc-qkbk
7
vulnerability VCID-6ake-v15c-k7aq
8
vulnerability VCID-6thk-vf9t-gygs
9
vulnerability VCID-75cx-avm7-tfcb
10
vulnerability VCID-7wcy-5hnc-tfh4
11
vulnerability VCID-8nyc-r2e4-17gr
12
vulnerability VCID-b55f-n1ed-g7eq
13
vulnerability VCID-eh71-uhnv-fqeb
14
vulnerability VCID-ejhc-6yqt-gkgv
15
vulnerability VCID-ejsj-eyej-huc6
16
vulnerability VCID-f859-13vd-7uef
17
vulnerability VCID-gmr7-umz8-9fhm
18
vulnerability VCID-j4ak-hjn5-guat
19
vulnerability VCID-j6j9-vj4t-bfa6
20
vulnerability VCID-kha2-8ez1-gfhr
21
vulnerability VCID-mekt-8gm1-33ej
22
vulnerability VCID-npgb-p786-d3fe
23
vulnerability VCID-qtg5-1dxw-sfdc
24
vulnerability VCID-qzcy-2xsr-vqeh
25
vulnerability VCID-r46f-12hj-7ybb
26
vulnerability VCID-t7rc-zadf-cybq
27
vulnerability VCID-t85u-116v-7uan
28
vulnerability VCID-vsda-kq13-73g1
29
vulnerability VCID-w7k1-y36j-3ye6
30
vulnerability VCID-wgce-vves-guek
31
vulnerability VCID-wqfe-hkrk-nbaj
32
vulnerability VCID-wv5f-6x7x-7fdw
33
vulnerability VCID-wyf3-shyh-qyhc
34
vulnerability VCID-zcxx-ra5c-hyh9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
aliases CVE-2022-33972
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6mzy-wsz1-cyhf
14
url VCID-6thk-vf9t-gygs
vulnerability_id VCID-6thk-vf9t-gygs
summary microcode_ctl: Insufficient granularity of access control in UEFI firmware
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-39279.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-39279.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-39279
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06475
published_at 2026-04-18T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06541
published_at 2026-04-12T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06532
published_at 2026-04-13T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06467
published_at 2026-04-16T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06438
published_at 2026-04-02T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06474
published_at 2026-04-04T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06462
published_at 2026-04-07T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06512
published_at 2026-04-08T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.06553
published_at 2026-04-09T12:55:00Z
9
value 0.00024
scoring_system epss
scoring_elements 0.06548
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-39279
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39279
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39279
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
reference_id 1095805
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345381
reference_id 2345381
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2345381
5
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
reference_id intel-sa-01139.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value 6.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T15:14:06Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
6
reference_url https://access.redhat.com/errata/RHSA-2025:7043
reference_id RHSA-2025:7043
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7043
7
reference_url https://usn.ubuntu.com/7269-1/
reference_id USN-7269-1
reference_type
scores
url https://usn.ubuntu.com/7269-1/
8
reference_url https://usn.ubuntu.com/7269-2/
reference_id USN-7269-2
reference_type
scores
url https://usn.ubuntu.com/7269-2/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2024-39279
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6thk-vf9t-gygs
15
url VCID-6vn3-vpg9-gfbk
vulnerability_id VCID-6vn3-vpg9-gfbk
summary intel-microcode: Improper input validation in some Intel® TDX module software
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-47855.json
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-47855.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-47855
reference_id
reference_type
scores
0
value 0.00074
scoring_system epss
scoring_elements 0.22426
published_at 2026-04-02T12:55:00Z
1
value 0.00074
scoring_system epss
scoring_elements 0.22326
published_at 2026-04-18T12:55:00Z
2
value 0.00074
scoring_system epss
scoring_elements 0.22397
published_at 2026-04-09T12:55:00Z
3
value 0.00074
scoring_system epss
scoring_elements 0.22418
published_at 2026-04-11T12:55:00Z
4
value 0.00074
scoring_system epss
scoring_elements 0.22376
published_at 2026-04-12T12:55:00Z
5
value 0.00074
scoring_system epss
scoring_elements 0.22319
published_at 2026-04-13T12:55:00Z
6
value 0.00074
scoring_system epss
scoring_elements 0.22333
published_at 2026-04-16T12:55:00Z
7
value 0.00074
scoring_system epss
scoring_elements 0.22472
published_at 2026-04-04T12:55:00Z
8
value 0.00074
scoring_system epss
scoring_elements 0.22259
published_at 2026-04-07T12:55:00Z
9
value 0.00074
scoring_system epss
scoring_elements 0.22342
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-47855
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47855
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47855
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2292302
reference_id 2292302
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2292302
5
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01036.html
reference_id intel-sa-01036.html
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-21T15:16:15Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01036.html
6
reference_url https://security.netapp.com/advisory/ntap-20240621-0003/
reference_id ntap-20240621-0003
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-21T15:16:15Z/
url https://security.netapp.com/advisory/ntap-20240621-0003/
7
reference_url https://usn.ubuntu.com/6797-1/
reference_id USN-6797-1
reference_type
scores
url https://usn.ubuntu.com/6797-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
purl pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ues-wvyq-6qc9
1
vulnerability VCID-38q7-4ar3-sqcc
2
vulnerability VCID-3y3x-qqep-43ec
3
vulnerability VCID-4uuw-pm94-1kak
4
vulnerability VCID-51nr-8avm-qued
5
vulnerability VCID-5cgx-1n9u-gqbh
6
vulnerability VCID-5vkn-4rqc-qkbk
7
vulnerability VCID-6ake-v15c-k7aq
8
vulnerability VCID-6thk-vf9t-gygs
9
vulnerability VCID-75cx-avm7-tfcb
10
vulnerability VCID-7wcy-5hnc-tfh4
11
vulnerability VCID-8nyc-r2e4-17gr
12
vulnerability VCID-b55f-n1ed-g7eq
13
vulnerability VCID-eh71-uhnv-fqeb
14
vulnerability VCID-ejhc-6yqt-gkgv
15
vulnerability VCID-ejsj-eyej-huc6
16
vulnerability VCID-f859-13vd-7uef
17
vulnerability VCID-gmr7-umz8-9fhm
18
vulnerability VCID-j4ak-hjn5-guat
19
vulnerability VCID-j6j9-vj4t-bfa6
20
vulnerability VCID-kha2-8ez1-gfhr
21
vulnerability VCID-mekt-8gm1-33ej
22
vulnerability VCID-npgb-p786-d3fe
23
vulnerability VCID-qtg5-1dxw-sfdc
24
vulnerability VCID-qzcy-2xsr-vqeh
25
vulnerability VCID-r46f-12hj-7ybb
26
vulnerability VCID-t7rc-zadf-cybq
27
vulnerability VCID-t85u-116v-7uan
28
vulnerability VCID-vsda-kq13-73g1
29
vulnerability VCID-w7k1-y36j-3ye6
30
vulnerability VCID-wgce-vves-guek
31
vulnerability VCID-wqfe-hkrk-nbaj
32
vulnerability VCID-wv5f-6x7x-7fdw
33
vulnerability VCID-wyf3-shyh-qyhc
34
vulnerability VCID-zcxx-ra5c-hyh9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
aliases CVE-2023-47855
risk_score 2.7
exploitability 0.5
weighted_severity 5.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6vn3-vpg9-gfbk
16
url VCID-75cx-avm7-tfcb
vulnerability_id VCID-75cx-avm7-tfcb
summary Improper handling of overlap between protected memory ranges for some Intel(R) Xeon(R) 6 processor with Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-22889
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03485
published_at 2026-04-11T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03482
published_at 2026-04-02T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.03407
published_at 2026-04-16T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.03432
published_at 2026-04-13T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.03457
published_at 2026-04-12T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03493
published_at 2026-04-04T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.03505
published_at 2026-04-07T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03507
published_at 2026-04-08T12:55:00Z
8
value 0.00016
scoring_system epss
scoring_elements 0.0353
published_at 2026-04-09T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.04119
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-22889
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22889
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22889
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
reference_id 1110983
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
4
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01311.html
reference_id intel-sa-01311.html
reference_type
scores
0
value 7.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
1
value 7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-13T18:04:29Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01311.html
5
reference_url https://usn.ubuntu.com/7866-1/
reference_id USN-7866-1
reference_type
scores
url https://usn.ubuntu.com/7866-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2025-22889
risk_score 2.4
exploitability 0.5
weighted_severity 4.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-75cx-avm7-tfcb
17
url VCID-7wcy-5hnc-tfh4
vulnerability_id VCID-7wcy-5hnc-tfh4
summary Improper Isolation or Compartmentalization in the stream cache mechanism for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege via local access.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-20109
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03426
published_at 2026-04-18T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03362
published_at 2026-04-02T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.03416
published_at 2026-04-09T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.03347
published_at 2026-04-12T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.03324
published_at 2026-04-13T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.033
published_at 2026-04-16T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.03375
published_at 2026-04-11T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03391
published_at 2026-04-07T12:55:00Z
8
value 0.00016
scoring_system epss
scoring_elements 0.03395
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-20109
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20109
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
reference_id 1110983
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
4
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01249.html
reference_id intel-sa-01249.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-12T19:16:39Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01249.html
5
reference_url https://usn.ubuntu.com/7866-1/
reference_id USN-7866-1
reference_type
scores
url https://usn.ubuntu.com/7866-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2025-20109
risk_score 2.4
exploitability 0.5
weighted_severity 4.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7wcy-5hnc-tfh4
18
url VCID-8nyc-r2e4-17gr
vulnerability_id VCID-8nyc-r2e4-17gr
summary Insufficient control flow management in the Alias Checking Trusted Module (ACTM) firmware for some Intel(R) Xeon(R) processors may allow a privileged user to potentially enable escalation of privilege via local access.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24305
reference_id
reference_type
scores
0
value 7e-05
scoring_system epss
scoring_elements 0.00606
published_at 2026-04-02T12:55:00Z
1
value 7e-05
scoring_system epss
scoring_elements 0.00593
published_at 2026-04-11T12:55:00Z
2
value 7e-05
scoring_system epss
scoring_elements 0.00589
published_at 2026-04-12T12:55:00Z
3
value 7e-05
scoring_system epss
scoring_elements 0.0059
published_at 2026-04-13T12:55:00Z
4
value 7e-05
scoring_system epss
scoring_elements 0.00585
published_at 2026-04-16T12:55:00Z
5
value 7e-05
scoring_system epss
scoring_elements 0.006
published_at 2026-04-04T12:55:00Z
6
value 7e-05
scoring_system epss
scoring_elements 0.00601
published_at 2026-04-07T12:55:00Z
7
value 7e-05
scoring_system epss
scoring_elements 0.00599
published_at 2026-04-08T12:55:00Z
8
value 8e-05
scoring_system epss
scoring_elements 0.00694
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24305
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24305
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
reference_id 1110983
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
3
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01313.html
reference_id intel-sa-01313.html
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N
1
value 7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-13T18:04:22Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01313.html
4
reference_url https://usn.ubuntu.com/7866-1/
reference_id USN-7866-1
reference_type
scores
url https://usn.ubuntu.com/7866-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2025-24305
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8nyc-r2e4-17gr
19
url VCID-8vx6-ctvp-8qeq
vulnerability_id VCID-8vx6-ctvp-8qeq
summary kernel: Intel firmware update for insufficient granularity of access control in out-of-band management in some Intel Atom and Intel Xeon Scalable Processors
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21216.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21216.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21216
reference_id
reference_type
scores
0
value 0.00051
scoring_system epss
scoring_elements 0.1593
published_at 2026-04-02T12:55:00Z
1
value 0.00051
scoring_system epss
scoring_elements 0.15741
published_at 2026-04-18T12:55:00Z
2
value 0.00051
scoring_system epss
scoring_elements 0.15877
published_at 2026-04-12T12:55:00Z
3
value 0.00051
scoring_system epss
scoring_elements 0.15939
published_at 2026-04-09T12:55:00Z
4
value 0.00051
scoring_system epss
scoring_elements 0.15915
published_at 2026-04-11T12:55:00Z
5
value 0.00051
scoring_system epss
scoring_elements 0.15809
published_at 2026-04-13T12:55:00Z
6
value 0.00051
scoring_system epss
scoring_elements 0.15732
published_at 2026-04-16T12:55:00Z
7
value 0.00051
scoring_system epss
scoring_elements 0.15992
published_at 2026-04-04T12:55:00Z
8
value 0.00051
scoring_system epss
scoring_elements 0.15791
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21216
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21216
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21216
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031334
reference_id 1031334
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031334
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2171227
reference_id 2171227
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2171227
6
reference_url http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00700.html
reference_id intel-sa-00700.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-27T17:29:15Z/
url http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00700.html
7
reference_url https://security.netapp.com/advisory/ntap-20230601-0005/
reference_id ntap-20230601-0005
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-27T17:29:15Z/
url https://security.netapp.com/advisory/ntap-20230601-0005/
8
reference_url https://access.redhat.com/errata/RHSA-2023:5209
reference_id RHSA-2023:5209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5209
9
reference_url https://usn.ubuntu.com/5886-1/
reference_id USN-5886-1
reference_type
scores
url https://usn.ubuntu.com/5886-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
purl pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ues-wvyq-6qc9
1
vulnerability VCID-38q7-4ar3-sqcc
2
vulnerability VCID-3y3x-qqep-43ec
3
vulnerability VCID-4uuw-pm94-1kak
4
vulnerability VCID-51nr-8avm-qued
5
vulnerability VCID-5cgx-1n9u-gqbh
6
vulnerability VCID-5vkn-4rqc-qkbk
7
vulnerability VCID-6ake-v15c-k7aq
8
vulnerability VCID-6thk-vf9t-gygs
9
vulnerability VCID-75cx-avm7-tfcb
10
vulnerability VCID-7wcy-5hnc-tfh4
11
vulnerability VCID-8nyc-r2e4-17gr
12
vulnerability VCID-b55f-n1ed-g7eq
13
vulnerability VCID-eh71-uhnv-fqeb
14
vulnerability VCID-ejhc-6yqt-gkgv
15
vulnerability VCID-ejsj-eyej-huc6
16
vulnerability VCID-f859-13vd-7uef
17
vulnerability VCID-gmr7-umz8-9fhm
18
vulnerability VCID-j4ak-hjn5-guat
19
vulnerability VCID-j6j9-vj4t-bfa6
20
vulnerability VCID-kha2-8ez1-gfhr
21
vulnerability VCID-mekt-8gm1-33ej
22
vulnerability VCID-npgb-p786-d3fe
23
vulnerability VCID-qtg5-1dxw-sfdc
24
vulnerability VCID-qzcy-2xsr-vqeh
25
vulnerability VCID-r46f-12hj-7ybb
26
vulnerability VCID-t7rc-zadf-cybq
27
vulnerability VCID-t85u-116v-7uan
28
vulnerability VCID-vsda-kq13-73g1
29
vulnerability VCID-w7k1-y36j-3ye6
30
vulnerability VCID-wgce-vves-guek
31
vulnerability VCID-wqfe-hkrk-nbaj
32
vulnerability VCID-wv5f-6x7x-7fdw
33
vulnerability VCID-wyf3-shyh-qyhc
34
vulnerability VCID-zcxx-ra5c-hyh9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
aliases CVE-2022-21216
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8vx6-ctvp-8qeq
20
url VCID-9en3-y22n-wydw
vulnerability_id VCID-9en3-y22n-wydw
summary kernel: Local information disclosure on Intel(R) Xeon(R) D processors with Intel(R) SGX due to incorrect calculation in microcode
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43490.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43490.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-43490
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05469
published_at 2026-04-02T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05478
published_at 2026-04-18T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05504
published_at 2026-04-07T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.0554
published_at 2026-04-08T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05561
published_at 2026-04-09T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05536
published_at 2026-04-11T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05524
published_at 2026-04-12T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05517
published_at 2026-04-13T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.05468
published_at 2026-04-16T12:55:00Z
9
value 0.00021
scoring_system epss
scoring_elements 0.05503
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-43490
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43490
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066108
reference_id 1066108
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066108
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270704
reference_id 2270704
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270704
6
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01045.html
reference_id intel-sa-01045.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:34:04Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01045.html
7
reference_url https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html
reference_id msg00003.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:34:04Z/
url https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html
8
reference_url https://security.netapp.com/advisory/ntap-20240405-0009/
reference_id ntap-20240405-0009
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:34:04Z/
url https://security.netapp.com/advisory/ntap-20240405-0009/
9
reference_url https://access.redhat.com/errata/RHSA-2024:9401
reference_id RHSA-2024:9401
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9401
10
reference_url https://usn.ubuntu.com/6797-1/
reference_id USN-6797-1
reference_type
scores
url https://usn.ubuntu.com/6797-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
purl pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ues-wvyq-6qc9
1
vulnerability VCID-38q7-4ar3-sqcc
2
vulnerability VCID-3y3x-qqep-43ec
3
vulnerability VCID-4uuw-pm94-1kak
4
vulnerability VCID-51nr-8avm-qued
5
vulnerability VCID-5cgx-1n9u-gqbh
6
vulnerability VCID-5vkn-4rqc-qkbk
7
vulnerability VCID-6ake-v15c-k7aq
8
vulnerability VCID-6thk-vf9t-gygs
9
vulnerability VCID-75cx-avm7-tfcb
10
vulnerability VCID-7wcy-5hnc-tfh4
11
vulnerability VCID-8nyc-r2e4-17gr
12
vulnerability VCID-b55f-n1ed-g7eq
13
vulnerability VCID-eh71-uhnv-fqeb
14
vulnerability VCID-ejhc-6yqt-gkgv
15
vulnerability VCID-ejsj-eyej-huc6
16
vulnerability VCID-f859-13vd-7uef
17
vulnerability VCID-gmr7-umz8-9fhm
18
vulnerability VCID-j4ak-hjn5-guat
19
vulnerability VCID-j6j9-vj4t-bfa6
20
vulnerability VCID-kha2-8ez1-gfhr
21
vulnerability VCID-mekt-8gm1-33ej
22
vulnerability VCID-npgb-p786-d3fe
23
vulnerability VCID-qtg5-1dxw-sfdc
24
vulnerability VCID-qzcy-2xsr-vqeh
25
vulnerability VCID-r46f-12hj-7ybb
26
vulnerability VCID-t7rc-zadf-cybq
27
vulnerability VCID-t85u-116v-7uan
28
vulnerability VCID-vsda-kq13-73g1
29
vulnerability VCID-w7k1-y36j-3ye6
30
vulnerability VCID-wgce-vves-guek
31
vulnerability VCID-wqfe-hkrk-nbaj
32
vulnerability VCID-wv5f-6x7x-7fdw
33
vulnerability VCID-wyf3-shyh-qyhc
34
vulnerability VCID-zcxx-ra5c-hyh9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
aliases CVE-2023-43490
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9en3-y22n-wydw
21
url VCID-b55f-n1ed-g7eq
vulnerability_id VCID-b55f-n1ed-g7eq
summary microcode_ctl: Uncaught exception in the core management mechanism
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-20054.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-20054.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-20054
reference_id
reference_type
scores
0
value 0.00039
scoring_system epss
scoring_elements 0.11736
published_at 2026-04-18T12:55:00Z
1
value 0.00039
scoring_system epss
scoring_elements 0.11737
published_at 2026-04-16T12:55:00Z
2
value 0.00047
scoring_system epss
scoring_elements 0.1453
published_at 2026-04-13T12:55:00Z
3
value 0.00047
scoring_system epss
scoring_elements 0.14638
published_at 2026-04-02T12:55:00Z
4
value 0.00047
scoring_system epss
scoring_elements 0.1471
published_at 2026-04-04T12:55:00Z
5
value 0.00047
scoring_system epss
scoring_elements 0.14522
published_at 2026-04-07T12:55:00Z
6
value 0.00047
scoring_system epss
scoring_elements 0.14611
published_at 2026-04-08T12:55:00Z
7
value 0.00047
scoring_system epss
scoring_elements 0.14669
published_at 2026-04-09T12:55:00Z
8
value 0.00047
scoring_system epss
scoring_elements 0.14628
published_at 2026-04-11T12:55:00Z
9
value 0.00047
scoring_system epss
scoring_elements 0.14591
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-20054
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20054
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20054
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172
reference_id 1105172
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366113
reference_id 2366113
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366113
5
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01244.html
reference_id intel-sa-01244.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value 6.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-14T15:48:16Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01244.html
6
reference_url https://usn.ubuntu.com/7535-1/
reference_id USN-7535-1
reference_type
scores
url https://usn.ubuntu.com/7535-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2025-20054
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b55f-n1ed-g7eq
22
url VCID-bzwc-9ueu-gka1
vulnerability_id VCID-bzwc-9ueu-gka1
summary Incorrect behavior order in transition between executive monitor and SMI transfer monitor (STM) in some Intel(R) Processor may allow a privileged user to potentially enable escalation of privilege via local access.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-24853
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03538
published_at 2026-04-16T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.0355
published_at 2026-04-18T12:55:00Z
2
value 0.00019
scoring_system epss
scoring_elements 0.05126
published_at 2026-04-08T12:55:00Z
3
value 0.00019
scoring_system epss
scoring_elements 0.0514
published_at 2026-04-09T12:55:00Z
4
value 0.00019
scoring_system epss
scoring_elements 0.05115
published_at 2026-04-11T12:55:00Z
5
value 0.00019
scoring_system epss
scoring_elements 0.05099
published_at 2026-04-12T12:55:00Z
6
value 0.00019
scoring_system epss
scoring_elements 0.05083
published_at 2026-04-13T12:55:00Z
7
value 0.0002
scoring_system epss
scoring_elements 0.05236
published_at 2026-04-02T12:55:00Z
8
value 0.0002
scoring_system epss
scoring_elements 0.05294
published_at 2026-04-07T12:55:00Z
9
value 0.0002
scoring_system epss
scoring_elements 0.05268
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-24853
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24853
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24853
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078742
reference_id 1078742
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078742
4
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01083.html
reference_id intel-sa-01083.html
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H
1
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-14T19:14:11Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01083.html
5
reference_url https://usn.ubuntu.com/6967-1/
reference_id USN-6967-1
reference_type
scores
url https://usn.ubuntu.com/6967-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
purl pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ues-wvyq-6qc9
1
vulnerability VCID-38q7-4ar3-sqcc
2
vulnerability VCID-3y3x-qqep-43ec
3
vulnerability VCID-4uuw-pm94-1kak
4
vulnerability VCID-51nr-8avm-qued
5
vulnerability VCID-5cgx-1n9u-gqbh
6
vulnerability VCID-5vkn-4rqc-qkbk
7
vulnerability VCID-6ake-v15c-k7aq
8
vulnerability VCID-6thk-vf9t-gygs
9
vulnerability VCID-75cx-avm7-tfcb
10
vulnerability VCID-7wcy-5hnc-tfh4
11
vulnerability VCID-8nyc-r2e4-17gr
12
vulnerability VCID-b55f-n1ed-g7eq
13
vulnerability VCID-eh71-uhnv-fqeb
14
vulnerability VCID-ejhc-6yqt-gkgv
15
vulnerability VCID-ejsj-eyej-huc6
16
vulnerability VCID-f859-13vd-7uef
17
vulnerability VCID-gmr7-umz8-9fhm
18
vulnerability VCID-j4ak-hjn5-guat
19
vulnerability VCID-j6j9-vj4t-bfa6
20
vulnerability VCID-kha2-8ez1-gfhr
21
vulnerability VCID-mekt-8gm1-33ej
22
vulnerability VCID-npgb-p786-d3fe
23
vulnerability VCID-qtg5-1dxw-sfdc
24
vulnerability VCID-qzcy-2xsr-vqeh
25
vulnerability VCID-r46f-12hj-7ybb
26
vulnerability VCID-t7rc-zadf-cybq
27
vulnerability VCID-t85u-116v-7uan
28
vulnerability VCID-vsda-kq13-73g1
29
vulnerability VCID-w7k1-y36j-3ye6
30
vulnerability VCID-wgce-vves-guek
31
vulnerability VCID-wqfe-hkrk-nbaj
32
vulnerability VCID-wv5f-6x7x-7fdw
33
vulnerability VCID-wyf3-shyh-qyhc
34
vulnerability VCID-zcxx-ra5c-hyh9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
aliases CVE-2024-24853
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bzwc-9ueu-gka1
23
url VCID-csy7-esn4-u3gq
vulnerability_id VCID-csy7-esn4-u3gq
summary x86: MMIO Stale Data vulnerabilities
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21123.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21123.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21123
reference_id
reference_type
scores
0
value 0.00452
scoring_system epss
scoring_elements 0.63685
published_at 2026-04-02T12:55:00Z
1
value 0.00452
scoring_system epss
scoring_elements 0.63751
published_at 2026-04-18T12:55:00Z
2
value 0.00452
scoring_system epss
scoring_elements 0.63711
published_at 2026-04-04T12:55:00Z
3
value 0.00452
scoring_system epss
scoring_elements 0.63671
published_at 2026-04-07T12:55:00Z
4
value 0.00452
scoring_system epss
scoring_elements 0.63723
published_at 2026-04-08T12:55:00Z
5
value 0.00452
scoring_system epss
scoring_elements 0.6374
published_at 2026-04-12T12:55:00Z
6
value 0.00452
scoring_system epss
scoring_elements 0.63754
published_at 2026-04-11T12:55:00Z
7
value 0.00452
scoring_system epss
scoring_elements 0.63706
published_at 2026-04-13T12:55:00Z
8
value 0.00452
scoring_system epss
scoring_elements 0.63741
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21123
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
46
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
47
reference_url http://www.openwall.com/lists/oss-security/2022/06/16/1
reference_id 1
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/
url http://www.openwall.com/lists/oss-security/2022/06/16/1
48
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2090237
reference_id 2090237
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2090237
49
reference_url https://www.debian.org/security/2022/dsa-5173
reference_id dsa-5173
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/
url https://www.debian.org/security/2022/dsa-5173
50
reference_url https://www.debian.org/security/2022/dsa-5178
reference_id dsa-5178
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/
url https://www.debian.org/security/2022/dsa-5178
51
reference_url https://www.debian.org/security/2022/dsa-5184
reference_id dsa-5184
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/
url https://www.debian.org/security/2022/dsa-5184
52
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV/
reference_id FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV/
53
reference_url https://security.gentoo.org/glsa/202208-23
reference_id GLSA-202208-23
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/
url https://security.gentoo.org/glsa/202208-23
54
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html
reference_id intel-sa-00615.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html
55
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS/
reference_id MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS/
56
reference_url https://security.netapp.com/advisory/ntap-20220624-0008/
reference_id ntap-20220624-0008
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/
url https://security.netapp.com/advisory/ntap-20220624-0008/
57
reference_url https://access.redhat.com/errata/RHSA-2022:5937
reference_id RHSA-2022:5937
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5937
58
reference_url https://access.redhat.com/errata/RHSA-2022:5939
reference_id RHSA-2022:5939
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5939
59
reference_url https://access.redhat.com/errata/RHSA-2022:6437
reference_id RHSA-2022:6437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6437
60
reference_url https://access.redhat.com/errata/RHSA-2022:6460
reference_id RHSA-2022:6460
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6460
61
reference_url https://access.redhat.com/errata/RHSA-2022:6872
reference_id RHSA-2022:6872
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6872
62
reference_url https://access.redhat.com/errata/RHSA-2022:6983
reference_id RHSA-2022:6983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6983
63
reference_url https://access.redhat.com/errata/RHSA-2022:6991
reference_id RHSA-2022:6991
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6991
64
reference_url https://access.redhat.com/errata/RHSA-2022:7279
reference_id RHSA-2022:7279
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7279
65
reference_url https://access.redhat.com/errata/RHSA-2022:7280
reference_id RHSA-2022:7280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7280
66
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
67
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
68
reference_url https://access.redhat.com/errata/RHSA-2022:8973
reference_id RHSA-2022:8973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8973
69
reference_url https://access.redhat.com/errata/RHSA-2022:8974
reference_id RHSA-2022:8974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8974
70
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/
reference_id RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/
71
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA/
reference_id T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA/
72
reference_url https://usn.ubuntu.com/5484-1/
reference_id USN-5484-1
reference_type
scores
url https://usn.ubuntu.com/5484-1/
73
reference_url https://usn.ubuntu.com/5485-1/
reference_id USN-5485-1
reference_type
scores
url https://usn.ubuntu.com/5485-1/
74
reference_url https://usn.ubuntu.com/5485-2/
reference_id USN-5485-2
reference_type
scores
url https://usn.ubuntu.com/5485-2/
75
reference_url https://usn.ubuntu.com/5486-1/
reference_id USN-5486-1
reference_type
scores
url https://usn.ubuntu.com/5486-1/
76
reference_url https://usn.ubuntu.com/5505-1/
reference_id USN-5505-1
reference_type
scores
url https://usn.ubuntu.com/5505-1/
77
reference_url https://usn.ubuntu.com/5513-1/
reference_id USN-5513-1
reference_type
scores
url https://usn.ubuntu.com/5513-1/
78
reference_url https://usn.ubuntu.com/5529-1/
reference_id USN-5529-1
reference_type
scores
url https://usn.ubuntu.com/5529-1/
79
reference_url https://usn.ubuntu.com/5535-1/
reference_id USN-5535-1
reference_type
scores
url https://usn.ubuntu.com/5535-1/
80
reference_url https://xenbits.xen.org/xsa/advisory-404.html
reference_id XSA-404
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-404.html
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
purl pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ues-wvyq-6qc9
1
vulnerability VCID-38q7-4ar3-sqcc
2
vulnerability VCID-3y3x-qqep-43ec
3
vulnerability VCID-4uuw-pm94-1kak
4
vulnerability VCID-51nr-8avm-qued
5
vulnerability VCID-5cgx-1n9u-gqbh
6
vulnerability VCID-5vkn-4rqc-qkbk
7
vulnerability VCID-6ake-v15c-k7aq
8
vulnerability VCID-6thk-vf9t-gygs
9
vulnerability VCID-75cx-avm7-tfcb
10
vulnerability VCID-7wcy-5hnc-tfh4
11
vulnerability VCID-8nyc-r2e4-17gr
12
vulnerability VCID-b55f-n1ed-g7eq
13
vulnerability VCID-eh71-uhnv-fqeb
14
vulnerability VCID-ejhc-6yqt-gkgv
15
vulnerability VCID-ejsj-eyej-huc6
16
vulnerability VCID-f859-13vd-7uef
17
vulnerability VCID-gmr7-umz8-9fhm
18
vulnerability VCID-j4ak-hjn5-guat
19
vulnerability VCID-j6j9-vj4t-bfa6
20
vulnerability VCID-kha2-8ez1-gfhr
21
vulnerability VCID-mekt-8gm1-33ej
22
vulnerability VCID-npgb-p786-d3fe
23
vulnerability VCID-qtg5-1dxw-sfdc
24
vulnerability VCID-qzcy-2xsr-vqeh
25
vulnerability VCID-r46f-12hj-7ybb
26
vulnerability VCID-t7rc-zadf-cybq
27
vulnerability VCID-t85u-116v-7uan
28
vulnerability VCID-vsda-kq13-73g1
29
vulnerability VCID-w7k1-y36j-3ye6
30
vulnerability VCID-wgce-vves-guek
31
vulnerability VCID-wqfe-hkrk-nbaj
32
vulnerability VCID-wv5f-6x7x-7fdw
33
vulnerability VCID-wyf3-shyh-qyhc
34
vulnerability VCID-zcxx-ra5c-hyh9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
aliases CVE-2022-21123
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-csy7-esn4-u3gq
24
url VCID-dzdf-drjk-m3cj
vulnerability_id VCID-dzdf-drjk-m3cj
summary kernel: Local information disclosure in some Intel(R) processors
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38575.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38575.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-38575
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07655
published_at 2026-04-02T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07626
published_at 2026-04-18T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07667
published_at 2026-04-07T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07727
published_at 2026-04-08T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07745
published_at 2026-04-09T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07743
published_at 2026-04-11T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.0773
published_at 2026-04-12T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07714
published_at 2026-04-13T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07638
published_at 2026-04-16T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07698
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-38575
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38575
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066108
reference_id 1066108
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066108
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270701
reference_id 2270701
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270701
6
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00982.html
reference_id intel-sa-00982.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-27T19:25:29Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00982.html
7
reference_url https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html
reference_id msg00003.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-27T19:25:29Z/
url https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html
8
reference_url https://security.netapp.com/advisory/ntap-20240405-0008/
reference_id ntap-20240405-0008
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-27T19:25:29Z/
url https://security.netapp.com/advisory/ntap-20240405-0008/
9
reference_url https://access.redhat.com/errata/RHSA-2024:9401
reference_id RHSA-2024:9401
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9401
10
reference_url https://usn.ubuntu.com/6797-1/
reference_id USN-6797-1
reference_type
scores
url https://usn.ubuntu.com/6797-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
purl pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ues-wvyq-6qc9
1
vulnerability VCID-38q7-4ar3-sqcc
2
vulnerability VCID-3y3x-qqep-43ec
3
vulnerability VCID-4uuw-pm94-1kak
4
vulnerability VCID-51nr-8avm-qued
5
vulnerability VCID-5cgx-1n9u-gqbh
6
vulnerability VCID-5vkn-4rqc-qkbk
7
vulnerability VCID-6ake-v15c-k7aq
8
vulnerability VCID-6thk-vf9t-gygs
9
vulnerability VCID-75cx-avm7-tfcb
10
vulnerability VCID-7wcy-5hnc-tfh4
11
vulnerability VCID-8nyc-r2e4-17gr
12
vulnerability VCID-b55f-n1ed-g7eq
13
vulnerability VCID-eh71-uhnv-fqeb
14
vulnerability VCID-ejhc-6yqt-gkgv
15
vulnerability VCID-ejsj-eyej-huc6
16
vulnerability VCID-f859-13vd-7uef
17
vulnerability VCID-gmr7-umz8-9fhm
18
vulnerability VCID-j4ak-hjn5-guat
19
vulnerability VCID-j6j9-vj4t-bfa6
20
vulnerability VCID-kha2-8ez1-gfhr
21
vulnerability VCID-mekt-8gm1-33ej
22
vulnerability VCID-npgb-p786-d3fe
23
vulnerability VCID-qtg5-1dxw-sfdc
24
vulnerability VCID-qzcy-2xsr-vqeh
25
vulnerability VCID-r46f-12hj-7ybb
26
vulnerability VCID-t7rc-zadf-cybq
27
vulnerability VCID-t85u-116v-7uan
28
vulnerability VCID-vsda-kq13-73g1
29
vulnerability VCID-w7k1-y36j-3ye6
30
vulnerability VCID-wgce-vves-guek
31
vulnerability VCID-wqfe-hkrk-nbaj
32
vulnerability VCID-wv5f-6x7x-7fdw
33
vulnerability VCID-wyf3-shyh-qyhc
34
vulnerability VCID-zcxx-ra5c-hyh9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
aliases CVE-2023-38575
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dzdf-drjk-m3cj
25
url VCID-eh71-uhnv-fqeb
vulnerability_id VCID-eh71-uhnv-fqeb
summary Improper handling of physical or environmental conditions in some Intel(R) Processors may allow an authenticated user to enable denial of service via local access.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-39355
reference_id
reference_type
scores
0
value 0.0003
scoring_system epss
scoring_elements 0.08442
published_at 2026-04-18T12:55:00Z
1
value 0.0003
scoring_system epss
scoring_elements 0.086
published_at 2026-04-11T12:55:00Z
2
value 0.0003
scoring_system epss
scoring_elements 0.0858
published_at 2026-04-12T12:55:00Z
3
value 0.0003
scoring_system epss
scoring_elements 0.08563
published_at 2026-04-13T12:55:00Z
4
value 0.0003
scoring_system epss
scoring_elements 0.08455
published_at 2026-04-16T12:55:00Z
5
value 0.0003
scoring_system epss
scoring_elements 0.08539
published_at 2026-04-02T12:55:00Z
6
value 0.0003
scoring_system epss
scoring_elements 0.08593
published_at 2026-04-04T12:55:00Z
7
value 0.0003
scoring_system epss
scoring_elements 0.0851
published_at 2026-04-07T12:55:00Z
8
value 0.0003
scoring_system epss
scoring_elements 0.08583
published_at 2026-04-08T12:55:00Z
9
value 0.0003
scoring_system epss
scoring_elements 0.08604
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-39355
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39355
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
reference_id 1095805
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
4
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01228.html
reference_id intel-sa-01228.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value 5.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T15:12:11Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01228.html
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2024-39355
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eh71-uhnv-fqeb
26
url VCID-ejhc-6yqt-gkgv
vulnerability_id VCID-ejhc-6yqt-gkgv
summary x86: Indirect Target Selection
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28956.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28956.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-28956
reference_id
reference_type
scores
0
value 0.00091
scoring_system epss
scoring_elements 0.25577
published_at 2026-04-07T12:55:00Z
1
value 0.00091
scoring_system epss
scoring_elements 0.25764
published_at 2026-04-02T12:55:00Z
2
value 0.00091
scoring_system epss
scoring_elements 0.25806
published_at 2026-04-04T12:55:00Z
3
value 0.00091
scoring_system epss
scoring_elements 0.2565
published_at 2026-04-08T12:55:00Z
4
value 0.00091
scoring_system epss
scoring_elements 0.25696
published_at 2026-04-09T12:55:00Z
5
value 0.00091
scoring_system epss
scoring_elements 0.25706
published_at 2026-04-11T12:55:00Z
6
value 0.00227
scoring_system epss
scoring_elements 0.4551
published_at 2026-04-13T12:55:00Z
7
value 0.00227
scoring_system epss
scoring_elements 0.45557
published_at 2026-04-16T12:55:00Z
8
value 0.00227
scoring_system epss
scoring_elements 0.45505
published_at 2026-04-12T12:55:00Z
9
value 0.00227
scoring_system epss
scoring_elements 0.45554
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-28956
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28956
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172
reference_id 1105172
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105193
reference_id 1105193
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105193
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366125
reference_id 2366125
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366125
7
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01153.html
reference_id intel-sa-01153.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value 5.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-14T14:42:03Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01153.html
8
reference_url https://access.redhat.com/errata/RHSA-2025:10101
reference_id RHSA-2025:10101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10101
9
reference_url https://access.redhat.com/errata/RHSA-2025:10102
reference_id RHSA-2025:10102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10102
10
reference_url https://access.redhat.com/errata/RHSA-2025:10103
reference_id RHSA-2025:10103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10103
11
reference_url https://access.redhat.com/errata/RHSA-2025:10107
reference_id RHSA-2025:10107
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10107
12
reference_url https://access.redhat.com/errata/RHSA-2025:10108
reference_id RHSA-2025:10108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10108
13
reference_url https://access.redhat.com/errata/RHSA-2025:10109
reference_id RHSA-2025:10109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10109
14
reference_url https://access.redhat.com/errata/RHSA-2025:10111
reference_id RHSA-2025:10111
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10111
15
reference_url https://access.redhat.com/errata/RHSA-2025:10126
reference_id RHSA-2025:10126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10126
16
reference_url https://access.redhat.com/errata/RHSA-2025:10162
reference_id RHSA-2025:10162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10162
17
reference_url https://access.redhat.com/errata/RHSA-2025:10991
reference_id RHSA-2025:10991
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10991
18
reference_url https://access.redhat.com/errata/RHSA-2025:13962
reference_id RHSA-2025:13962
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13962
19
reference_url https://access.redhat.com/errata/RHSA-2025:19962
reference_id RHSA-2025:19962
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19962
20
reference_url https://access.redhat.com/errata/RHSA-2025:20095
reference_id RHSA-2025:20095
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:20095
21
reference_url https://usn.ubuntu.com/7535-1/
reference_id USN-7535-1
reference_type
scores
url https://usn.ubuntu.com/7535-1/
22
reference_url https://xenbits.xen.org/xsa/advisory-469.html
reference_id XSA-469
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-469.html
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2024-28956, XSA-469
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ejhc-6yqt-gkgv
27
url VCID-ejsj-eyej-huc6
vulnerability_id VCID-ejsj-eyej-huc6
summary Improper conditions check in some Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX may allow a privileged user to potentially enable escalation of privilege via local access.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-23918
reference_id
reference_type
scores
0
value 0.0006
scoring_system epss
scoring_elements 0.18896
published_at 2026-04-02T12:55:00Z
1
value 0.0007
scoring_system epss
scoring_elements 0.2137
published_at 2026-04-18T12:55:00Z
2
value 0.0007
scoring_system epss
scoring_elements 0.2146
published_at 2026-04-11T12:55:00Z
3
value 0.0007
scoring_system epss
scoring_elements 0.21421
published_at 2026-04-12T12:55:00Z
4
value 0.0007
scoring_system epss
scoring_elements 0.21366
published_at 2026-04-13T12:55:00Z
5
value 0.0007
scoring_system epss
scoring_elements 0.21362
published_at 2026-04-16T12:55:00Z
6
value 0.0007
scoring_system epss
scoring_elements 0.21554
published_at 2026-04-04T12:55:00Z
7
value 0.0007
scoring_system epss
scoring_elements 0.2131
published_at 2026-04-07T12:55:00Z
8
value 0.0007
scoring_system epss
scoring_elements 0.21388
published_at 2026-04-08T12:55:00Z
9
value 0.0007
scoring_system epss
scoring_elements 0.21449
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-23918
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23918
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087532
reference_id 1087532
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087532
4
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01079.html
reference_id intel-sa-01079.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value 8.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-14T15:11:34Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01079.html
5
reference_url https://usn.ubuntu.com/7149-1/
reference_id USN-7149-1
reference_type
scores
url https://usn.ubuntu.com/7149-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2024-23918
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ejsj-eyej-huc6
28
url VCID-f859-13vd-7uef
vulnerability_id VCID-f859-13vd-7uef
summary Out-of-bounds write in the memory subsystem for some Intel(R) Xeon(R) 6 processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-26403
reference_id
reference_type
scores
0
value 0.00013
scoring_system epss
scoring_elements 0.02098
published_at 2026-04-11T12:55:00Z
1
value 0.00013
scoring_system epss
scoring_elements 0.02101
published_at 2026-04-02T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.02053
published_at 2026-04-16T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.02079
published_at 2026-04-13T12:55:00Z
4
value 0.00013
scoring_system epss
scoring_elements 0.02084
published_at 2026-04-12T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.02108
published_at 2026-04-04T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.02103
published_at 2026-04-07T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.02104
published_at 2026-04-08T12:55:00Z
8
value 0.00013
scoring_system epss
scoring_elements 0.02122
published_at 2026-04-09T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02568
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-26403
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26403
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
reference_id 1110983
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
4
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01367.html
reference_id intel-sa-01367.html
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N
1
value 4.5
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-13T15:04:08Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01367.html
5
reference_url https://usn.ubuntu.com/7866-1/
reference_id USN-7866-1
reference_type
scores
url https://usn.ubuntu.com/7866-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2025-26403
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f859-13vd-7uef
29
url VCID-f91c-4ty9-h7a2
vulnerability_id VCID-f91c-4ty9-h7a2
summary hw: cpu: Intel: Stale Data Read from legacy xAPIC vulnerability
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21233.json
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21233.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21233
reference_id
reference_type
scores
0
value 0.00074
scoring_system epss
scoring_elements 0.22519
published_at 2026-04-02T12:55:00Z
1
value 0.00078
scoring_system epss
scoring_elements 0.23233
published_at 2026-04-12T12:55:00Z
2
value 0.00078
scoring_system epss
scoring_elements 0.23271
published_at 2026-04-11T12:55:00Z
3
value 0.00078
scoring_system epss
scoring_elements 0.23249
published_at 2026-04-09T12:55:00Z
4
value 0.00078
scoring_system epss
scoring_elements 0.23199
published_at 2026-04-08T12:55:00Z
5
value 0.00078
scoring_system epss
scoring_elements 0.23336
published_at 2026-04-04T12:55:00Z
6
value 0.00078
scoring_system epss
scoring_elements 0.23125
published_at 2026-04-07T12:55:00Z
7
value 0.00078
scoring_system epss
scoring_elements 0.23175
published_at 2026-04-13T12:55:00Z
8
value 0.00116
scoring_system epss
scoring_elements 0.30218
published_at 2026-04-18T12:55:00Z
9
value 0.00116
scoring_system epss
scoring_elements 0.30236
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21233
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21233
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21233
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2115640
reference_id 2115640
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2115640
5
reference_url https://security.archlinux.org/AVG-2795
reference_id AVG-2795
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2795
6
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00657.html
reference_id intel-sa-00657.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:24Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00657.html
7
reference_url https://lists.debian.org/debian-lts-announce/2023/04/msg00000.html
reference_id msg00000.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:24Z/
url https://lists.debian.org/debian-lts-announce/2023/04/msg00000.html
8
reference_url https://security.netapp.com/advisory/ntap-20220923-0002/
reference_id ntap-20220923-0002
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:24Z/
url https://security.netapp.com/advisory/ntap-20220923-0002/
9
reference_url https://access.redhat.com/errata/RHSA-2022:5937
reference_id RHSA-2022:5937
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5937
10
reference_url https://access.redhat.com/errata/RHSA-2022:5939
reference_id RHSA-2022:5939
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5939
11
reference_url https://usn.ubuntu.com/5612-1/
reference_id USN-5612-1
reference_type
scores
url https://usn.ubuntu.com/5612-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
purl pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ues-wvyq-6qc9
1
vulnerability VCID-38q7-4ar3-sqcc
2
vulnerability VCID-3y3x-qqep-43ec
3
vulnerability VCID-4uuw-pm94-1kak
4
vulnerability VCID-51nr-8avm-qued
5
vulnerability VCID-5cgx-1n9u-gqbh
6
vulnerability VCID-5vkn-4rqc-qkbk
7
vulnerability VCID-6ake-v15c-k7aq
8
vulnerability VCID-6thk-vf9t-gygs
9
vulnerability VCID-75cx-avm7-tfcb
10
vulnerability VCID-7wcy-5hnc-tfh4
11
vulnerability VCID-8nyc-r2e4-17gr
12
vulnerability VCID-b55f-n1ed-g7eq
13
vulnerability VCID-eh71-uhnv-fqeb
14
vulnerability VCID-ejhc-6yqt-gkgv
15
vulnerability VCID-ejsj-eyej-huc6
16
vulnerability VCID-f859-13vd-7uef
17
vulnerability VCID-gmr7-umz8-9fhm
18
vulnerability VCID-j4ak-hjn5-guat
19
vulnerability VCID-j6j9-vj4t-bfa6
20
vulnerability VCID-kha2-8ez1-gfhr
21
vulnerability VCID-mekt-8gm1-33ej
22
vulnerability VCID-npgb-p786-d3fe
23
vulnerability VCID-qtg5-1dxw-sfdc
24
vulnerability VCID-qzcy-2xsr-vqeh
25
vulnerability VCID-r46f-12hj-7ybb
26
vulnerability VCID-t7rc-zadf-cybq
27
vulnerability VCID-t85u-116v-7uan
28
vulnerability VCID-vsda-kq13-73g1
29
vulnerability VCID-w7k1-y36j-3ye6
30
vulnerability VCID-wgce-vves-guek
31
vulnerability VCID-wqfe-hkrk-nbaj
32
vulnerability VCID-wv5f-6x7x-7fdw
33
vulnerability VCID-wyf3-shyh-qyhc
34
vulnerability VCID-zcxx-ra5c-hyh9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
aliases CVE-2022-21233
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f91c-4ty9-h7a2
30
url VCID-fe46-8fs3-p3fd
vulnerability_id VCID-fe46-8fs3-p3fd
summary hw: Intel: Unauthorized error injection in Intel SGX or Intel TDX
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41804.json
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41804.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-41804
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.03982
published_at 2026-04-02T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.03953
published_at 2026-04-18T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.03998
published_at 2026-04-04T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.04011
published_at 2026-04-07T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.04017
published_at 2026-04-08T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.04035
published_at 2026-04-09T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.04006
published_at 2026-04-11T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.0399
published_at 2026-04-12T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.03961
published_at 2026-04-13T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.03941
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-41804
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40982
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40982
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41804
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41804
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23908
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23908
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043305
reference_id 1043305
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043305
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2230685
reference_id 2230685
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2230685
8
reference_url https://www.debian.org/security/2023/dsa-5474
reference_id dsa-5474
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T13:34:03Z/
url https://www.debian.org/security/2023/dsa-5474
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/
reference_id HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T13:34:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/
10
reference_url http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00837.html
reference_id intel-sa-00837.html
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T13:34:03Z/
url http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00837.html
11
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html
reference_id msg00026.html
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T13:34:03Z/
url https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html
12
reference_url https://security.netapp.com/advisory/ntap-20230915-0003/
reference_id ntap-20230915-0003
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T13:34:03Z/
url https://security.netapp.com/advisory/ntap-20230915-0003/
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/
reference_id OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T13:34:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/
14
reference_url https://usn.ubuntu.com/6286-1/
reference_id USN-6286-1
reference_type
scores
url https://usn.ubuntu.com/6286-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
purl pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ues-wvyq-6qc9
1
vulnerability VCID-38q7-4ar3-sqcc
2
vulnerability VCID-3y3x-qqep-43ec
3
vulnerability VCID-4uuw-pm94-1kak
4
vulnerability VCID-51nr-8avm-qued
5
vulnerability VCID-5cgx-1n9u-gqbh
6
vulnerability VCID-5vkn-4rqc-qkbk
7
vulnerability VCID-6ake-v15c-k7aq
8
vulnerability VCID-6thk-vf9t-gygs
9
vulnerability VCID-75cx-avm7-tfcb
10
vulnerability VCID-7wcy-5hnc-tfh4
11
vulnerability VCID-8nyc-r2e4-17gr
12
vulnerability VCID-b55f-n1ed-g7eq
13
vulnerability VCID-eh71-uhnv-fqeb
14
vulnerability VCID-ejhc-6yqt-gkgv
15
vulnerability VCID-ejsj-eyej-huc6
16
vulnerability VCID-f859-13vd-7uef
17
vulnerability VCID-gmr7-umz8-9fhm
18
vulnerability VCID-j4ak-hjn5-guat
19
vulnerability VCID-j6j9-vj4t-bfa6
20
vulnerability VCID-kha2-8ez1-gfhr
21
vulnerability VCID-mekt-8gm1-33ej
22
vulnerability VCID-npgb-p786-d3fe
23
vulnerability VCID-qtg5-1dxw-sfdc
24
vulnerability VCID-qzcy-2xsr-vqeh
25
vulnerability VCID-r46f-12hj-7ybb
26
vulnerability VCID-t7rc-zadf-cybq
27
vulnerability VCID-t85u-116v-7uan
28
vulnerability VCID-vsda-kq13-73g1
29
vulnerability VCID-w7k1-y36j-3ye6
30
vulnerability VCID-wgce-vves-guek
31
vulnerability VCID-wqfe-hkrk-nbaj
32
vulnerability VCID-wv5f-6x7x-7fdw
33
vulnerability VCID-wyf3-shyh-qyhc
34
vulnerability VCID-zcxx-ra5c-hyh9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
aliases CVE-2022-41804
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fe46-8fs3-p3fd
31
url VCID-gmr7-umz8-9fhm
vulnerability_id VCID-gmr7-umz8-9fhm
summary Insufficient granularity of access control in the OOB-MSM for some Intel(R) Xeon(R) 6 Scalable processors may allow a privileged user to potentially enable escalation of privilege via adjacent access.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-22839
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05742
published_at 2026-04-11T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05666
published_at 2026-04-02T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05686
published_at 2026-04-16T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.0573
published_at 2026-04-13T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05735
published_at 2026-04-12T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05706
published_at 2026-04-04T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05699
published_at 2026-04-07T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05738
published_at 2026-04-08T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.05765
published_at 2026-04-09T12:55:00Z
9
value 0.00023
scoring_system epss
scoring_elements 0.06168
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-22839
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22839
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22839
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
reference_id 1110983
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
4
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01310.html
reference_id intel-sa-01310.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:L
1
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:A/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-12T19:09:05Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01310.html
5
reference_url https://usn.ubuntu.com/7866-1/
reference_id USN-7866-1
reference_type
scores
url https://usn.ubuntu.com/7866-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2025-22839
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gmr7-umz8-9fhm
32
url VCID-j4ak-hjn5-guat
vulnerability_id VCID-j4ak-hjn5-guat
summary microcode_ctl: Exposure of sensitive information
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-20623.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-20623.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-20623
reference_id
reference_type
scores
0
value 0.00097
scoring_system epss
scoring_elements 0.26666
published_at 2026-04-18T12:55:00Z
1
value 0.00097
scoring_system epss
scoring_elements 0.26788
published_at 2026-04-11T12:55:00Z
2
value 0.00097
scoring_system epss
scoring_elements 0.26743
published_at 2026-04-12T12:55:00Z
3
value 0.00097
scoring_system epss
scoring_elements 0.26686
published_at 2026-04-13T12:55:00Z
4
value 0.00097
scoring_system epss
scoring_elements 0.26695
published_at 2026-04-16T12:55:00Z
5
value 0.00097
scoring_system epss
scoring_elements 0.26838
published_at 2026-04-02T12:55:00Z
6
value 0.00097
scoring_system epss
scoring_elements 0.26879
published_at 2026-04-04T12:55:00Z
7
value 0.00097
scoring_system epss
scoring_elements 0.26665
published_at 2026-04-07T12:55:00Z
8
value 0.00097
scoring_system epss
scoring_elements 0.26734
published_at 2026-04-08T12:55:00Z
9
value 0.00097
scoring_system epss
scoring_elements 0.26784
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-20623
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20623
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172
reference_id 1105172
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366133
reference_id 2366133
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366133
6
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01247.html
reference_id intel-sa-01247.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value 5.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-14T15:10:08Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01247.html
7
reference_url https://access.redhat.com/errata/RHSA-2025:10101
reference_id RHSA-2025:10101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10101
8
reference_url https://access.redhat.com/errata/RHSA-2025:10102
reference_id RHSA-2025:10102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10102
9
reference_url https://access.redhat.com/errata/RHSA-2025:10103
reference_id RHSA-2025:10103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10103
10
reference_url https://access.redhat.com/errata/RHSA-2025:10107
reference_id RHSA-2025:10107
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10107
11
reference_url https://access.redhat.com/errata/RHSA-2025:10108
reference_id RHSA-2025:10108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10108
12
reference_url https://access.redhat.com/errata/RHSA-2025:10109
reference_id RHSA-2025:10109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10109
13
reference_url https://access.redhat.com/errata/RHSA-2025:10111
reference_id RHSA-2025:10111
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10111
14
reference_url https://access.redhat.com/errata/RHSA-2025:10126
reference_id RHSA-2025:10126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10126
15
reference_url https://access.redhat.com/errata/RHSA-2025:10162
reference_id RHSA-2025:10162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10162
16
reference_url https://access.redhat.com/errata/RHSA-2025:10991
reference_id RHSA-2025:10991
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10991
17
reference_url https://usn.ubuntu.com/7535-1/
reference_id USN-7535-1
reference_type
scores
url https://usn.ubuntu.com/7535-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2025-20623
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j4ak-hjn5-guat
33
url VCID-j6j9-vj4t-bfa6
vulnerability_id VCID-j6j9-vj4t-bfa6
summary Improper buffer restrictions for some Intel(R) Xeon(R) Processor firmware with SGX enabled may allow a privileged user to potentially enable escalation of privilege via local access.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-20053
reference_id
reference_type
scores
0
value 0.00013
scoring_system epss
scoring_elements 0.02098
published_at 2026-04-11T12:55:00Z
1
value 0.00013
scoring_system epss
scoring_elements 0.02101
published_at 2026-04-02T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.02053
published_at 2026-04-16T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.02079
published_at 2026-04-13T12:55:00Z
4
value 0.00013
scoring_system epss
scoring_elements 0.02084
published_at 2026-04-12T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.02108
published_at 2026-04-04T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.02103
published_at 2026-04-07T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.02104
published_at 2026-04-08T12:55:00Z
8
value 0.00013
scoring_system epss
scoring_elements 0.02122
published_at 2026-04-09T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02568
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-20053
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20053
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
reference_id 1110983
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
4
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01313.html
reference_id intel-sa-01313.html
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N
1
value 7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-12T18:24:39Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01313.html
5
reference_url https://usn.ubuntu.com/7866-1/
reference_id USN-7866-1
reference_type
scores
url https://usn.ubuntu.com/7866-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2025-20053
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j6j9-vj4t-bfa6
34
url VCID-jqnr-61tn-kben
vulnerability_id VCID-jqnr-61tn-kben
summary intel-microcode: Race conditions in some Intel(R) Processors
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-45733.json
reference_id
reference_type
scores
0
value 2.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-45733.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-45733
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03292
published_at 2026-04-02T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.03231
published_at 2026-04-18T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03266
published_at 2026-04-12T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.03245
published_at 2026-04-13T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03221
published_at 2026-04-16T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.03302
published_at 2026-04-04T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.03311
published_at 2026-04-07T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.03315
published_at 2026-04-08T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.03336
published_at 2026-04-09T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.03294
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-45733
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45733
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2292296
reference_id 2292296
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2292296
5
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01051.html
reference_id intel-sa-01051.html
reference_type
scores
0
value 2.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-24T16:02:23Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01051.html
6
reference_url https://access.redhat.com/errata/RHSA-2024:9401
reference_id RHSA-2024:9401
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9401
7
reference_url https://usn.ubuntu.com/6797-1/
reference_id USN-6797-1
reference_type
scores
url https://usn.ubuntu.com/6797-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
purl pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ues-wvyq-6qc9
1
vulnerability VCID-38q7-4ar3-sqcc
2
vulnerability VCID-3y3x-qqep-43ec
3
vulnerability VCID-4uuw-pm94-1kak
4
vulnerability VCID-51nr-8avm-qued
5
vulnerability VCID-5cgx-1n9u-gqbh
6
vulnerability VCID-5vkn-4rqc-qkbk
7
vulnerability VCID-6ake-v15c-k7aq
8
vulnerability VCID-6thk-vf9t-gygs
9
vulnerability VCID-75cx-avm7-tfcb
10
vulnerability VCID-7wcy-5hnc-tfh4
11
vulnerability VCID-8nyc-r2e4-17gr
12
vulnerability VCID-b55f-n1ed-g7eq
13
vulnerability VCID-eh71-uhnv-fqeb
14
vulnerability VCID-ejhc-6yqt-gkgv
15
vulnerability VCID-ejsj-eyej-huc6
16
vulnerability VCID-f859-13vd-7uef
17
vulnerability VCID-gmr7-umz8-9fhm
18
vulnerability VCID-j4ak-hjn5-guat
19
vulnerability VCID-j6j9-vj4t-bfa6
20
vulnerability VCID-kha2-8ez1-gfhr
21
vulnerability VCID-mekt-8gm1-33ej
22
vulnerability VCID-npgb-p786-d3fe
23
vulnerability VCID-qtg5-1dxw-sfdc
24
vulnerability VCID-qzcy-2xsr-vqeh
25
vulnerability VCID-r46f-12hj-7ybb
26
vulnerability VCID-t7rc-zadf-cybq
27
vulnerability VCID-t85u-116v-7uan
28
vulnerability VCID-vsda-kq13-73g1
29
vulnerability VCID-w7k1-y36j-3ye6
30
vulnerability VCID-wgce-vves-guek
31
vulnerability VCID-wqfe-hkrk-nbaj
32
vulnerability VCID-wv5f-6x7x-7fdw
33
vulnerability VCID-wyf3-shyh-qyhc
34
vulnerability VCID-zcxx-ra5c-hyh9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
aliases CVE-2023-45733
risk_score 1.2
exploitability 0.5
weighted_severity 2.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jqnr-61tn-kben
35
url VCID-jwaz-e1v9-uyep
vulnerability_id VCID-jwaz-e1v9-uyep
summary hw: cpu: Incomplete cleanup in specific special register read operations (aka SRBDS update)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21127.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21127.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21127
reference_id
reference_type
scores
0
value 0.00278
scoring_system epss
scoring_elements 0.5116
published_at 2026-04-02T12:55:00Z
1
value 0.00278
scoring_system epss
scoring_elements 0.51201
published_at 2026-04-13T12:55:00Z
2
value 0.00278
scoring_system epss
scoring_elements 0.51216
published_at 2026-04-12T12:55:00Z
3
value 0.00278
scoring_system epss
scoring_elements 0.51238
published_at 2026-04-11T12:55:00Z
4
value 0.00278
scoring_system epss
scoring_elements 0.51193
published_at 2026-04-09T12:55:00Z
5
value 0.00278
scoring_system epss
scoring_elements 0.51197
published_at 2026-04-08T12:55:00Z
6
value 0.00278
scoring_system epss
scoring_elements 0.51185
published_at 2026-04-04T12:55:00Z
7
value 0.00278
scoring_system epss
scoring_elements 0.51142
published_at 2026-04-07T12:55:00Z
8
value 0.00466
scoring_system epss
scoring_elements 0.64431
published_at 2026-04-18T12:55:00Z
9
value 0.00466
scoring_system epss
scoring_elements 0.6442
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21127
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url http://www.openwall.com/lists/oss-security/2022/06/16/1
reference_id 1
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:38Z/
url http://www.openwall.com/lists/oss-security/2022/06/16/1
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2090243
reference_id 2090243
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2090243
10
reference_url https://www.debian.org/security/2022/dsa-5178
reference_id dsa-5178
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:38Z/
url https://www.debian.org/security/2022/dsa-5178
11
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html
reference_id intel-sa-00615.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:38Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html
12
reference_url https://security.netapp.com/advisory/ntap-20220624-0008/
reference_id ntap-20220624-0008
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:38Z/
url https://security.netapp.com/advisory/ntap-20220624-0008/
13
reference_url https://usn.ubuntu.com/5486-1/
reference_id USN-5486-1
reference_type
scores
url https://usn.ubuntu.com/5486-1/
14
reference_url https://usn.ubuntu.com/5535-1/
reference_id USN-5535-1
reference_type
scores
url https://usn.ubuntu.com/5535-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
purl pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ues-wvyq-6qc9
1
vulnerability VCID-38q7-4ar3-sqcc
2
vulnerability VCID-3y3x-qqep-43ec
3
vulnerability VCID-4uuw-pm94-1kak
4
vulnerability VCID-51nr-8avm-qued
5
vulnerability VCID-5cgx-1n9u-gqbh
6
vulnerability VCID-5vkn-4rqc-qkbk
7
vulnerability VCID-6ake-v15c-k7aq
8
vulnerability VCID-6thk-vf9t-gygs
9
vulnerability VCID-75cx-avm7-tfcb
10
vulnerability VCID-7wcy-5hnc-tfh4
11
vulnerability VCID-8nyc-r2e4-17gr
12
vulnerability VCID-b55f-n1ed-g7eq
13
vulnerability VCID-eh71-uhnv-fqeb
14
vulnerability VCID-ejhc-6yqt-gkgv
15
vulnerability VCID-ejsj-eyej-huc6
16
vulnerability VCID-f859-13vd-7uef
17
vulnerability VCID-gmr7-umz8-9fhm
18
vulnerability VCID-j4ak-hjn5-guat
19
vulnerability VCID-j6j9-vj4t-bfa6
20
vulnerability VCID-kha2-8ez1-gfhr
21
vulnerability VCID-mekt-8gm1-33ej
22
vulnerability VCID-npgb-p786-d3fe
23
vulnerability VCID-qtg5-1dxw-sfdc
24
vulnerability VCID-qzcy-2xsr-vqeh
25
vulnerability VCID-r46f-12hj-7ybb
26
vulnerability VCID-t7rc-zadf-cybq
27
vulnerability VCID-t85u-116v-7uan
28
vulnerability VCID-vsda-kq13-73g1
29
vulnerability VCID-w7k1-y36j-3ye6
30
vulnerability VCID-wgce-vves-guek
31
vulnerability VCID-wqfe-hkrk-nbaj
32
vulnerability VCID-wv5f-6x7x-7fdw
33
vulnerability VCID-wyf3-shyh-qyhc
34
vulnerability VCID-zcxx-ra5c-hyh9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
aliases CVE-2022-21127
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jwaz-e1v9-uyep
36
url VCID-kha2-8ez1-gfhr
vulnerability_id VCID-kha2-8ez1-gfhr
summary Sequence of processor instructions leads to unexpected behavior for some Intel(R) Xeon(R) 6 Scalable processors may allow an authenticated user to potentially enable escalation of privilege via local access
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-22840
reference_id
reference_type
scores
0
value 8e-05
scoring_system epss
scoring_elements 0.00775
published_at 2026-04-09T12:55:00Z
1
value 8e-05
scoring_system epss
scoring_elements 0.0078
published_at 2026-04-08T12:55:00Z
2
value 8e-05
scoring_system epss
scoring_elements 0.00763
published_at 2026-04-16T12:55:00Z
3
value 8e-05
scoring_system epss
scoring_elements 0.00762
published_at 2026-04-12T12:55:00Z
4
value 8e-05
scoring_system epss
scoring_elements 0.00769
published_at 2026-04-11T12:55:00Z
5
value 8e-05
scoring_system epss
scoring_elements 0.00781
published_at 2026-04-07T12:55:00Z
6
value 9e-05
scoring_system epss
scoring_elements 0.00883
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-22840
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22840
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
reference_id 1110983
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
4
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01308.html
reference_id intel-sa-01308.html
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L
1
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-14T03:55:09Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01308.html
5
reference_url https://usn.ubuntu.com/7866-1/
reference_id USN-7866-1
reference_type
scores
url https://usn.ubuntu.com/7866-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2025-22840
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kha2-8ez1-gfhr
37
url VCID-mekt-8gm1-33ej
vulnerability_id VCID-mekt-8gm1-33ej
summary Observable discrepancy in RAPL interface for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-23984
reference_id
reference_type
scores
0
value 0.00037
scoring_system epss
scoring_elements 0.11054
published_at 2026-04-18T12:55:00Z
1
value 0.00037
scoring_system epss
scoring_elements 0.11238
published_at 2026-04-11T12:55:00Z
2
value 0.00037
scoring_system epss
scoring_elements 0.11206
published_at 2026-04-12T12:55:00Z
3
value 0.00037
scoring_system epss
scoring_elements 0.1118
published_at 2026-04-13T12:55:00Z
4
value 0.00037
scoring_system epss
scoring_elements 0.11045
published_at 2026-04-16T12:55:00Z
5
value 0.00037
scoring_system epss
scoring_elements 0.11217
published_at 2026-04-02T12:55:00Z
6
value 0.00037
scoring_system epss
scoring_elements 0.11279
published_at 2026-04-04T12:55:00Z
7
value 0.00037
scoring_system epss
scoring_elements 0.11093
published_at 2026-04-07T12:55:00Z
8
value 0.00037
scoring_system epss
scoring_elements 0.11172
published_at 2026-04-08T12:55:00Z
9
value 0.00037
scoring_system epss
scoring_elements 0.11228
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-23984
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23984
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1081363
reference_id 1081363
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1081363
4
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01103.html
reference_id intel-sa-01103.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value 6.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T17:27:46Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01103.html
5
reference_url https://usn.ubuntu.com/7033-1/
reference_id USN-7033-1
reference_type
scores
url https://usn.ubuntu.com/7033-1/
6
reference_url https://usn.ubuntu.com/7149-1/
reference_id USN-7149-1
reference_type
scores
url https://usn.ubuntu.com/7149-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2024-23984
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mekt-8gm1-33ej
38
url VCID-mu4u-d5mc-kbgk
vulnerability_id VCID-mu4u-d5mc-kbgk
summary Protection mechanism failure in some 3rd, 4th, and 5th Generation Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-24980
reference_id
reference_type
scores
0
value 0.00055
scoring_system epss
scoring_elements 0.1735
published_at 2026-04-18T12:55:00Z
1
value 0.00055
scoring_system epss
scoring_elements 0.175
published_at 2026-04-11T12:55:00Z
2
value 0.00055
scoring_system epss
scoring_elements 0.17453
published_at 2026-04-12T12:55:00Z
3
value 0.00055
scoring_system epss
scoring_elements 0.174
published_at 2026-04-13T12:55:00Z
4
value 0.00055
scoring_system epss
scoring_elements 0.17342
published_at 2026-04-16T12:55:00Z
5
value 0.00055
scoring_system epss
scoring_elements 0.17508
published_at 2026-04-02T12:55:00Z
6
value 0.00055
scoring_system epss
scoring_elements 0.17555
published_at 2026-04-04T12:55:00Z
7
value 0.00055
scoring_system epss
scoring_elements 0.17335
published_at 2026-04-07T12:55:00Z
8
value 0.00055
scoring_system epss
scoring_elements 0.17427
published_at 2026-04-08T12:55:00Z
9
value 0.00055
scoring_system epss
scoring_elements 0.17488
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-24980
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24980
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24980
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078742
reference_id 1078742
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078742
4
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01100.html
reference_id intel-sa-01100.html
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:L/VI:H/VA:N/SC:L/SI:H/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-14T13:59:03Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01100.html
5
reference_url https://usn.ubuntu.com/6967-1/
reference_id USN-6967-1
reference_type
scores
url https://usn.ubuntu.com/6967-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
purl pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ues-wvyq-6qc9
1
vulnerability VCID-38q7-4ar3-sqcc
2
vulnerability VCID-3y3x-qqep-43ec
3
vulnerability VCID-4uuw-pm94-1kak
4
vulnerability VCID-51nr-8avm-qued
5
vulnerability VCID-5cgx-1n9u-gqbh
6
vulnerability VCID-5vkn-4rqc-qkbk
7
vulnerability VCID-6ake-v15c-k7aq
8
vulnerability VCID-6thk-vf9t-gygs
9
vulnerability VCID-75cx-avm7-tfcb
10
vulnerability VCID-7wcy-5hnc-tfh4
11
vulnerability VCID-8nyc-r2e4-17gr
12
vulnerability VCID-b55f-n1ed-g7eq
13
vulnerability VCID-eh71-uhnv-fqeb
14
vulnerability VCID-ejhc-6yqt-gkgv
15
vulnerability VCID-ejsj-eyej-huc6
16
vulnerability VCID-f859-13vd-7uef
17
vulnerability VCID-gmr7-umz8-9fhm
18
vulnerability VCID-j4ak-hjn5-guat
19
vulnerability VCID-j6j9-vj4t-bfa6
20
vulnerability VCID-kha2-8ez1-gfhr
21
vulnerability VCID-mekt-8gm1-33ej
22
vulnerability VCID-npgb-p786-d3fe
23
vulnerability VCID-qtg5-1dxw-sfdc
24
vulnerability VCID-qzcy-2xsr-vqeh
25
vulnerability VCID-r46f-12hj-7ybb
26
vulnerability VCID-t7rc-zadf-cybq
27
vulnerability VCID-t85u-116v-7uan
28
vulnerability VCID-vsda-kq13-73g1
29
vulnerability VCID-w7k1-y36j-3ye6
30
vulnerability VCID-wgce-vves-guek
31
vulnerability VCID-wqfe-hkrk-nbaj
32
vulnerability VCID-wv5f-6x7x-7fdw
33
vulnerability VCID-wyf3-shyh-qyhc
34
vulnerability VCID-zcxx-ra5c-hyh9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
aliases CVE-2024-24980
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mu4u-d5mc-kbgk
39
url VCID-npgb-p786-d3fe
vulnerability_id VCID-npgb-p786-d3fe
summary microcode_ctl: Improper input validation in UEFI firmware
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43758.json
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43758.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-43758
reference_id
reference_type
scores
0
value 0.00022
scoring_system epss
scoring_elements 0.05807
published_at 2026-04-02T12:55:00Z
1
value 0.00022
scoring_system epss
scoring_elements 0.05832
published_at 2026-04-16T12:55:00Z
2
value 0.00022
scoring_system epss
scoring_elements 0.05884
published_at 2026-04-11T12:55:00Z
3
value 0.00022
scoring_system epss
scoring_elements 0.05874
published_at 2026-04-12T12:55:00Z
4
value 0.00022
scoring_system epss
scoring_elements 0.05867
published_at 2026-04-13T12:55:00Z
5
value 0.00022
scoring_system epss
scoring_elements 0.05843
published_at 2026-04-18T12:55:00Z
6
value 0.00022
scoring_system epss
scoring_elements 0.05838
published_at 2026-04-07T12:55:00Z
7
value 0.00022
scoring_system epss
scoring_elements 0.05877
published_at 2026-04-08T12:55:00Z
8
value 0.00022
scoring_system epss
scoring_elements 0.05903
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-43758
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43758
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43758
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
reference_id 1095805
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345416
reference_id 2345416
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2345416
5
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
reference_id intel-sa-01139.html
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-13T20:21:25Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2023-43758
risk_score 3.7
exploitability 0.5
weighted_severity 7.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-npgb-p786-d3fe
40
url VCID-p2fk-8snj-x7dy
vulnerability_id VCID-p2fk-8snj-x7dy
summary x86: Register File Data Sampling
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28746.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28746.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-28746
reference_id
reference_type
scores
0
value 0.00051
scoring_system epss
scoring_elements 0.15885
published_at 2026-04-02T12:55:00Z
1
value 0.00051
scoring_system epss
scoring_elements 0.15693
published_at 2026-04-18T12:55:00Z
2
value 0.00051
scoring_system epss
scoring_elements 0.15947
published_at 2026-04-04T12:55:00Z
3
value 0.00051
scoring_system epss
scoring_elements 0.15746
published_at 2026-04-07T12:55:00Z
4
value 0.00051
scoring_system epss
scoring_elements 0.15831
published_at 2026-04-08T12:55:00Z
5
value 0.00051
scoring_system epss
scoring_elements 0.15893
published_at 2026-04-09T12:55:00Z
6
value 0.00051
scoring_system epss
scoring_elements 0.15868
published_at 2026-04-11T12:55:00Z
7
value 0.00051
scoring_system epss
scoring_elements 0.1583
published_at 2026-04-12T12:55:00Z
8
value 0.00051
scoring_system epss
scoring_elements 0.15761
published_at 2026-04-13T12:55:00Z
9
value 0.00051
scoring_system epss
scoring_elements 0.15683
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-28746
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28746
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47233
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47233
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52429
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52429
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52434
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52435
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52447
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52447
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52458
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52458
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52482
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52486
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52488
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52489
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52491
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52491
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52492
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52493
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52493
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52497
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52497
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52498
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52583
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52587
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52587
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52594
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52595
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52597
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52598
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52599
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52600
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52601
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52602
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52603
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52604
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52606
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52607
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52614
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52614
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52615
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52616
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52617
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52618
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52619
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52620
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52622
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52623
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52627
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52627
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52635
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52637
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52642
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52644
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52650
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6270
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6270
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7042
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0340
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0565
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0607
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0841
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0841
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1151
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1151
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22099
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22099
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23849
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23849
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23850
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23850
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23851
58
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24857
59
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24858
60
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24861
61
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26581
62
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26593
63
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26600
64
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26601
65
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26602
66
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26606
67
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26610
68
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26614
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26614
69
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26615
70
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26622
71
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26625
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26625
72
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26627
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26627
73
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26635
74
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26636
75
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26640
76
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26641
77
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26642
78
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26643
79
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26644
80
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26645
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26645
81
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26651
82
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26654
83
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26659
84
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26663
85
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26664
86
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26665
87
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26671
88
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26673
89
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26675
90
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26679
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26679
91
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26684
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26684
92
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26685
93
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26687
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26687
94
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26688
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26688
95
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26689
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26689
96
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26695
97
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26696
98
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26697
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26697
99
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26698
100
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26702
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26702
101
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26704
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26704
102
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26707
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26707
103
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26712
104
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26722
105
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26727
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26727
106
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26733
107
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26735
108
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26736
109
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26743
110
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26744
111
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26747
112
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26748
113
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26749
114
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26751
115
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26752
116
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26753
117
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26754
118
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26763
119
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26764
120
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26766
121
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26771
122
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26772
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26772
123
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26773
124
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26776
125
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26777
126
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26778
127
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26779
128
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26781
129
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26782
130
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26787
131
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26788
132
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26790
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26790
133
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26791
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26791
134
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26793
135
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26795
136
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26801
137
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26804
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26804
138
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26805
139
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26808
140
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26809
141
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26810
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26810
142
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26812
143
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26813
144
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26814
145
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26816
146
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26817
147
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26820
148
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26825
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26825
149
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26833
150
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26835
151
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26839
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26839
152
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26840
153
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26843
154
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26845
155
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26846
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26846
156
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26851
157
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26852
158
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26855
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26855
159
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26857
160
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26859
161
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26861
162
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26862
163
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26863
164
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26870
165
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26872
166
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26874
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26874
167
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26875
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26875
168
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26877
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26877
169
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26878
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26878
170
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26880
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26880
171
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26882
172
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26883
173
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26884
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26884
174
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26885
175
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26889
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26889
176
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26891
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26891
177
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26894
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26894
178
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26895
179
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26897
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26897
180
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26898
181
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26901
182
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26903
183
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26906
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26906
184
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26907
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26907
185
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26910
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26910
186
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26917
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26917
187
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26922
188
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26923
189
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26924
190
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26925
191
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26926
192
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26931
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26931
193
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26934
194
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26935
195
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26937
196
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26950
197
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26951
198
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26955
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26955
199
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26956
200
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26957
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26957
201
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26958
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26958
202
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26960
203
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26961
204
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26965
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26965
205
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26966
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26966
206
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26969
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26969
207
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26970
208
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26973
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26973
209
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26974
210
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26976
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26976
211
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26978
212
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26981
213
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26984
214
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26988
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26988
215
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26993
216
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26994
217
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26997
218
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26999
219
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27000
220
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27001
221
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27004
222
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27008
223
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27013
224
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27020
225
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27024
226
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27025
227
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27028
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27028
228
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27030
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27030
229
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27038
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27038
230
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27043
231
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27044
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27044
232
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27045
233
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27046
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27046
234
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27047
235
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27051
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27051
236
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27052
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27052
237
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27053
238
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27059
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27059
239
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27065
240
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27073
241
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27074
242
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27075
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27075
243
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27076
244
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27077
245
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27078
246
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27388
247
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27437
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27437
248
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
249
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066108
reference_id 1066108
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066108
250
reference_url http://www.openwall.com/lists/oss-security/2024/03/12/13
reference_id 13
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/
url http://www.openwall.com/lists/oss-security/2024/03/12/13
251
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270700
reference_id 2270700
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270700
252
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK/
reference_id EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK/
253
reference_url https://security.gentoo.org/glsa/202409-10
reference_id GLSA-202409-10
reference_type
scores
url https://security.gentoo.org/glsa/202409-10
254
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H63LGAQXPEVJOES73U4XK65I6DASOAAG/
reference_id H63LGAQXPEVJOES73U4XK65I6DASOAAG
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H63LGAQXPEVJOES73U4XK65I6DASOAAG/
255
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00898.html
reference_id intel-sa-00898.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00898.html
256
reference_url https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html
reference_id msg00003.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/
url https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html
257
reference_url https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
reference_id msg00017.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/
url https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
258
reference_url https://access.redhat.com/errata/RHSA-2024:5101
reference_id RHSA-2024:5101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5101
259
reference_url https://access.redhat.com/errata/RHSA-2024:8157
reference_id RHSA-2024:8157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8157
260
reference_url https://access.redhat.com/errata/RHSA-2024:8158
reference_id RHSA-2024:8158
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8158
261
reference_url https://access.redhat.com/errata/RHSA-2024:8162
reference_id RHSA-2024:8162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8162
262
reference_url https://access.redhat.com/errata/RHSA-2024:9401
reference_id RHSA-2024:9401
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9401
263
reference_url https://usn.ubuntu.com/6797-1/
reference_id USN-6797-1
reference_type
scores
url https://usn.ubuntu.com/6797-1/
264
reference_url https://xenbits.xen.org/xsa/advisory-452.html
reference_id XSA-452
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-452.html
265
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/
reference_id ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
purl pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ues-wvyq-6qc9
1
vulnerability VCID-38q7-4ar3-sqcc
2
vulnerability VCID-3y3x-qqep-43ec
3
vulnerability VCID-4uuw-pm94-1kak
4
vulnerability VCID-51nr-8avm-qued
5
vulnerability VCID-5cgx-1n9u-gqbh
6
vulnerability VCID-5vkn-4rqc-qkbk
7
vulnerability VCID-6ake-v15c-k7aq
8
vulnerability VCID-6thk-vf9t-gygs
9
vulnerability VCID-75cx-avm7-tfcb
10
vulnerability VCID-7wcy-5hnc-tfh4
11
vulnerability VCID-8nyc-r2e4-17gr
12
vulnerability VCID-b55f-n1ed-g7eq
13
vulnerability VCID-eh71-uhnv-fqeb
14
vulnerability VCID-ejhc-6yqt-gkgv
15
vulnerability VCID-ejsj-eyej-huc6
16
vulnerability VCID-f859-13vd-7uef
17
vulnerability VCID-gmr7-umz8-9fhm
18
vulnerability VCID-j4ak-hjn5-guat
19
vulnerability VCID-j6j9-vj4t-bfa6
20
vulnerability VCID-kha2-8ez1-gfhr
21
vulnerability VCID-mekt-8gm1-33ej
22
vulnerability VCID-npgb-p786-d3fe
23
vulnerability VCID-qtg5-1dxw-sfdc
24
vulnerability VCID-qzcy-2xsr-vqeh
25
vulnerability VCID-r46f-12hj-7ybb
26
vulnerability VCID-t7rc-zadf-cybq
27
vulnerability VCID-t85u-116v-7uan
28
vulnerability VCID-vsda-kq13-73g1
29
vulnerability VCID-w7k1-y36j-3ye6
30
vulnerability VCID-wgce-vves-guek
31
vulnerability VCID-wqfe-hkrk-nbaj
32
vulnerability VCID-wv5f-6x7x-7fdw
33
vulnerability VCID-wyf3-shyh-qyhc
34
vulnerability VCID-zcxx-ra5c-hyh9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
aliases CVE-2023-28746, XSA-452
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p2fk-8snj-x7dy
41
url VCID-pgps-58ra-1ugy
vulnerability_id VCID-pgps-58ra-1ugy
summary kernel: Intel firmware update for Incorrect default permissions in some memory controller configurations
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-33196.json
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-33196.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-33196
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10313
published_at 2026-04-02T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.10228
published_at 2026-04-18T12:55:00Z
2
value 0.00035
scoring_system epss
scoring_elements 0.10408
published_at 2026-04-12T12:55:00Z
3
value 0.00035
scoring_system epss
scoring_elements 0.10386
published_at 2026-04-13T12:55:00Z
4
value 0.00035
scoring_system epss
scoring_elements 0.10257
published_at 2026-04-16T12:55:00Z
5
value 0.00035
scoring_system epss
scoring_elements 0.10378
published_at 2026-04-04T12:55:00Z
6
value 0.00035
scoring_system epss
scoring_elements 0.10279
published_at 2026-04-07T12:55:00Z
7
value 0.00035
scoring_system epss
scoring_elements 0.10353
published_at 2026-04-08T12:55:00Z
8
value 0.00035
scoring_system epss
scoring_elements 0.10419
published_at 2026-04-09T12:55:00Z
9
value 0.00035
scoring_system epss
scoring_elements 0.10448
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-33196
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33196
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031334
reference_id 1031334
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031334
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2171252
reference_id 2171252
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2171252
6
reference_url http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00738.html
reference_id intel-sa-00738.html
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-27T17:29:22Z/
url http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00738.html
7
reference_url https://access.redhat.com/errata/RHSA-2023:5209
reference_id RHSA-2023:5209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5209
8
reference_url https://usn.ubuntu.com/5886-1/
reference_id USN-5886-1
reference_type
scores
url https://usn.ubuntu.com/5886-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
purl pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ues-wvyq-6qc9
1
vulnerability VCID-38q7-4ar3-sqcc
2
vulnerability VCID-3y3x-qqep-43ec
3
vulnerability VCID-4uuw-pm94-1kak
4
vulnerability VCID-51nr-8avm-qued
5
vulnerability VCID-5cgx-1n9u-gqbh
6
vulnerability VCID-5vkn-4rqc-qkbk
7
vulnerability VCID-6ake-v15c-k7aq
8
vulnerability VCID-6thk-vf9t-gygs
9
vulnerability VCID-75cx-avm7-tfcb
10
vulnerability VCID-7wcy-5hnc-tfh4
11
vulnerability VCID-8nyc-r2e4-17gr
12
vulnerability VCID-b55f-n1ed-g7eq
13
vulnerability VCID-eh71-uhnv-fqeb
14
vulnerability VCID-ejhc-6yqt-gkgv
15
vulnerability VCID-ejsj-eyej-huc6
16
vulnerability VCID-f859-13vd-7uef
17
vulnerability VCID-gmr7-umz8-9fhm
18
vulnerability VCID-j4ak-hjn5-guat
19
vulnerability VCID-j6j9-vj4t-bfa6
20
vulnerability VCID-kha2-8ez1-gfhr
21
vulnerability VCID-mekt-8gm1-33ej
22
vulnerability VCID-npgb-p786-d3fe
23
vulnerability VCID-qtg5-1dxw-sfdc
24
vulnerability VCID-qzcy-2xsr-vqeh
25
vulnerability VCID-r46f-12hj-7ybb
26
vulnerability VCID-t7rc-zadf-cybq
27
vulnerability VCID-t85u-116v-7uan
28
vulnerability VCID-vsda-kq13-73g1
29
vulnerability VCID-w7k1-y36j-3ye6
30
vulnerability VCID-wgce-vves-guek
31
vulnerability VCID-wqfe-hkrk-nbaj
32
vulnerability VCID-wv5f-6x7x-7fdw
33
vulnerability VCID-wyf3-shyh-qyhc
34
vulnerability VCID-zcxx-ra5c-hyh9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
aliases CVE-2022-33196
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pgps-58ra-1ugy
42
url VCID-qtg5-1dxw-sfdc
vulnerability_id VCID-qtg5-1dxw-sfdc
summary microcode_ctl: Improper input validation in UEFI firmware CseVariableStorageSmm
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-29214.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-29214.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-29214
reference_id
reference_type
scores
0
value 0.00022
scoring_system epss
scoring_elements 0.05832
published_at 2026-04-16T12:55:00Z
1
value 0.00022
scoring_system epss
scoring_elements 0.05884
published_at 2026-04-11T12:55:00Z
2
value 0.00022
scoring_system epss
scoring_elements 0.05874
published_at 2026-04-12T12:55:00Z
3
value 0.00022
scoring_system epss
scoring_elements 0.05867
published_at 2026-04-13T12:55:00Z
4
value 0.00022
scoring_system epss
scoring_elements 0.05807
published_at 2026-04-02T12:55:00Z
5
value 0.00022
scoring_system epss
scoring_elements 0.05843
published_at 2026-04-18T12:55:00Z
6
value 0.00022
scoring_system epss
scoring_elements 0.05838
published_at 2026-04-07T12:55:00Z
7
value 0.00022
scoring_system epss
scoring_elements 0.05877
published_at 2026-04-08T12:55:00Z
8
value 0.00022
scoring_system epss
scoring_elements 0.05903
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-29214
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29214
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29214
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
reference_id 1095805
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345365
reference_id 2345365
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2345365
5
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
reference_id intel-sa-01139.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-13T15:17:24Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2024-29214
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qtg5-1dxw-sfdc
43
url VCID-qzcy-2xsr-vqeh
vulnerability_id VCID-qzcy-2xsr-vqeh
summary microcode_ctl: Improper input validation in UEFI firmware
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28127.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28127.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-28127
reference_id
reference_type
scores
0
value 0.00022
scoring_system epss
scoring_elements 0.05832
published_at 2026-04-16T12:55:00Z
1
value 0.00022
scoring_system epss
scoring_elements 0.05884
published_at 2026-04-11T12:55:00Z
2
value 0.00022
scoring_system epss
scoring_elements 0.05874
published_at 2026-04-12T12:55:00Z
3
value 0.00022
scoring_system epss
scoring_elements 0.05867
published_at 2026-04-13T12:55:00Z
4
value 0.00022
scoring_system epss
scoring_elements 0.05807
published_at 2026-04-02T12:55:00Z
5
value 0.00022
scoring_system epss
scoring_elements 0.05843
published_at 2026-04-18T12:55:00Z
6
value 0.00022
scoring_system epss
scoring_elements 0.05838
published_at 2026-04-07T12:55:00Z
7
value 0.00022
scoring_system epss
scoring_elements 0.05877
published_at 2026-04-08T12:55:00Z
8
value 0.00022
scoring_system epss
scoring_elements 0.05903
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-28127
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28127
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28127
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
reference_id 1095805
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345370
reference_id 2345370
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2345370
5
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
reference_id intel-sa-01139.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-13T15:16:50Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2024-28127
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qzcy-2xsr-vqeh
44
url VCID-r46f-12hj-7ybb
vulnerability_id VCID-r46f-12hj-7ybb
summary microcode_ctl: Denial of Service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-24968.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-24968.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-24968
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.12781
published_at 2026-04-18T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.12957
published_at 2026-04-11T12:55:00Z
2
value 0.00042
scoring_system epss
scoring_elements 0.12921
published_at 2026-04-12T12:55:00Z
3
value 0.00042
scoring_system epss
scoring_elements 0.12877
published_at 2026-04-13T12:55:00Z
4
value 0.00042
scoring_system epss
scoring_elements 0.12778
published_at 2026-04-16T12:55:00Z
5
value 0.00042
scoring_system epss
scoring_elements 0.13015
published_at 2026-04-02T12:55:00Z
6
value 0.00042
scoring_system epss
scoring_elements 0.13067
published_at 2026-04-04T12:55:00Z
7
value 0.00042
scoring_system epss
scoring_elements 0.12867
published_at 2026-04-07T12:55:00Z
8
value 0.00042
scoring_system epss
scoring_elements 0.12945
published_at 2026-04-08T12:55:00Z
9
value 0.00042
scoring_system epss
scoring_elements 0.12996
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-24968
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24968
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1081363
reference_id 1081363
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1081363
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2312594
reference_id 2312594
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2312594
6
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01097.html
reference_id intel-sa-01097.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H
1
value 5.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T17:28:45Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01097.html
7
reference_url https://access.redhat.com/errata/RHSA-2024:10528
reference_id RHSA-2024:10528
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10528
8
reference_url https://usn.ubuntu.com/7033-1/
reference_id USN-7033-1
reference_type
scores
url https://usn.ubuntu.com/7033-1/
9
reference_url https://usn.ubuntu.com/7149-1/
reference_id USN-7149-1
reference_type
scores
url https://usn.ubuntu.com/7149-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2024-24968
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r46f-12hj-7ybb
45
url VCID-t56a-46c7-fybe
vulnerability_id VCID-t56a-46c7-fybe
summary hw: Intel: 3rd Generation processors may allow information disclosure
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23908.json
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23908.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-23908
reference_id
reference_type
scores
0
value 0.00013
scoring_system epss
scoring_elements 0.02059
published_at 2026-04-02T12:55:00Z
1
value 0.00013
scoring_system epss
scoring_elements 0.02028
published_at 2026-04-18T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.02065
published_at 2026-04-04T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.02061
published_at 2026-04-07T12:55:00Z
4
value 0.00013
scoring_system epss
scoring_elements 0.02063
published_at 2026-04-08T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.0208
published_at 2026-04-09T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.02056
published_at 2026-04-11T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.02041
published_at 2026-04-12T12:55:00Z
8
value 0.00013
scoring_system epss
scoring_elements 0.02036
published_at 2026-04-13T12:55:00Z
9
value 0.00013
scoring_system epss
scoring_elements 0.02014
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-23908
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40982
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40982
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41804
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41804
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23908
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23908
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043305
reference_id 1043305
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043305
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2230675
reference_id 2230675
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2230675
8
reference_url https://www.debian.org/security/2023/dsa-5474
reference_id dsa-5474
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T13:35:03Z/
url https://www.debian.org/security/2023/dsa-5474
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/
reference_id HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T13:35:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/
10
reference_url http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00836.html
reference_id intel-sa-00836.html
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T13:35:03Z/
url http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00836.html
11
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html
reference_id msg00026.html
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T13:35:03Z/
url https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html
12
reference_url https://security.netapp.com/advisory/ntap-20230824-0003/
reference_id ntap-20230824-0003
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T13:35:03Z/
url https://security.netapp.com/advisory/ntap-20230824-0003/
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/
reference_id OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T13:35:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/
14
reference_url https://usn.ubuntu.com/6286-1/
reference_id USN-6286-1
reference_type
scores
url https://usn.ubuntu.com/6286-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
purl pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ues-wvyq-6qc9
1
vulnerability VCID-38q7-4ar3-sqcc
2
vulnerability VCID-3y3x-qqep-43ec
3
vulnerability VCID-4uuw-pm94-1kak
4
vulnerability VCID-51nr-8avm-qued
5
vulnerability VCID-5cgx-1n9u-gqbh
6
vulnerability VCID-5vkn-4rqc-qkbk
7
vulnerability VCID-6ake-v15c-k7aq
8
vulnerability VCID-6thk-vf9t-gygs
9
vulnerability VCID-75cx-avm7-tfcb
10
vulnerability VCID-7wcy-5hnc-tfh4
11
vulnerability VCID-8nyc-r2e4-17gr
12
vulnerability VCID-b55f-n1ed-g7eq
13
vulnerability VCID-eh71-uhnv-fqeb
14
vulnerability VCID-ejhc-6yqt-gkgv
15
vulnerability VCID-ejsj-eyej-huc6
16
vulnerability VCID-f859-13vd-7uef
17
vulnerability VCID-gmr7-umz8-9fhm
18
vulnerability VCID-j4ak-hjn5-guat
19
vulnerability VCID-j6j9-vj4t-bfa6
20
vulnerability VCID-kha2-8ez1-gfhr
21
vulnerability VCID-mekt-8gm1-33ej
22
vulnerability VCID-npgb-p786-d3fe
23
vulnerability VCID-qtg5-1dxw-sfdc
24
vulnerability VCID-qzcy-2xsr-vqeh
25
vulnerability VCID-r46f-12hj-7ybb
26
vulnerability VCID-t7rc-zadf-cybq
27
vulnerability VCID-t85u-116v-7uan
28
vulnerability VCID-vsda-kq13-73g1
29
vulnerability VCID-w7k1-y36j-3ye6
30
vulnerability VCID-wgce-vves-guek
31
vulnerability VCID-wqfe-hkrk-nbaj
32
vulnerability VCID-wv5f-6x7x-7fdw
33
vulnerability VCID-wyf3-shyh-qyhc
34
vulnerability VCID-zcxx-ra5c-hyh9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
aliases CVE-2023-23908
risk_score 2.7
exploitability 0.5
weighted_severity 5.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t56a-46c7-fybe
46
url VCID-t7rc-zadf-cybq
vulnerability_id VCID-t7rc-zadf-cybq
summary microcode_ctl: Improper input validation in UEFI firmware
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28047.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28047.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-28047
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.0161
published_at 2026-04-18T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01609
published_at 2026-04-12T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.01607
published_at 2026-04-13T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01596
published_at 2026-04-16T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.01499
published_at 2026-04-02T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.01502
published_at 2026-04-04T12:55:00Z
6
value 0.00012
scoring_system epss
scoring_elements 0.01624
published_at 2026-04-07T12:55:00Z
7
value 0.00012
scoring_system epss
scoring_elements 0.01625
published_at 2026-04-08T12:55:00Z
8
value 0.00012
scoring_system epss
scoring_elements 0.01632
published_at 2026-04-09T12:55:00Z
9
value 0.00012
scoring_system epss
scoring_elements 0.01618
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-28047
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28047
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
reference_id 1095805
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345363
reference_id 2345363
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2345363
5
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
reference_id intel-sa-01139.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value 6.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T15:04:18Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
6
reference_url https://access.redhat.com/errata/RHSA-2025:7043
reference_id RHSA-2025:7043
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7043
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2024-28047
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t7rc-zadf-cybq
47
url VCID-t85u-116v-7uan
vulnerability_id VCID-t85u-116v-7uan
summary microcode_ctl: Improper input validation in XmlCli feature for UEFI firmware
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-24582.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-24582.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-24582
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.0338
published_at 2026-04-18T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03416
published_at 2026-04-12T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.03392
published_at 2026-04-13T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.03369
published_at 2026-04-16T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.03435
published_at 2026-04-02T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03449
published_at 2026-04-04T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.03462
published_at 2026-04-07T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03465
published_at 2026-04-08T12:55:00Z
8
value 0.00016
scoring_system epss
scoring_elements 0.03488
published_at 2026-04-09T12:55:00Z
9
value 0.00016
scoring_system epss
scoring_elements 0.03445
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-24582
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24582
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
reference_id 1095805
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345376
reference_id 2345376
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2345376
5
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
reference_id intel-sa-01139.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-13T19:49:18Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2024-24582
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t85u-116v-7uan
48
url VCID-td6e-x2qb-syg3
vulnerability_id VCID-td6e-x2qb-syg3
summary x86: MMIO Stale Data vulnerabilities
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21125.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21125.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21125
reference_id
reference_type
scores
0
value 0.00242
scoring_system epss
scoring_elements 0.47421
published_at 2026-04-02T12:55:00Z
1
value 0.00242
scoring_system epss
scoring_elements 0.47447
published_at 2026-04-13T12:55:00Z
2
value 0.00242
scoring_system epss
scoring_elements 0.47466
published_at 2026-04-11T12:55:00Z
3
value 0.00242
scoring_system epss
scoring_elements 0.47443
published_at 2026-04-09T12:55:00Z
4
value 0.00242
scoring_system epss
scoring_elements 0.47446
published_at 2026-04-08T12:55:00Z
5
value 0.00242
scoring_system epss
scoring_elements 0.47441
published_at 2026-04-12T12:55:00Z
6
value 0.00242
scoring_system epss
scoring_elements 0.47391
published_at 2026-04-07T12:55:00Z
7
value 0.00536
scoring_system epss
scoring_elements 0.67511
published_at 2026-04-18T12:55:00Z
8
value 0.00536
scoring_system epss
scoring_elements 0.67499
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21125
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
46
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
47
reference_url http://www.openwall.com/lists/oss-security/2022/06/16/1
reference_id 1
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/
url http://www.openwall.com/lists/oss-security/2022/06/16/1
48
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2090240
reference_id 2090240
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2090240
49
reference_url http://xenbits.xen.org/xsa/advisory-404.html
reference_id advisory-404.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/
url http://xenbits.xen.org/xsa/advisory-404.html
50
reference_url https://www.debian.org/security/2022/dsa-5173
reference_id dsa-5173
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/
url https://www.debian.org/security/2022/dsa-5173
51
reference_url https://www.debian.org/security/2022/dsa-5178
reference_id dsa-5178
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/
url https://www.debian.org/security/2022/dsa-5178
52
reference_url https://www.debian.org/security/2022/dsa-5184
reference_id dsa-5184
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/
url https://www.debian.org/security/2022/dsa-5184
53
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV/
reference_id FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV/
54
reference_url https://security.gentoo.org/glsa/202208-23
reference_id GLSA-202208-23
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/
url https://security.gentoo.org/glsa/202208-23
55
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html
reference_id intel-sa-00615.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html
56
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS/
reference_id MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS/
57
reference_url https://security.netapp.com/advisory/ntap-20220624-0008/
reference_id ntap-20220624-0008
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/
url https://security.netapp.com/advisory/ntap-20220624-0008/
58
reference_url https://access.redhat.com/errata/RHSA-2022:5937
reference_id RHSA-2022:5937
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5937
59
reference_url https://access.redhat.com/errata/RHSA-2022:5939
reference_id RHSA-2022:5939
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5939
60
reference_url https://access.redhat.com/errata/RHSA-2022:6437
reference_id RHSA-2022:6437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6437
61
reference_url https://access.redhat.com/errata/RHSA-2022:6460
reference_id RHSA-2022:6460
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6460
62
reference_url https://access.redhat.com/errata/RHSA-2022:6872
reference_id RHSA-2022:6872
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6872
63
reference_url https://access.redhat.com/errata/RHSA-2022:6983
reference_id RHSA-2022:6983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6983
64
reference_url https://access.redhat.com/errata/RHSA-2022:6991
reference_id RHSA-2022:6991
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6991
65
reference_url https://access.redhat.com/errata/RHSA-2022:7279
reference_id RHSA-2022:7279
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7279
66
reference_url https://access.redhat.com/errata/RHSA-2022:7280
reference_id RHSA-2022:7280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7280
67
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
68
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
69
reference_url https://access.redhat.com/errata/RHSA-2022:8973
reference_id RHSA-2022:8973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8973
70
reference_url https://access.redhat.com/errata/RHSA-2022:8974
reference_id RHSA-2022:8974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8974
71
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/
reference_id RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/
72
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA/
reference_id T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA/
73
reference_url https://usn.ubuntu.com/5484-1/
reference_id USN-5484-1
reference_type
scores
url https://usn.ubuntu.com/5484-1/
74
reference_url https://usn.ubuntu.com/5485-1/
reference_id USN-5485-1
reference_type
scores
url https://usn.ubuntu.com/5485-1/
75
reference_url https://usn.ubuntu.com/5485-2/
reference_id USN-5485-2
reference_type
scores
url https://usn.ubuntu.com/5485-2/
76
reference_url https://usn.ubuntu.com/5505-1/
reference_id USN-5505-1
reference_type
scores
url https://usn.ubuntu.com/5505-1/
77
reference_url https://usn.ubuntu.com/5513-1/
reference_id USN-5513-1
reference_type
scores
url https://usn.ubuntu.com/5513-1/
78
reference_url https://usn.ubuntu.com/5529-1/
reference_id USN-5529-1
reference_type
scores
url https://usn.ubuntu.com/5529-1/
79
reference_url https://usn.ubuntu.com/5535-1/
reference_id USN-5535-1
reference_type
scores
url https://usn.ubuntu.com/5535-1/
80
reference_url https://xenbits.xen.org/xsa/advisory-404.html
reference_id XSA-404
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-404.html
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
purl pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ues-wvyq-6qc9
1
vulnerability VCID-38q7-4ar3-sqcc
2
vulnerability VCID-3y3x-qqep-43ec
3
vulnerability VCID-4uuw-pm94-1kak
4
vulnerability VCID-51nr-8avm-qued
5
vulnerability VCID-5cgx-1n9u-gqbh
6
vulnerability VCID-5vkn-4rqc-qkbk
7
vulnerability VCID-6ake-v15c-k7aq
8
vulnerability VCID-6thk-vf9t-gygs
9
vulnerability VCID-75cx-avm7-tfcb
10
vulnerability VCID-7wcy-5hnc-tfh4
11
vulnerability VCID-8nyc-r2e4-17gr
12
vulnerability VCID-b55f-n1ed-g7eq
13
vulnerability VCID-eh71-uhnv-fqeb
14
vulnerability VCID-ejhc-6yqt-gkgv
15
vulnerability VCID-ejsj-eyej-huc6
16
vulnerability VCID-f859-13vd-7uef
17
vulnerability VCID-gmr7-umz8-9fhm
18
vulnerability VCID-j4ak-hjn5-guat
19
vulnerability VCID-j6j9-vj4t-bfa6
20
vulnerability VCID-kha2-8ez1-gfhr
21
vulnerability VCID-mekt-8gm1-33ej
22
vulnerability VCID-npgb-p786-d3fe
23
vulnerability VCID-qtg5-1dxw-sfdc
24
vulnerability VCID-qzcy-2xsr-vqeh
25
vulnerability VCID-r46f-12hj-7ybb
26
vulnerability VCID-t7rc-zadf-cybq
27
vulnerability VCID-t85u-116v-7uan
28
vulnerability VCID-vsda-kq13-73g1
29
vulnerability VCID-w7k1-y36j-3ye6
30
vulnerability VCID-wgce-vves-guek
31
vulnerability VCID-wqfe-hkrk-nbaj
32
vulnerability VCID-wv5f-6x7x-7fdw
33
vulnerability VCID-wyf3-shyh-qyhc
34
vulnerability VCID-zcxx-ra5c-hyh9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
aliases CVE-2022-21125
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-td6e-x2qb-syg3
49
url VCID-trxm-8mg3-4bbr
vulnerability_id VCID-trxm-8mg3-4bbr
summary x86/Intel: Gather Data Sampling
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-40982.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-40982.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-40982
reference_id
reference_type
scores
0
value 0.00853
scoring_system epss
scoring_elements 0.74964
published_at 2026-04-18T12:55:00Z
1
value 0.00853
scoring_system epss
scoring_elements 0.7488
published_at 2026-04-02T12:55:00Z
2
value 0.00853
scoring_system epss
scoring_elements 0.74909
published_at 2026-04-04T12:55:00Z
3
value 0.00853
scoring_system epss
scoring_elements 0.74883
published_at 2026-04-07T12:55:00Z
4
value 0.00853
scoring_system epss
scoring_elements 0.74916
published_at 2026-04-08T12:55:00Z
5
value 0.00853
scoring_system epss
scoring_elements 0.74929
published_at 2026-04-09T12:55:00Z
6
value 0.00853
scoring_system epss
scoring_elements 0.74952
published_at 2026-04-11T12:55:00Z
7
value 0.00853
scoring_system epss
scoring_elements 0.7493
published_at 2026-04-12T12:55:00Z
8
value 0.00853
scoring_system epss
scoring_elements 0.74921
published_at 2026-04-13T12:55:00Z
9
value 0.00853
scoring_system epss
scoring_elements 0.74957
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-40982
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40982
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40982
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41804
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41804
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20569
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20569
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23908
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23908
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043305
reference_id 1043305
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043305
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2223949
reference_id 2223949
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2223949
9
reference_url https://access.redhat.com/solutions/7027704
reference_id 7027704
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/
url https://access.redhat.com/solutions/7027704
10
reference_url https://aws.amazon.com/security/security-bulletins/AWS-2023-007/
reference_id AWS-2023-007
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/
url https://aws.amazon.com/security/security-bulletins/AWS-2023-007/
11
reference_url https://downfall.page
reference_id downfall.page
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/
url https://downfall.page
12
reference_url https://www.debian.org/security/2023/dsa-5474
reference_id dsa-5474
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/
url https://www.debian.org/security/2023/dsa-5474
13
reference_url https://www.debian.org/security/2023/dsa-5475
reference_id dsa-5475
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/
url https://www.debian.org/security/2023/dsa-5475
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/
reference_id HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/
reference_id HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/
16
reference_url http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00828.html
reference_id intel-sa-00828.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/
url http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00828.html
17
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html
reference_id msg00013.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/
url https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html
18
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html
reference_id msg00026.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/
url https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html
19
reference_url https://security.netapp.com/advisory/ntap-20230811-0001/
reference_id ntap-20230811-0001
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/
url https://security.netapp.com/advisory/ntap-20230811-0001/
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/
reference_id OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/
21
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
22
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
23
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
24
reference_url https://access.redhat.com/errata/RHSA-2023:7370
reference_id RHSA-2023:7370
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7370
25
reference_url https://access.redhat.com/errata/RHSA-2023:7379
reference_id RHSA-2023:7379
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7379
26
reference_url https://access.redhat.com/errata/RHSA-2023:7423
reference_id RHSA-2023:7423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7423
27
reference_url https://access.redhat.com/errata/RHSA-2023:7424
reference_id RHSA-2023:7424
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7424
28
reference_url https://access.redhat.com/errata/RHSA-2023:7539
reference_id RHSA-2023:7539
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7539
29
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
30
reference_url https://access.redhat.com/errata/RHSA-2024:0562
reference_id RHSA-2024:0562
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0562
31
reference_url https://access.redhat.com/errata/RHSA-2024:0563
reference_id RHSA-2024:0563
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0563
32
reference_url https://access.redhat.com/errata/RHSA-2024:1250
reference_id RHSA-2024:1250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1250
33
reference_url https://access.redhat.com/errata/RHSA-2024:1268
reference_id RHSA-2024:1268
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1268
34
reference_url https://access.redhat.com/errata/RHSA-2024:1269
reference_id RHSA-2024:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1269
35
reference_url https://access.redhat.com/errata/RHSA-2024:1306
reference_id RHSA-2024:1306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1306
36
reference_url https://access.redhat.com/errata/RHSA-2024:3319
reference_id RHSA-2024:3319
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3319
37
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/
reference_id T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/
38
reference_url https://usn.ubuntu.com/6286-1/
reference_id USN-6286-1
reference_type
scores
url https://usn.ubuntu.com/6286-1/
39
reference_url https://usn.ubuntu.com/6315-1/
reference_id USN-6315-1
reference_type
scores
url https://usn.ubuntu.com/6315-1/
40
reference_url https://usn.ubuntu.com/6316-1/
reference_id USN-6316-1
reference_type
scores
url https://usn.ubuntu.com/6316-1/
41
reference_url https://usn.ubuntu.com/6317-1/
reference_id USN-6317-1
reference_type
scores
url https://usn.ubuntu.com/6317-1/
42
reference_url https://usn.ubuntu.com/6318-1/
reference_id USN-6318-1
reference_type
scores
url https://usn.ubuntu.com/6318-1/
43
reference_url https://usn.ubuntu.com/6321-1/
reference_id USN-6321-1
reference_type
scores
url https://usn.ubuntu.com/6321-1/
44
reference_url https://usn.ubuntu.com/6324-1/
reference_id USN-6324-1
reference_type
scores
url https://usn.ubuntu.com/6324-1/
45
reference_url https://usn.ubuntu.com/6325-1/
reference_id USN-6325-1
reference_type
scores
url https://usn.ubuntu.com/6325-1/
46
reference_url https://usn.ubuntu.com/6328-1/
reference_id USN-6328-1
reference_type
scores
url https://usn.ubuntu.com/6328-1/
47
reference_url https://usn.ubuntu.com/6329-1/
reference_id USN-6329-1
reference_type
scores
url https://usn.ubuntu.com/6329-1/
48
reference_url https://usn.ubuntu.com/6330-1/
reference_id USN-6330-1
reference_type
scores
url https://usn.ubuntu.com/6330-1/
49
reference_url https://usn.ubuntu.com/6331-1/
reference_id USN-6331-1
reference_type
scores
url https://usn.ubuntu.com/6331-1/
50
reference_url https://usn.ubuntu.com/6332-1/
reference_id USN-6332-1
reference_type
scores
url https://usn.ubuntu.com/6332-1/
51
reference_url https://usn.ubuntu.com/6346-1/
reference_id USN-6346-1
reference_type
scores
url https://usn.ubuntu.com/6346-1/
52
reference_url https://usn.ubuntu.com/6348-1/
reference_id USN-6348-1
reference_type
scores
url https://usn.ubuntu.com/6348-1/
53
reference_url https://usn.ubuntu.com/6357-1/
reference_id USN-6357-1
reference_type
scores
url https://usn.ubuntu.com/6357-1/
54
reference_url https://usn.ubuntu.com/6388-1/
reference_id USN-6388-1
reference_type
scores
url https://usn.ubuntu.com/6388-1/
55
reference_url https://usn.ubuntu.com/6396-1/
reference_id USN-6396-1
reference_type
scores
url https://usn.ubuntu.com/6396-1/
56
reference_url https://usn.ubuntu.com/6396-2/
reference_id USN-6396-2
reference_type
scores
url https://usn.ubuntu.com/6396-2/
57
reference_url https://usn.ubuntu.com/6396-3/
reference_id USN-6396-3
reference_type
scores
url https://usn.ubuntu.com/6396-3/
58
reference_url https://usn.ubuntu.com/6397-1/
reference_id USN-6397-1
reference_type
scores
url https://usn.ubuntu.com/6397-1/
59
reference_url https://xenbits.xen.org/xsa/advisory-435.html
reference_id XSA-435
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/
url https://xenbits.xen.org/xsa/advisory-435.html
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
purl pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ues-wvyq-6qc9
1
vulnerability VCID-38q7-4ar3-sqcc
2
vulnerability VCID-3y3x-qqep-43ec
3
vulnerability VCID-4uuw-pm94-1kak
4
vulnerability VCID-51nr-8avm-qued
5
vulnerability VCID-5cgx-1n9u-gqbh
6
vulnerability VCID-5vkn-4rqc-qkbk
7
vulnerability VCID-6ake-v15c-k7aq
8
vulnerability VCID-6thk-vf9t-gygs
9
vulnerability VCID-75cx-avm7-tfcb
10
vulnerability VCID-7wcy-5hnc-tfh4
11
vulnerability VCID-8nyc-r2e4-17gr
12
vulnerability VCID-b55f-n1ed-g7eq
13
vulnerability VCID-eh71-uhnv-fqeb
14
vulnerability VCID-ejhc-6yqt-gkgv
15
vulnerability VCID-ejsj-eyej-huc6
16
vulnerability VCID-f859-13vd-7uef
17
vulnerability VCID-gmr7-umz8-9fhm
18
vulnerability VCID-j4ak-hjn5-guat
19
vulnerability VCID-j6j9-vj4t-bfa6
20
vulnerability VCID-kha2-8ez1-gfhr
21
vulnerability VCID-mekt-8gm1-33ej
22
vulnerability VCID-npgb-p786-d3fe
23
vulnerability VCID-qtg5-1dxw-sfdc
24
vulnerability VCID-qzcy-2xsr-vqeh
25
vulnerability VCID-r46f-12hj-7ybb
26
vulnerability VCID-t7rc-zadf-cybq
27
vulnerability VCID-t85u-116v-7uan
28
vulnerability VCID-vsda-kq13-73g1
29
vulnerability VCID-w7k1-y36j-3ye6
30
vulnerability VCID-wgce-vves-guek
31
vulnerability VCID-wqfe-hkrk-nbaj
32
vulnerability VCID-wv5f-6x7x-7fdw
33
vulnerability VCID-wyf3-shyh-qyhc
34
vulnerability VCID-zcxx-ra5c-hyh9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
aliases CVE-2022-40982, XSA-435
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-trxm-8mg3-4bbr
50
url VCID-uj7d-tpax-fqhd
vulnerability_id VCID-uj7d-tpax-fqhd
summary kernel: local privilege escalation on Intel microcode on Intel(R) Xeon(R)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22655.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22655.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22655
reference_id
reference_type
scores
0
value 0.00032
scoring_system epss
scoring_elements 0.09099
published_at 2026-04-02T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.09012
published_at 2026-04-18T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.09152
published_at 2026-04-12T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.09072
published_at 2026-04-07T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.09183
published_at 2026-04-09T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.09185
published_at 2026-04-11T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09138
published_at 2026-04-13T12:55:00Z
7
value 0.00032
scoring_system epss
scoring_elements 0.09032
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22655
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22655
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066108
reference_id 1066108
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066108
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270698
reference_id 2270698
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270698
6
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00960.html
reference_id intel-sa-00960.html
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-14T18:28:48Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00960.html
7
reference_url https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html
reference_id msg00003.html
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-14T18:28:48Z/
url https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html
8
reference_url https://security.netapp.com/advisory/ntap-20240405-0006/
reference_id ntap-20240405-0006
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-14T18:28:48Z/
url https://security.netapp.com/advisory/ntap-20240405-0006/
9
reference_url https://access.redhat.com/errata/RHSA-2024:9401
reference_id RHSA-2024:9401
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9401
10
reference_url https://usn.ubuntu.com/6797-1/
reference_id USN-6797-1
reference_type
scores
url https://usn.ubuntu.com/6797-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
purl pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ues-wvyq-6qc9
1
vulnerability VCID-38q7-4ar3-sqcc
2
vulnerability VCID-3y3x-qqep-43ec
3
vulnerability VCID-4uuw-pm94-1kak
4
vulnerability VCID-51nr-8avm-qued
5
vulnerability VCID-5cgx-1n9u-gqbh
6
vulnerability VCID-5vkn-4rqc-qkbk
7
vulnerability VCID-6ake-v15c-k7aq
8
vulnerability VCID-6thk-vf9t-gygs
9
vulnerability VCID-75cx-avm7-tfcb
10
vulnerability VCID-7wcy-5hnc-tfh4
11
vulnerability VCID-8nyc-r2e4-17gr
12
vulnerability VCID-b55f-n1ed-g7eq
13
vulnerability VCID-eh71-uhnv-fqeb
14
vulnerability VCID-ejhc-6yqt-gkgv
15
vulnerability VCID-ejsj-eyej-huc6
16
vulnerability VCID-f859-13vd-7uef
17
vulnerability VCID-gmr7-umz8-9fhm
18
vulnerability VCID-j4ak-hjn5-guat
19
vulnerability VCID-j6j9-vj4t-bfa6
20
vulnerability VCID-kha2-8ez1-gfhr
21
vulnerability VCID-mekt-8gm1-33ej
22
vulnerability VCID-npgb-p786-d3fe
23
vulnerability VCID-qtg5-1dxw-sfdc
24
vulnerability VCID-qzcy-2xsr-vqeh
25
vulnerability VCID-r46f-12hj-7ybb
26
vulnerability VCID-t7rc-zadf-cybq
27
vulnerability VCID-t85u-116v-7uan
28
vulnerability VCID-vsda-kq13-73g1
29
vulnerability VCID-w7k1-y36j-3ye6
30
vulnerability VCID-wgce-vves-guek
31
vulnerability VCID-wqfe-hkrk-nbaj
32
vulnerability VCID-wv5f-6x7x-7fdw
33
vulnerability VCID-wyf3-shyh-qyhc
34
vulnerability VCID-zcxx-ra5c-hyh9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
aliases CVE-2023-22655
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uj7d-tpax-fqhd
51
url VCID-vsda-kq13-73g1
vulnerability_id VCID-vsda-kq13-73g1
summary microcode_ctl: Improper input validation in UEFI firmware
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34440.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34440.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-34440
reference_id
reference_type
scores
0
value 0.00022
scoring_system epss
scoring_elements 0.05832
published_at 2026-04-16T12:55:00Z
1
value 0.00022
scoring_system epss
scoring_elements 0.05884
published_at 2026-04-11T12:55:00Z
2
value 0.00022
scoring_system epss
scoring_elements 0.05874
published_at 2026-04-12T12:55:00Z
3
value 0.00022
scoring_system epss
scoring_elements 0.05867
published_at 2026-04-13T12:55:00Z
4
value 0.00022
scoring_system epss
scoring_elements 0.05807
published_at 2026-04-02T12:55:00Z
5
value 0.00022
scoring_system epss
scoring_elements 0.05843
published_at 2026-04-18T12:55:00Z
6
value 0.00022
scoring_system epss
scoring_elements 0.05838
published_at 2026-04-07T12:55:00Z
7
value 0.00022
scoring_system epss
scoring_elements 0.05877
published_at 2026-04-08T12:55:00Z
8
value 0.00022
scoring_system epss
scoring_elements 0.05903
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-34440
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34440
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
reference_id 1095805
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345401
reference_id 2345401
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2345401
5
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
reference_id intel-sa-01139.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-13T20:21:01Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2023-34440
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vsda-kq13-73g1
52
url VCID-w7k1-y36j-3ye6
vulnerability_id VCID-w7k1-y36j-3ye6
summary kernel: microcode_ctl: From CVEorg collector
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21853.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21853.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21853
reference_id
reference_type
scores
0
value 0.00032
scoring_system epss
scoring_elements 0.09067
published_at 2026-04-18T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.09235
published_at 2026-04-09T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.09238
published_at 2026-04-11T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.09192
published_at 2026-04-13T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.09087
published_at 2026-04-16T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.09149
published_at 2026-04-02T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09202
published_at 2026-04-04T12:55:00Z
7
value 0.00032
scoring_system epss
scoring_elements 0.09126
published_at 2026-04-07T12:55:00Z
8
value 0.00032
scoring_system epss
scoring_elements 0.09206
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21853
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21853
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21853
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087532
reference_id 1087532
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087532
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2326074
reference_id 2326074
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2326074
6
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01101.html
reference_id intel-sa-01101.html
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value 5.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-13T21:13:32Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01101.html
7
reference_url https://usn.ubuntu.com/7149-1/
reference_id USN-7149-1
reference_type
scores
url https://usn.ubuntu.com/7149-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2024-21853
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w7k1-y36j-3ye6
53
url VCID-wgce-vves-guek
vulnerability_id VCID-wgce-vves-guek
summary kernel: microcode_ctl: From CVEorg collector
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31068.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31068.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-31068
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.03843
published_at 2026-04-18T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.03899
published_at 2026-04-11T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.0388
published_at 2026-04-12T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.03854
published_at 2026-04-13T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.03833
published_at 2026-04-16T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.03877
published_at 2026-04-02T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.03886
published_at 2026-04-04T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.039
published_at 2026-04-07T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.03905
published_at 2026-04-08T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.0393
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-31068
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31068
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
reference_id 1095805
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345359
reference_id 2345359
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2345359
6
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01166.html
reference_id intel-sa-01166.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H
1
value 5.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T15:07:29Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01166.html
7
reference_url https://usn.ubuntu.com/7269-1/
reference_id USN-7269-1
reference_type
scores
url https://usn.ubuntu.com/7269-1/
8
reference_url https://usn.ubuntu.com/7269-2/
reference_id USN-7269-2
reference_type
scores
url https://usn.ubuntu.com/7269-2/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2024-31068
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wgce-vves-guek
54
url VCID-wqfe-hkrk-nbaj
vulnerability_id VCID-wqfe-hkrk-nbaj
summary microcode_ctl: Exposure of sensitive information
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-43420.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-43420.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-43420
reference_id
reference_type
scores
0
value 0.00097
scoring_system epss
scoring_elements 0.26666
published_at 2026-04-18T12:55:00Z
1
value 0.00097
scoring_system epss
scoring_elements 0.26788
published_at 2026-04-11T12:55:00Z
2
value 0.00097
scoring_system epss
scoring_elements 0.26743
published_at 2026-04-12T12:55:00Z
3
value 0.00097
scoring_system epss
scoring_elements 0.26686
published_at 2026-04-13T12:55:00Z
4
value 0.00097
scoring_system epss
scoring_elements 0.26695
published_at 2026-04-16T12:55:00Z
5
value 0.00097
scoring_system epss
scoring_elements 0.26838
published_at 2026-04-02T12:55:00Z
6
value 0.00097
scoring_system epss
scoring_elements 0.26879
published_at 2026-04-04T12:55:00Z
7
value 0.00097
scoring_system epss
scoring_elements 0.26665
published_at 2026-04-07T12:55:00Z
8
value 0.00097
scoring_system epss
scoring_elements 0.26734
published_at 2026-04-08T12:55:00Z
9
value 0.00097
scoring_system epss
scoring_elements 0.26784
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-43420
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43420
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43420
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172
reference_id 1105172
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366159
reference_id 2366159
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366159
6
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01247.html
reference_id intel-sa-01247.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value 5.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-14T13:59:10Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01247.html
7
reference_url https://access.redhat.com/errata/RHSA-2025:10101
reference_id RHSA-2025:10101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10101
8
reference_url https://access.redhat.com/errata/RHSA-2025:10102
reference_id RHSA-2025:10102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10102
9
reference_url https://access.redhat.com/errata/RHSA-2025:10103
reference_id RHSA-2025:10103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10103
10
reference_url https://access.redhat.com/errata/RHSA-2025:10107
reference_id RHSA-2025:10107
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10107
11
reference_url https://access.redhat.com/errata/RHSA-2025:10108
reference_id RHSA-2025:10108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10108
12
reference_url https://access.redhat.com/errata/RHSA-2025:10109
reference_id RHSA-2025:10109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10109
13
reference_url https://access.redhat.com/errata/RHSA-2025:10111
reference_id RHSA-2025:10111
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10111
14
reference_url https://access.redhat.com/errata/RHSA-2025:10126
reference_id RHSA-2025:10126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10126
15
reference_url https://access.redhat.com/errata/RHSA-2025:10162
reference_id RHSA-2025:10162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10162
16
reference_url https://access.redhat.com/errata/RHSA-2025:10991
reference_id RHSA-2025:10991
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10991
17
reference_url https://usn.ubuntu.com/7535-1/
reference_id USN-7535-1
reference_type
scores
url https://usn.ubuntu.com/7535-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2024-43420
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wqfe-hkrk-nbaj
55
url VCID-wv5f-6x7x-7fdw
vulnerability_id VCID-wv5f-6x7x-7fdw
summary kernel: microcode_ctl: From CVEorg collector
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-36293.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-36293.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-36293
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07365
published_at 2026-04-18T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07481
published_at 2026-04-11T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07467
published_at 2026-04-12T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07456
published_at 2026-04-13T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07379
published_at 2026-04-16T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07382
published_at 2026-04-02T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07427
published_at 2026-04-04T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07409
published_at 2026-04-07T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07464
published_at 2026-04-08T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07487
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-36293
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36293
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
reference_id 1095805
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345367
reference_id 2345367
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2345367
6
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01213.html
reference_id intel-sa-01213.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value 6.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T15:27:21Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01213.html
7
reference_url https://usn.ubuntu.com/7269-1/
reference_id USN-7269-1
reference_type
scores
url https://usn.ubuntu.com/7269-1/
8
reference_url https://usn.ubuntu.com/7269-2/
reference_id USN-7269-2
reference_type
scores
url https://usn.ubuntu.com/7269-2/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2024-36293
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wv5f-6x7x-7fdw
56
url VCID-wyf3-shyh-qyhc
vulnerability_id VCID-wyf3-shyh-qyhc
summary Sequence of processor instructions leads to unexpected behavior in the Intel(R) DSA V1.0 for some Intel(R) Xeon(R) Processors may allow an authenticated user to potentially enable denial of service via local access.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-37020
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.01291
published_at 2026-04-18T12:55:00Z
1
value 0.00011
scoring_system epss
scoring_elements 0.01289
published_at 2026-04-11T12:55:00Z
2
value 0.00011
scoring_system epss
scoring_elements 0.01283
published_at 2026-04-12T12:55:00Z
3
value 0.00011
scoring_system epss
scoring_elements 0.01286
published_at 2026-04-13T12:55:00Z
4
value 0.00011
scoring_system epss
scoring_elements 0.01278
published_at 2026-04-16T12:55:00Z
5
value 0.00011
scoring_system epss
scoring_elements 0.01281
published_at 2026-04-02T12:55:00Z
6
value 0.00011
scoring_system epss
scoring_elements 0.01285
published_at 2026-04-04T12:55:00Z
7
value 0.00011
scoring_system epss
scoring_elements 0.01296
published_at 2026-04-07T12:55:00Z
8
value 0.00011
scoring_system epss
scoring_elements 0.01301
published_at 2026-04-08T12:55:00Z
9
value 0.00011
scoring_system epss
scoring_elements 0.01305
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-37020
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37020
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
reference_id 1095805
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
4
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01194.html
reference_id intel-sa-01194.html
reference_type
scores
0
value 3.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L
1
value 4.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T14:57:53Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01194.html
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2024-37020
risk_score 1.4
exploitability 0.5
weighted_severity 2.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wyf3-shyh-qyhc
57
url VCID-xb28-un42-1uag
vulnerability_id VCID-xb28-un42-1uag
summary Improper isolation in the Intel(R) Core(TM) Ultra Processor stream cache mechanism may allow an authenticated user to potentially enable escalation of privilege via local access.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42667
reference_id
reference_type
scores
0
value 0.00045
scoring_system epss
scoring_elements 0.1383
published_at 2026-04-18T12:55:00Z
1
value 0.00045
scoring_system epss
scoring_elements 0.14067
published_at 2026-04-02T12:55:00Z
2
value 0.00045
scoring_system epss
scoring_elements 0.14019
published_at 2026-04-11T12:55:00Z
3
value 0.00045
scoring_system epss
scoring_elements 0.13982
published_at 2026-04-12T12:55:00Z
4
value 0.00045
scoring_system epss
scoring_elements 0.13932
published_at 2026-04-13T12:55:00Z
5
value 0.00045
scoring_system epss
scoring_elements 0.13836
published_at 2026-04-16T12:55:00Z
6
value 0.00045
scoring_system epss
scoring_elements 0.14121
published_at 2026-04-04T12:55:00Z
7
value 0.00045
scoring_system epss
scoring_elements 0.13927
published_at 2026-04-07T12:55:00Z
8
value 0.00045
scoring_system epss
scoring_elements 0.14011
published_at 2026-04-08T12:55:00Z
9
value 0.00045
scoring_system epss
scoring_elements 0.14064
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42667
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42667
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42667
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078742
reference_id 1078742
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078742
4
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01038.html
reference_id intel-sa-01038.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-14T15:09:41Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01038.html
5
reference_url https://usn.ubuntu.com/6967-1/
reference_id USN-6967-1
reference_type
scores
url https://usn.ubuntu.com/6967-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
purl pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ues-wvyq-6qc9
1
vulnerability VCID-38q7-4ar3-sqcc
2
vulnerability VCID-3y3x-qqep-43ec
3
vulnerability VCID-4uuw-pm94-1kak
4
vulnerability VCID-51nr-8avm-qued
5
vulnerability VCID-5cgx-1n9u-gqbh
6
vulnerability VCID-5vkn-4rqc-qkbk
7
vulnerability VCID-6ake-v15c-k7aq
8
vulnerability VCID-6thk-vf9t-gygs
9
vulnerability VCID-75cx-avm7-tfcb
10
vulnerability VCID-7wcy-5hnc-tfh4
11
vulnerability VCID-8nyc-r2e4-17gr
12
vulnerability VCID-b55f-n1ed-g7eq
13
vulnerability VCID-eh71-uhnv-fqeb
14
vulnerability VCID-ejhc-6yqt-gkgv
15
vulnerability VCID-ejsj-eyej-huc6
16
vulnerability VCID-f859-13vd-7uef
17
vulnerability VCID-gmr7-umz8-9fhm
18
vulnerability VCID-j4ak-hjn5-guat
19
vulnerability VCID-j6j9-vj4t-bfa6
20
vulnerability VCID-kha2-8ez1-gfhr
21
vulnerability VCID-mekt-8gm1-33ej
22
vulnerability VCID-npgb-p786-d3fe
23
vulnerability VCID-qtg5-1dxw-sfdc
24
vulnerability VCID-qzcy-2xsr-vqeh
25
vulnerability VCID-r46f-12hj-7ybb
26
vulnerability VCID-t7rc-zadf-cybq
27
vulnerability VCID-t85u-116v-7uan
28
vulnerability VCID-vsda-kq13-73g1
29
vulnerability VCID-w7k1-y36j-3ye6
30
vulnerability VCID-wgce-vves-guek
31
vulnerability VCID-wqfe-hkrk-nbaj
32
vulnerability VCID-wv5f-6x7x-7fdw
33
vulnerability VCID-wyf3-shyh-qyhc
34
vulnerability VCID-zcxx-ra5c-hyh9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
aliases CVE-2023-42667
risk_score 2.4
exploitability 0.5
weighted_severity 4.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xb28-un42-1uag
58
url VCID-z8gt-jznd-ryht
vulnerability_id VCID-z8gt-jznd-ryht
summary Improper isolation in some Intel(R) Processors stream cache mechanism may allow an authenticated user to potentially enable escalation of privilege via local access.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-49141
reference_id
reference_type
scores
0
value 0.00051
scoring_system epss
scoring_elements 0.16041
published_at 2026-04-18T12:55:00Z
1
value 0.00051
scoring_system epss
scoring_elements 0.16212
published_at 2026-04-02T12:55:00Z
2
value 0.00051
scoring_system epss
scoring_elements 0.162
published_at 2026-04-11T12:55:00Z
3
value 0.00051
scoring_system epss
scoring_elements 0.16161
published_at 2026-04-12T12:55:00Z
4
value 0.00051
scoring_system epss
scoring_elements 0.16093
published_at 2026-04-13T12:55:00Z
5
value 0.00051
scoring_system epss
scoring_elements 0.16026
published_at 2026-04-16T12:55:00Z
6
value 0.00051
scoring_system epss
scoring_elements 0.16273
published_at 2026-04-04T12:55:00Z
7
value 0.00051
scoring_system epss
scoring_elements 0.16068
published_at 2026-04-07T12:55:00Z
8
value 0.00051
scoring_system epss
scoring_elements 0.16153
published_at 2026-04-08T12:55:00Z
9
value 0.00051
scoring_system epss
scoring_elements 0.16217
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-49141
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49141
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49141
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078742
reference_id 1078742
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078742
4
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01046.html
reference_id intel-sa-01046.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-14T14:39:50Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01046.html
5
reference_url https://usn.ubuntu.com/6967-1/
reference_id USN-6967-1
reference_type
scores
url https://usn.ubuntu.com/6967-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
purl pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ues-wvyq-6qc9
1
vulnerability VCID-38q7-4ar3-sqcc
2
vulnerability VCID-3y3x-qqep-43ec
3
vulnerability VCID-4uuw-pm94-1kak
4
vulnerability VCID-51nr-8avm-qued
5
vulnerability VCID-5cgx-1n9u-gqbh
6
vulnerability VCID-5vkn-4rqc-qkbk
7
vulnerability VCID-6ake-v15c-k7aq
8
vulnerability VCID-6thk-vf9t-gygs
9
vulnerability VCID-75cx-avm7-tfcb
10
vulnerability VCID-7wcy-5hnc-tfh4
11
vulnerability VCID-8nyc-r2e4-17gr
12
vulnerability VCID-b55f-n1ed-g7eq
13
vulnerability VCID-eh71-uhnv-fqeb
14
vulnerability VCID-ejhc-6yqt-gkgv
15
vulnerability VCID-ejsj-eyej-huc6
16
vulnerability VCID-f859-13vd-7uef
17
vulnerability VCID-gmr7-umz8-9fhm
18
vulnerability VCID-j4ak-hjn5-guat
19
vulnerability VCID-j6j9-vj4t-bfa6
20
vulnerability VCID-kha2-8ez1-gfhr
21
vulnerability VCID-mekt-8gm1-33ej
22
vulnerability VCID-npgb-p786-d3fe
23
vulnerability VCID-qtg5-1dxw-sfdc
24
vulnerability VCID-qzcy-2xsr-vqeh
25
vulnerability VCID-r46f-12hj-7ybb
26
vulnerability VCID-t7rc-zadf-cybq
27
vulnerability VCID-t85u-116v-7uan
28
vulnerability VCID-vsda-kq13-73g1
29
vulnerability VCID-w7k1-y36j-3ye6
30
vulnerability VCID-wgce-vves-guek
31
vulnerability VCID-wqfe-hkrk-nbaj
32
vulnerability VCID-wv5f-6x7x-7fdw
33
vulnerability VCID-wyf3-shyh-qyhc
34
vulnerability VCID-zcxx-ra5c-hyh9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
aliases CVE-2023-49141
risk_score 2.4
exploitability 0.5
weighted_severity 4.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z8gt-jznd-ryht
59
url VCID-zcxx-ra5c-hyh9
vulnerability_id VCID-zcxx-ra5c-hyh9
summary microcode_ctl: Insufficient resource pool in the core management mechanism
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-20103.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-20103.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-20103
reference_id
reference_type
scores
0
value 0.00092
scoring_system epss
scoring_elements 0.2576
published_at 2026-04-18T12:55:00Z
1
value 0.00092
scoring_system epss
scoring_elements 0.25777
published_at 2026-04-16T12:55:00Z
2
value 0.0011
scoring_system epss
scoring_elements 0.2936
published_at 2026-04-13T12:55:00Z
3
value 0.0011
scoring_system epss
scoring_elements 0.29479
published_at 2026-04-02T12:55:00Z
4
value 0.0011
scoring_system epss
scoring_elements 0.29527
published_at 2026-04-04T12:55:00Z
5
value 0.0011
scoring_system epss
scoring_elements 0.29348
published_at 2026-04-07T12:55:00Z
6
value 0.0011
scoring_system epss
scoring_elements 0.29412
published_at 2026-04-08T12:55:00Z
7
value 0.0011
scoring_system epss
scoring_elements 0.29453
published_at 2026-04-09T12:55:00Z
8
value 0.0011
scoring_system epss
scoring_elements 0.29457
published_at 2026-04-11T12:55:00Z
9
value 0.0011
scoring_system epss
scoring_elements 0.29413
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-20103
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20103
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20103
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172
reference_id 1105172
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366091
reference_id 2366091
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366091
5
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01244.html
reference_id intel-sa-01244.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value 5.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-14T13:49:36Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01244.html
6
reference_url https://usn.ubuntu.com/7535-1/
reference_id USN-7535-1
reference_type
scores
url https://usn.ubuntu.com/7535-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1
aliases CVE-2025-20103
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zcxx-ra5c-hyh9
60
url VCID-ztyd-jwnm-m3gd
vulnerability_id VCID-ztyd-jwnm-m3gd
summary hw: Intel: execution of MOVSB instructions with redundant REX prefix leads to unintended system behavior
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23583.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23583.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-23583
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10234
published_at 2026-04-02T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.10149
published_at 2026-04-18T12:55:00Z
2
value 0.00035
scoring_system epss
scoring_elements 0.10299
published_at 2026-04-04T12:55:00Z
3
value 0.00035
scoring_system epss
scoring_elements 0.10196
published_at 2026-04-07T12:55:00Z
4
value 0.00035
scoring_system epss
scoring_elements 0.1027
published_at 2026-04-08T12:55:00Z
5
value 0.00035
scoring_system epss
scoring_elements 0.10332
published_at 2026-04-09T12:55:00Z
6
value 0.00035
scoring_system epss
scoring_elements 0.10361
published_at 2026-04-11T12:55:00Z
7
value 0.00035
scoring_system epss
scoring_elements 0.10321
published_at 2026-04-12T12:55:00Z
8
value 0.00035
scoring_system epss
scoring_elements 0.10302
published_at 2026-04-13T12:55:00Z
9
value 0.00035
scoring_system epss
scoring_elements 0.10176
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-23583
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23583
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055962
reference_id 1055962
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055962
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2239097
reference_id 2239097
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2239097
6
reference_url http://www.openwall.com/lists/oss-security/2023/11/14/4
reference_id 4
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-16T13:58:46Z/
url http://www.openwall.com/lists/oss-security/2023/11/14/4
7
reference_url http://www.openwall.com/lists/oss-security/2023/11/14/5
reference_id 5
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-16T13:58:46Z/
url http://www.openwall.com/lists/oss-security/2023/11/14/5
8
reference_url http://www.openwall.com/lists/oss-security/2023/11/14/6
reference_id 6
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-16T13:58:46Z/
url http://www.openwall.com/lists/oss-security/2023/11/14/6
9
reference_url http://www.openwall.com/lists/oss-security/2023/11/14/7
reference_id 7
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-16T13:58:46Z/
url http://www.openwall.com/lists/oss-security/2023/11/14/7
10
reference_url http://www.openwall.com/lists/oss-security/2023/11/14/8
reference_id 8
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-16T13:58:46Z/
url http://www.openwall.com/lists/oss-security/2023/11/14/8
11
reference_url http://www.openwall.com/lists/oss-security/2023/11/14/9
reference_id 9
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-16T13:58:46Z/
url http://www.openwall.com/lists/oss-security/2023/11/14/9
12
reference_url https://www.debian.org/security/2023/dsa-5563
reference_id dsa-5563
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-16T13:58:46Z/
url https://www.debian.org/security/2023/dsa-5563
13
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00950.html
reference_id intel-sa-00950.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-16T13:58:46Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00950.html
14
reference_url https://lists.debian.org/debian-lts-announce/2023/12/msg00012.html
reference_id msg00012.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-16T13:58:46Z/
url https://lists.debian.org/debian-lts-announce/2023/12/msg00012.html
15
reference_url https://security.netapp.com/advisory/ntap-20231116-0015/
reference_id ntap-20231116-0015
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-16T13:58:46Z/
url https://security.netapp.com/advisory/ntap-20231116-0015/
16
reference_url https://usn.ubuntu.com/6485-1/
reference_id USN-6485-1
reference_type
scores
url https://usn.ubuntu.com/6485-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
purl pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ues-wvyq-6qc9
1
vulnerability VCID-38q7-4ar3-sqcc
2
vulnerability VCID-3y3x-qqep-43ec
3
vulnerability VCID-4uuw-pm94-1kak
4
vulnerability VCID-51nr-8avm-qued
5
vulnerability VCID-5cgx-1n9u-gqbh
6
vulnerability VCID-5vkn-4rqc-qkbk
7
vulnerability VCID-6ake-v15c-k7aq
8
vulnerability VCID-6thk-vf9t-gygs
9
vulnerability VCID-75cx-avm7-tfcb
10
vulnerability VCID-7wcy-5hnc-tfh4
11
vulnerability VCID-8nyc-r2e4-17gr
12
vulnerability VCID-b55f-n1ed-g7eq
13
vulnerability VCID-eh71-uhnv-fqeb
14
vulnerability VCID-ejhc-6yqt-gkgv
15
vulnerability VCID-ejsj-eyej-huc6
16
vulnerability VCID-f859-13vd-7uef
17
vulnerability VCID-gmr7-umz8-9fhm
18
vulnerability VCID-j4ak-hjn5-guat
19
vulnerability VCID-j6j9-vj4t-bfa6
20
vulnerability VCID-kha2-8ez1-gfhr
21
vulnerability VCID-mekt-8gm1-33ej
22
vulnerability VCID-npgb-p786-d3fe
23
vulnerability VCID-qtg5-1dxw-sfdc
24
vulnerability VCID-qzcy-2xsr-vqeh
25
vulnerability VCID-r46f-12hj-7ybb
26
vulnerability VCID-t7rc-zadf-cybq
27
vulnerability VCID-t85u-116v-7uan
28
vulnerability VCID-vsda-kq13-73g1
29
vulnerability VCID-w7k1-y36j-3ye6
30
vulnerability VCID-wgce-vves-guek
31
vulnerability VCID-wqfe-hkrk-nbaj
32
vulnerability VCID-wv5f-6x7x-7fdw
33
vulnerability VCID-wyf3-shyh-qyhc
34
vulnerability VCID-zcxx-ra5c-hyh9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
aliases CVE-2023-23583
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ztyd-jwnm-m3gd
61
url VCID-zx9g-4trv-hfgc
vulnerability_id VCID-zx9g-4trv-hfgc
summary kernel: Intel firmware update for improper isolation of shared resources
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38090.json
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38090.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-38090
reference_id
reference_type
scores
0
value 0.00041
scoring_system epss
scoring_elements 0.12557
published_at 2026-04-02T12:55:00Z
1
value 0.00041
scoring_system epss
scoring_elements 0.12338
published_at 2026-04-18T12:55:00Z
2
value 0.00041
scoring_system epss
scoring_elements 0.12472
published_at 2026-04-12T12:55:00Z
3
value 0.00041
scoring_system epss
scoring_elements 0.12432
published_at 2026-04-13T12:55:00Z
4
value 0.00041
scoring_system epss
scoring_elements 0.12336
published_at 2026-04-16T12:55:00Z
5
value 0.00041
scoring_system epss
scoring_elements 0.12599
published_at 2026-04-04T12:55:00Z
6
value 0.00041
scoring_system epss
scoring_elements 0.12407
published_at 2026-04-07T12:55:00Z
7
value 0.00041
scoring_system epss
scoring_elements 0.12488
published_at 2026-04-08T12:55:00Z
8
value 0.00041
scoring_system epss
scoring_elements 0.1254
published_at 2026-04-09T12:55:00Z
9
value 0.00041
scoring_system epss
scoring_elements 0.1251
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-38090
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38090
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031334
reference_id 1031334
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031334
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2171281
reference_id 2171281
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2171281
6
reference_url http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00767.html
reference_id intel-sa-00767.html
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T14:53:30Z/
url http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00767.html
7
reference_url https://usn.ubuntu.com/5886-1/
reference_id USN-5886-1
reference_type
scores
url https://usn.ubuntu.com/5886-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
purl pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ues-wvyq-6qc9
1
vulnerability VCID-38q7-4ar3-sqcc
2
vulnerability VCID-3y3x-qqep-43ec
3
vulnerability VCID-4uuw-pm94-1kak
4
vulnerability VCID-51nr-8avm-qued
5
vulnerability VCID-5cgx-1n9u-gqbh
6
vulnerability VCID-5vkn-4rqc-qkbk
7
vulnerability VCID-6ake-v15c-k7aq
8
vulnerability VCID-6thk-vf9t-gygs
9
vulnerability VCID-75cx-avm7-tfcb
10
vulnerability VCID-7wcy-5hnc-tfh4
11
vulnerability VCID-8nyc-r2e4-17gr
12
vulnerability VCID-b55f-n1ed-g7eq
13
vulnerability VCID-eh71-uhnv-fqeb
14
vulnerability VCID-ejhc-6yqt-gkgv
15
vulnerability VCID-ejsj-eyej-huc6
16
vulnerability VCID-f859-13vd-7uef
17
vulnerability VCID-gmr7-umz8-9fhm
18
vulnerability VCID-j4ak-hjn5-guat
19
vulnerability VCID-j6j9-vj4t-bfa6
20
vulnerability VCID-kha2-8ez1-gfhr
21
vulnerability VCID-mekt-8gm1-33ej
22
vulnerability VCID-npgb-p786-d3fe
23
vulnerability VCID-qtg5-1dxw-sfdc
24
vulnerability VCID-qzcy-2xsr-vqeh
25
vulnerability VCID-r46f-12hj-7ybb
26
vulnerability VCID-t7rc-zadf-cybq
27
vulnerability VCID-t85u-116v-7uan
28
vulnerability VCID-vsda-kq13-73g1
29
vulnerability VCID-w7k1-y36j-3ye6
30
vulnerability VCID-wgce-vves-guek
31
vulnerability VCID-wqfe-hkrk-nbaj
32
vulnerability VCID-wv5f-6x7x-7fdw
33
vulnerability VCID-wyf3-shyh-qyhc
34
vulnerability VCID-zcxx-ra5c-hyh9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
aliases CVE-2022-38090
risk_score 2.7
exploitability 0.5
weighted_severity 5.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zx9g-4trv-hfgc
Fixing_vulnerabilities
0
url VCID-2ytx-vj3b-rfhb
vulnerability_id VCID-2ytx-vj3b-rfhb
summary hw: cpu: information disclosure in certain Intel processors
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21151.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21151.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21151
reference_id
reference_type
scores
0
value 0.00054
scoring_system epss
scoring_elements 0.1692
published_at 2026-04-18T12:55:00Z
1
value 0.00054
scoring_system epss
scoring_elements 0.1719
published_at 2026-04-04T12:55:00Z
2
value 0.00054
scoring_system epss
scoring_elements 0.16968
published_at 2026-04-07T12:55:00Z
3
value 0.00054
scoring_system epss
scoring_elements 0.17058
published_at 2026-04-08T12:55:00Z
4
value 0.00054
scoring_system epss
scoring_elements 0.17114
published_at 2026-04-09T12:55:00Z
5
value 0.00054
scoring_system epss
scoring_elements 0.1709
published_at 2026-04-11T12:55:00Z
6
value 0.00054
scoring_system epss
scoring_elements 0.17043
published_at 2026-04-12T12:55:00Z
7
value 0.00054
scoring_system epss
scoring_elements 0.16982
published_at 2026-04-13T12:55:00Z
8
value 0.00054
scoring_system epss
scoring_elements 0.16918
published_at 2026-04-16T12:55:00Z
9
value 0.00054
scoring_system epss
scoring_elements 0.17137
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21151
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010947
reference_id 1010947
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010947
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2086730
reference_id 2086730
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2086730
10
reference_url https://security.archlinux.org/AVG-2796
reference_id AVG-2796
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2796
11
reference_url https://www.debian.org/security/2022/dsa-5178
reference_id dsa-5178
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:47Z/
url https://www.debian.org/security/2022/dsa-5178
12
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00617.html
reference_id intel-sa-00617.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:47Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00617.html
13
reference_url https://security.netapp.com/advisory/ntap-20220826-0003/
reference_id ntap-20220826-0003
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:47Z/
url https://security.netapp.com/advisory/ntap-20220826-0003/
14
reference_url https://usn.ubuntu.com/5486-1/
reference_id USN-5486-1
reference_type
scores
url https://usn.ubuntu.com/5486-1/
15
reference_url https://usn.ubuntu.com/5535-1/
reference_id USN-5535-1
reference_type
scores
url https://usn.ubuntu.com/5535-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20220510.1~deb10u1
purl pkg:deb/debian/intel-microcode@3.20220510.1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1xju-dcmn-ube4
1
vulnerability VCID-2ues-wvyq-6qc9
2
vulnerability VCID-2ytx-vj3b-rfhb
3
vulnerability VCID-3dfb-1sgt-w3a8
4
vulnerability VCID-3y3x-qqep-43ec
5
vulnerability VCID-4429-qf2w-jqg3
6
vulnerability VCID-4bw3-w5hz-ekd1
7
vulnerability VCID-4uuw-pm94-1kak
8
vulnerability VCID-51nr-8avm-qued
9
vulnerability VCID-5cgx-1n9u-gqbh
10
vulnerability VCID-5dq7-wfyt-2uhz
11
vulnerability VCID-5vkn-4rqc-qkbk
12
vulnerability VCID-6ake-v15c-k7aq
13
vulnerability VCID-6mzy-wsz1-cyhf
14
vulnerability VCID-6thk-vf9t-gygs
15
vulnerability VCID-6vn3-vpg9-gfbk
16
vulnerability VCID-75cx-avm7-tfcb
17
vulnerability VCID-7wcy-5hnc-tfh4
18
vulnerability VCID-8nyc-r2e4-17gr
19
vulnerability VCID-8vx6-ctvp-8qeq
20
vulnerability VCID-9en3-y22n-wydw
21
vulnerability VCID-b55f-n1ed-g7eq
22
vulnerability VCID-bzwc-9ueu-gka1
23
vulnerability VCID-csy7-esn4-u3gq
24
vulnerability VCID-dzdf-drjk-m3cj
25
vulnerability VCID-eh71-uhnv-fqeb
26
vulnerability VCID-ejhc-6yqt-gkgv
27
vulnerability VCID-ejsj-eyej-huc6
28
vulnerability VCID-f859-13vd-7uef
29
vulnerability VCID-f91c-4ty9-h7a2
30
vulnerability VCID-fe46-8fs3-p3fd
31
vulnerability VCID-gmr7-umz8-9fhm
32
vulnerability VCID-j4ak-hjn5-guat
33
vulnerability VCID-j6j9-vj4t-bfa6
34
vulnerability VCID-jqnr-61tn-kben
35
vulnerability VCID-jwaz-e1v9-uyep
36
vulnerability VCID-kha2-8ez1-gfhr
37
vulnerability VCID-mekt-8gm1-33ej
38
vulnerability VCID-mu4u-d5mc-kbgk
39
vulnerability VCID-npgb-p786-d3fe
40
vulnerability VCID-p2fk-8snj-x7dy
41
vulnerability VCID-pgps-58ra-1ugy
42
vulnerability VCID-qtg5-1dxw-sfdc
43
vulnerability VCID-qzcy-2xsr-vqeh
44
vulnerability VCID-r46f-12hj-7ybb
45
vulnerability VCID-t56a-46c7-fybe
46
vulnerability VCID-t7rc-zadf-cybq
47
vulnerability VCID-t85u-116v-7uan
48
vulnerability VCID-td6e-x2qb-syg3
49
vulnerability VCID-trxm-8mg3-4bbr
50
vulnerability VCID-uj7d-tpax-fqhd
51
vulnerability VCID-vsda-kq13-73g1
52
vulnerability VCID-w7k1-y36j-3ye6
53
vulnerability VCID-wgce-vves-guek
54
vulnerability VCID-wqfe-hkrk-nbaj
55
vulnerability VCID-wv5f-6x7x-7fdw
56
vulnerability VCID-wyf3-shyh-qyhc
57
vulnerability VCID-xb28-un42-1uag
58
vulnerability VCID-z8gt-jznd-ryht
59
vulnerability VCID-zcxx-ra5c-hyh9
60
vulnerability VCID-ztyd-jwnm-m3gd
61
vulnerability VCID-zx9g-4trv-hfgc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20220510.1~deb10u1
1
url pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
purl pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ues-wvyq-6qc9
1
vulnerability VCID-38q7-4ar3-sqcc
2
vulnerability VCID-3y3x-qqep-43ec
3
vulnerability VCID-4uuw-pm94-1kak
4
vulnerability VCID-51nr-8avm-qued
5
vulnerability VCID-5cgx-1n9u-gqbh
6
vulnerability VCID-5vkn-4rqc-qkbk
7
vulnerability VCID-6ake-v15c-k7aq
8
vulnerability VCID-6thk-vf9t-gygs
9
vulnerability VCID-75cx-avm7-tfcb
10
vulnerability VCID-7wcy-5hnc-tfh4
11
vulnerability VCID-8nyc-r2e4-17gr
12
vulnerability VCID-b55f-n1ed-g7eq
13
vulnerability VCID-eh71-uhnv-fqeb
14
vulnerability VCID-ejhc-6yqt-gkgv
15
vulnerability VCID-ejsj-eyej-huc6
16
vulnerability VCID-f859-13vd-7uef
17
vulnerability VCID-gmr7-umz8-9fhm
18
vulnerability VCID-j4ak-hjn5-guat
19
vulnerability VCID-j6j9-vj4t-bfa6
20
vulnerability VCID-kha2-8ez1-gfhr
21
vulnerability VCID-mekt-8gm1-33ej
22
vulnerability VCID-npgb-p786-d3fe
23
vulnerability VCID-qtg5-1dxw-sfdc
24
vulnerability VCID-qzcy-2xsr-vqeh
25
vulnerability VCID-r46f-12hj-7ybb
26
vulnerability VCID-t7rc-zadf-cybq
27
vulnerability VCID-t85u-116v-7uan
28
vulnerability VCID-vsda-kq13-73g1
29
vulnerability VCID-w7k1-y36j-3ye6
30
vulnerability VCID-wgce-vves-guek
31
vulnerability VCID-wqfe-hkrk-nbaj
32
vulnerability VCID-wv5f-6x7x-7fdw
33
vulnerability VCID-wyf3-shyh-qyhc
34
vulnerability VCID-zcxx-ra5c-hyh9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
aliases CVE-2022-21151
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2ytx-vj3b-rfhb
1
url VCID-4429-qf2w-jqg3
vulnerability_id VCID-4429-qf2w-jqg3
summary x86: MMIO Stale Data vulnerabilities
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21166.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21166.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21166
reference_id
reference_type
scores
0
value 0.00185
scoring_system epss
scoring_elements 0.40284
published_at 2026-04-08T12:55:00Z
1
value 0.00185
scoring_system epss
scoring_elements 0.40266
published_at 2026-04-18T12:55:00Z
2
value 0.00185
scoring_system epss
scoring_elements 0.40309
published_at 2026-04-04T12:55:00Z
3
value 0.00185
scoring_system epss
scoring_elements 0.40231
published_at 2026-04-07T12:55:00Z
4
value 0.00185
scoring_system epss
scoring_elements 0.40296
published_at 2026-04-09T12:55:00Z
5
value 0.00185
scoring_system epss
scoring_elements 0.40308
published_at 2026-04-11T12:55:00Z
6
value 0.00185
scoring_system epss
scoring_elements 0.4027
published_at 2026-04-12T12:55:00Z
7
value 0.00185
scoring_system epss
scoring_elements 0.40251
published_at 2026-04-13T12:55:00Z
8
value 0.00185
scoring_system epss
scoring_elements 0.40298
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21166
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
46
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
47
reference_url http://www.openwall.com/lists/oss-security/2022/06/16/1
reference_id 1
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/
url http://www.openwall.com/lists/oss-security/2022/06/16/1
48
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2090241
reference_id 2090241
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2090241
49
reference_url https://www.debian.org/security/2022/dsa-5173
reference_id dsa-5173
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/
url https://www.debian.org/security/2022/dsa-5173
50
reference_url https://www.debian.org/security/2022/dsa-5178
reference_id dsa-5178
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/
url https://www.debian.org/security/2022/dsa-5178
51
reference_url https://www.debian.org/security/2022/dsa-5184
reference_id dsa-5184
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/
url https://www.debian.org/security/2022/dsa-5184
52
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV/
reference_id FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV/
53
reference_url https://security.gentoo.org/glsa/202208-23
reference_id GLSA-202208-23
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/
url https://security.gentoo.org/glsa/202208-23
54
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html
reference_id intel-sa-00615.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html
55
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS/
reference_id MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS/
56
reference_url https://security.netapp.com/advisory/ntap-20220624-0008/
reference_id ntap-20220624-0008
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/
url https://security.netapp.com/advisory/ntap-20220624-0008/
57
reference_url https://access.redhat.com/errata/RHSA-2022:5937
reference_id RHSA-2022:5937
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5937
58
reference_url https://access.redhat.com/errata/RHSA-2022:5939
reference_id RHSA-2022:5939
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5939
59
reference_url https://access.redhat.com/errata/RHSA-2022:6437
reference_id RHSA-2022:6437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6437
60
reference_url https://access.redhat.com/errata/RHSA-2022:6460
reference_id RHSA-2022:6460
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6460
61
reference_url https://access.redhat.com/errata/RHSA-2022:6872
reference_id RHSA-2022:6872
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6872
62
reference_url https://access.redhat.com/errata/RHSA-2022:6983
reference_id RHSA-2022:6983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6983
63
reference_url https://access.redhat.com/errata/RHSA-2022:6991
reference_id RHSA-2022:6991
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6991
64
reference_url https://access.redhat.com/errata/RHSA-2022:7279
reference_id RHSA-2022:7279
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7279
65
reference_url https://access.redhat.com/errata/RHSA-2022:7280
reference_id RHSA-2022:7280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7280
66
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
67
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
68
reference_url https://access.redhat.com/errata/RHSA-2022:8973
reference_id RHSA-2022:8973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8973
69
reference_url https://access.redhat.com/errata/RHSA-2022:8974
reference_id RHSA-2022:8974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8974
70
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/
reference_id RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/
71
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA/
reference_id T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA/
72
reference_url https://usn.ubuntu.com/5484-1/
reference_id USN-5484-1
reference_type
scores
url https://usn.ubuntu.com/5484-1/
73
reference_url https://usn.ubuntu.com/5485-1/
reference_id USN-5485-1
reference_type
scores
url https://usn.ubuntu.com/5485-1/
74
reference_url https://usn.ubuntu.com/5485-2/
reference_id USN-5485-2
reference_type
scores
url https://usn.ubuntu.com/5485-2/
75
reference_url https://usn.ubuntu.com/5486-1/
reference_id USN-5486-1
reference_type
scores
url https://usn.ubuntu.com/5486-1/
76
reference_url https://usn.ubuntu.com/5505-1/
reference_id USN-5505-1
reference_type
scores
url https://usn.ubuntu.com/5505-1/
77
reference_url https://usn.ubuntu.com/5513-1/
reference_id USN-5513-1
reference_type
scores
url https://usn.ubuntu.com/5513-1/
78
reference_url https://usn.ubuntu.com/5529-1/
reference_id USN-5529-1
reference_type
scores
url https://usn.ubuntu.com/5529-1/
79
reference_url https://usn.ubuntu.com/5535-1/
reference_id USN-5535-1
reference_type
scores
url https://usn.ubuntu.com/5535-1/
80
reference_url https://xenbits.xen.org/xsa/advisory-404.html
reference_id XSA-404
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-404.html
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20220510.1~deb10u1
purl pkg:deb/debian/intel-microcode@3.20220510.1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1xju-dcmn-ube4
1
vulnerability VCID-2ues-wvyq-6qc9
2
vulnerability VCID-2ytx-vj3b-rfhb
3
vulnerability VCID-3dfb-1sgt-w3a8
4
vulnerability VCID-3y3x-qqep-43ec
5
vulnerability VCID-4429-qf2w-jqg3
6
vulnerability VCID-4bw3-w5hz-ekd1
7
vulnerability VCID-4uuw-pm94-1kak
8
vulnerability VCID-51nr-8avm-qued
9
vulnerability VCID-5cgx-1n9u-gqbh
10
vulnerability VCID-5dq7-wfyt-2uhz
11
vulnerability VCID-5vkn-4rqc-qkbk
12
vulnerability VCID-6ake-v15c-k7aq
13
vulnerability VCID-6mzy-wsz1-cyhf
14
vulnerability VCID-6thk-vf9t-gygs
15
vulnerability VCID-6vn3-vpg9-gfbk
16
vulnerability VCID-75cx-avm7-tfcb
17
vulnerability VCID-7wcy-5hnc-tfh4
18
vulnerability VCID-8nyc-r2e4-17gr
19
vulnerability VCID-8vx6-ctvp-8qeq
20
vulnerability VCID-9en3-y22n-wydw
21
vulnerability VCID-b55f-n1ed-g7eq
22
vulnerability VCID-bzwc-9ueu-gka1
23
vulnerability VCID-csy7-esn4-u3gq
24
vulnerability VCID-dzdf-drjk-m3cj
25
vulnerability VCID-eh71-uhnv-fqeb
26
vulnerability VCID-ejhc-6yqt-gkgv
27
vulnerability VCID-ejsj-eyej-huc6
28
vulnerability VCID-f859-13vd-7uef
29
vulnerability VCID-f91c-4ty9-h7a2
30
vulnerability VCID-fe46-8fs3-p3fd
31
vulnerability VCID-gmr7-umz8-9fhm
32
vulnerability VCID-j4ak-hjn5-guat
33
vulnerability VCID-j6j9-vj4t-bfa6
34
vulnerability VCID-jqnr-61tn-kben
35
vulnerability VCID-jwaz-e1v9-uyep
36
vulnerability VCID-kha2-8ez1-gfhr
37
vulnerability VCID-mekt-8gm1-33ej
38
vulnerability VCID-mu4u-d5mc-kbgk
39
vulnerability VCID-npgb-p786-d3fe
40
vulnerability VCID-p2fk-8snj-x7dy
41
vulnerability VCID-pgps-58ra-1ugy
42
vulnerability VCID-qtg5-1dxw-sfdc
43
vulnerability VCID-qzcy-2xsr-vqeh
44
vulnerability VCID-r46f-12hj-7ybb
45
vulnerability VCID-t56a-46c7-fybe
46
vulnerability VCID-t7rc-zadf-cybq
47
vulnerability VCID-t85u-116v-7uan
48
vulnerability VCID-td6e-x2qb-syg3
49
vulnerability VCID-trxm-8mg3-4bbr
50
vulnerability VCID-uj7d-tpax-fqhd
51
vulnerability VCID-vsda-kq13-73g1
52
vulnerability VCID-w7k1-y36j-3ye6
53
vulnerability VCID-wgce-vves-guek
54
vulnerability VCID-wqfe-hkrk-nbaj
55
vulnerability VCID-wv5f-6x7x-7fdw
56
vulnerability VCID-wyf3-shyh-qyhc
57
vulnerability VCID-xb28-un42-1uag
58
vulnerability VCID-z8gt-jznd-ryht
59
vulnerability VCID-zcxx-ra5c-hyh9
60
vulnerability VCID-ztyd-jwnm-m3gd
61
vulnerability VCID-zx9g-4trv-hfgc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20220510.1~deb10u1
1
url pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
purl pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ues-wvyq-6qc9
1
vulnerability VCID-38q7-4ar3-sqcc
2
vulnerability VCID-3y3x-qqep-43ec
3
vulnerability VCID-4uuw-pm94-1kak
4
vulnerability VCID-51nr-8avm-qued
5
vulnerability VCID-5cgx-1n9u-gqbh
6
vulnerability VCID-5vkn-4rqc-qkbk
7
vulnerability VCID-6ake-v15c-k7aq
8
vulnerability VCID-6thk-vf9t-gygs
9
vulnerability VCID-75cx-avm7-tfcb
10
vulnerability VCID-7wcy-5hnc-tfh4
11
vulnerability VCID-8nyc-r2e4-17gr
12
vulnerability VCID-b55f-n1ed-g7eq
13
vulnerability VCID-eh71-uhnv-fqeb
14
vulnerability VCID-ejhc-6yqt-gkgv
15
vulnerability VCID-ejsj-eyej-huc6
16
vulnerability VCID-f859-13vd-7uef
17
vulnerability VCID-gmr7-umz8-9fhm
18
vulnerability VCID-j4ak-hjn5-guat
19
vulnerability VCID-j6j9-vj4t-bfa6
20
vulnerability VCID-kha2-8ez1-gfhr
21
vulnerability VCID-mekt-8gm1-33ej
22
vulnerability VCID-npgb-p786-d3fe
23
vulnerability VCID-qtg5-1dxw-sfdc
24
vulnerability VCID-qzcy-2xsr-vqeh
25
vulnerability VCID-r46f-12hj-7ybb
26
vulnerability VCID-t7rc-zadf-cybq
27
vulnerability VCID-t85u-116v-7uan
28
vulnerability VCID-vsda-kq13-73g1
29
vulnerability VCID-w7k1-y36j-3ye6
30
vulnerability VCID-wgce-vves-guek
31
vulnerability VCID-wqfe-hkrk-nbaj
32
vulnerability VCID-wv5f-6x7x-7fdw
33
vulnerability VCID-wyf3-shyh-qyhc
34
vulnerability VCID-zcxx-ra5c-hyh9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
aliases CVE-2022-21166, XSA-404
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4429-qf2w-jqg3
2
url VCID-csy7-esn4-u3gq
vulnerability_id VCID-csy7-esn4-u3gq
summary x86: MMIO Stale Data vulnerabilities
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21123.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21123.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21123
reference_id
reference_type
scores
0
value 0.00452
scoring_system epss
scoring_elements 0.63685
published_at 2026-04-02T12:55:00Z
1
value 0.00452
scoring_system epss
scoring_elements 0.63751
published_at 2026-04-18T12:55:00Z
2
value 0.00452
scoring_system epss
scoring_elements 0.63711
published_at 2026-04-04T12:55:00Z
3
value 0.00452
scoring_system epss
scoring_elements 0.63671
published_at 2026-04-07T12:55:00Z
4
value 0.00452
scoring_system epss
scoring_elements 0.63723
published_at 2026-04-08T12:55:00Z
5
value 0.00452
scoring_system epss
scoring_elements 0.6374
published_at 2026-04-12T12:55:00Z
6
value 0.00452
scoring_system epss
scoring_elements 0.63754
published_at 2026-04-11T12:55:00Z
7
value 0.00452
scoring_system epss
scoring_elements 0.63706
published_at 2026-04-13T12:55:00Z
8
value 0.00452
scoring_system epss
scoring_elements 0.63741
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21123
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
46
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
47
reference_url http://www.openwall.com/lists/oss-security/2022/06/16/1
reference_id 1
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/
url http://www.openwall.com/lists/oss-security/2022/06/16/1
48
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2090237
reference_id 2090237
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2090237
49
reference_url https://www.debian.org/security/2022/dsa-5173
reference_id dsa-5173
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/
url https://www.debian.org/security/2022/dsa-5173
50
reference_url https://www.debian.org/security/2022/dsa-5178
reference_id dsa-5178
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/
url https://www.debian.org/security/2022/dsa-5178
51
reference_url https://www.debian.org/security/2022/dsa-5184
reference_id dsa-5184
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/
url https://www.debian.org/security/2022/dsa-5184
52
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV/
reference_id FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV/
53
reference_url https://security.gentoo.org/glsa/202208-23
reference_id GLSA-202208-23
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/
url https://security.gentoo.org/glsa/202208-23
54
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html
reference_id intel-sa-00615.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html
55
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS/
reference_id MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS/
56
reference_url https://security.netapp.com/advisory/ntap-20220624-0008/
reference_id ntap-20220624-0008
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/
url https://security.netapp.com/advisory/ntap-20220624-0008/
57
reference_url https://access.redhat.com/errata/RHSA-2022:5937
reference_id RHSA-2022:5937
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5937
58
reference_url https://access.redhat.com/errata/RHSA-2022:5939
reference_id RHSA-2022:5939
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5939
59
reference_url https://access.redhat.com/errata/RHSA-2022:6437
reference_id RHSA-2022:6437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6437
60
reference_url https://access.redhat.com/errata/RHSA-2022:6460
reference_id RHSA-2022:6460
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6460
61
reference_url https://access.redhat.com/errata/RHSA-2022:6872
reference_id RHSA-2022:6872
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6872
62
reference_url https://access.redhat.com/errata/RHSA-2022:6983
reference_id RHSA-2022:6983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6983
63
reference_url https://access.redhat.com/errata/RHSA-2022:6991
reference_id RHSA-2022:6991
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6991
64
reference_url https://access.redhat.com/errata/RHSA-2022:7279
reference_id RHSA-2022:7279
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7279
65
reference_url https://access.redhat.com/errata/RHSA-2022:7280
reference_id RHSA-2022:7280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7280
66
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
67
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
68
reference_url https://access.redhat.com/errata/RHSA-2022:8973
reference_id RHSA-2022:8973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8973
69
reference_url https://access.redhat.com/errata/RHSA-2022:8974
reference_id RHSA-2022:8974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8974
70
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/
reference_id RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/
71
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA/
reference_id T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA/
72
reference_url https://usn.ubuntu.com/5484-1/
reference_id USN-5484-1
reference_type
scores
url https://usn.ubuntu.com/5484-1/
73
reference_url https://usn.ubuntu.com/5485-1/
reference_id USN-5485-1
reference_type
scores
url https://usn.ubuntu.com/5485-1/
74
reference_url https://usn.ubuntu.com/5485-2/
reference_id USN-5485-2
reference_type
scores
url https://usn.ubuntu.com/5485-2/
75
reference_url https://usn.ubuntu.com/5486-1/
reference_id USN-5486-1
reference_type
scores
url https://usn.ubuntu.com/5486-1/
76
reference_url https://usn.ubuntu.com/5505-1/
reference_id USN-5505-1
reference_type
scores
url https://usn.ubuntu.com/5505-1/
77
reference_url https://usn.ubuntu.com/5513-1/
reference_id USN-5513-1
reference_type
scores
url https://usn.ubuntu.com/5513-1/
78
reference_url https://usn.ubuntu.com/5529-1/
reference_id USN-5529-1
reference_type
scores
url https://usn.ubuntu.com/5529-1/
79
reference_url https://usn.ubuntu.com/5535-1/
reference_id USN-5535-1
reference_type
scores
url https://usn.ubuntu.com/5535-1/
80
reference_url https://xenbits.xen.org/xsa/advisory-404.html
reference_id XSA-404
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-404.html
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20220510.1~deb10u1
purl pkg:deb/debian/intel-microcode@3.20220510.1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1xju-dcmn-ube4
1
vulnerability VCID-2ues-wvyq-6qc9
2
vulnerability VCID-2ytx-vj3b-rfhb
3
vulnerability VCID-3dfb-1sgt-w3a8
4
vulnerability VCID-3y3x-qqep-43ec
5
vulnerability VCID-4429-qf2w-jqg3
6
vulnerability VCID-4bw3-w5hz-ekd1
7
vulnerability VCID-4uuw-pm94-1kak
8
vulnerability VCID-51nr-8avm-qued
9
vulnerability VCID-5cgx-1n9u-gqbh
10
vulnerability VCID-5dq7-wfyt-2uhz
11
vulnerability VCID-5vkn-4rqc-qkbk
12
vulnerability VCID-6ake-v15c-k7aq
13
vulnerability VCID-6mzy-wsz1-cyhf
14
vulnerability VCID-6thk-vf9t-gygs
15
vulnerability VCID-6vn3-vpg9-gfbk
16
vulnerability VCID-75cx-avm7-tfcb
17
vulnerability VCID-7wcy-5hnc-tfh4
18
vulnerability VCID-8nyc-r2e4-17gr
19
vulnerability VCID-8vx6-ctvp-8qeq
20
vulnerability VCID-9en3-y22n-wydw
21
vulnerability VCID-b55f-n1ed-g7eq
22
vulnerability VCID-bzwc-9ueu-gka1
23
vulnerability VCID-csy7-esn4-u3gq
24
vulnerability VCID-dzdf-drjk-m3cj
25
vulnerability VCID-eh71-uhnv-fqeb
26
vulnerability VCID-ejhc-6yqt-gkgv
27
vulnerability VCID-ejsj-eyej-huc6
28
vulnerability VCID-f859-13vd-7uef
29
vulnerability VCID-f91c-4ty9-h7a2
30
vulnerability VCID-fe46-8fs3-p3fd
31
vulnerability VCID-gmr7-umz8-9fhm
32
vulnerability VCID-j4ak-hjn5-guat
33
vulnerability VCID-j6j9-vj4t-bfa6
34
vulnerability VCID-jqnr-61tn-kben
35
vulnerability VCID-jwaz-e1v9-uyep
36
vulnerability VCID-kha2-8ez1-gfhr
37
vulnerability VCID-mekt-8gm1-33ej
38
vulnerability VCID-mu4u-d5mc-kbgk
39
vulnerability VCID-npgb-p786-d3fe
40
vulnerability VCID-p2fk-8snj-x7dy
41
vulnerability VCID-pgps-58ra-1ugy
42
vulnerability VCID-qtg5-1dxw-sfdc
43
vulnerability VCID-qzcy-2xsr-vqeh
44
vulnerability VCID-r46f-12hj-7ybb
45
vulnerability VCID-t56a-46c7-fybe
46
vulnerability VCID-t7rc-zadf-cybq
47
vulnerability VCID-t85u-116v-7uan
48
vulnerability VCID-td6e-x2qb-syg3
49
vulnerability VCID-trxm-8mg3-4bbr
50
vulnerability VCID-uj7d-tpax-fqhd
51
vulnerability VCID-vsda-kq13-73g1
52
vulnerability VCID-w7k1-y36j-3ye6
53
vulnerability VCID-wgce-vves-guek
54
vulnerability VCID-wqfe-hkrk-nbaj
55
vulnerability VCID-wv5f-6x7x-7fdw
56
vulnerability VCID-wyf3-shyh-qyhc
57
vulnerability VCID-xb28-un42-1uag
58
vulnerability VCID-z8gt-jznd-ryht
59
vulnerability VCID-zcxx-ra5c-hyh9
60
vulnerability VCID-ztyd-jwnm-m3gd
61
vulnerability VCID-zx9g-4trv-hfgc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20220510.1~deb10u1
1
url pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
purl pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ues-wvyq-6qc9
1
vulnerability VCID-38q7-4ar3-sqcc
2
vulnerability VCID-3y3x-qqep-43ec
3
vulnerability VCID-4uuw-pm94-1kak
4
vulnerability VCID-51nr-8avm-qued
5
vulnerability VCID-5cgx-1n9u-gqbh
6
vulnerability VCID-5vkn-4rqc-qkbk
7
vulnerability VCID-6ake-v15c-k7aq
8
vulnerability VCID-6thk-vf9t-gygs
9
vulnerability VCID-75cx-avm7-tfcb
10
vulnerability VCID-7wcy-5hnc-tfh4
11
vulnerability VCID-8nyc-r2e4-17gr
12
vulnerability VCID-b55f-n1ed-g7eq
13
vulnerability VCID-eh71-uhnv-fqeb
14
vulnerability VCID-ejhc-6yqt-gkgv
15
vulnerability VCID-ejsj-eyej-huc6
16
vulnerability VCID-f859-13vd-7uef
17
vulnerability VCID-gmr7-umz8-9fhm
18
vulnerability VCID-j4ak-hjn5-guat
19
vulnerability VCID-j6j9-vj4t-bfa6
20
vulnerability VCID-kha2-8ez1-gfhr
21
vulnerability VCID-mekt-8gm1-33ej
22
vulnerability VCID-npgb-p786-d3fe
23
vulnerability VCID-qtg5-1dxw-sfdc
24
vulnerability VCID-qzcy-2xsr-vqeh
25
vulnerability VCID-r46f-12hj-7ybb
26
vulnerability VCID-t7rc-zadf-cybq
27
vulnerability VCID-t85u-116v-7uan
28
vulnerability VCID-vsda-kq13-73g1
29
vulnerability VCID-w7k1-y36j-3ye6
30
vulnerability VCID-wgce-vves-guek
31
vulnerability VCID-wqfe-hkrk-nbaj
32
vulnerability VCID-wv5f-6x7x-7fdw
33
vulnerability VCID-wyf3-shyh-qyhc
34
vulnerability VCID-zcxx-ra5c-hyh9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
aliases CVE-2022-21123
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-csy7-esn4-u3gq
3
url VCID-efqu-9zy2-xyh5
vulnerability_id VCID-efqu-9zy2-xyh5
summary microcode: Fast store forward predictor - Cross Domain Training
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0145.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0145.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-0145
reference_id
reference_type
scores
0
value 0.00232
scoring_system epss
scoring_elements 0.45918
published_at 2026-04-01T12:55:00Z
1
value 0.00232
scoring_system epss
scoring_elements 0.45964
published_at 2026-04-02T12:55:00Z
2
value 0.00232
scoring_system epss
scoring_elements 0.4604
published_at 2026-04-18T12:55:00Z
3
value 0.00232
scoring_system epss
scoring_elements 0.45933
published_at 2026-04-07T12:55:00Z
4
value 0.00232
scoring_system epss
scoring_elements 0.45988
published_at 2026-04-13T12:55:00Z
5
value 0.00232
scoring_system epss
scoring_elements 0.46009
published_at 2026-04-11T12:55:00Z
6
value 0.00232
scoring_system epss
scoring_elements 0.45981
published_at 2026-04-12T12:55:00Z
7
value 0.00232
scoring_system epss
scoring_elements 0.46043
published_at 2026-04-16T12:55:00Z
8
value 0.00232
scoring_system epss
scoring_elements 0.45985
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-0145
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0145
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0145
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2049531
reference_id 2049531
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2049531
5
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00561.html
reference_id intel-sa-00561.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:21:56Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00561.html
6
reference_url https://security.netapp.com/advisory/ntap-20220210-0009/
reference_id ntap-20220210-0009
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:21:56Z/
url https://security.netapp.com/advisory/ntap-20220210-0009/
7
reference_url https://usn.ubuntu.com/5486-1/
reference_id USN-5486-1
reference_type
scores
url https://usn.ubuntu.com/5486-1/
8
reference_url https://usn.ubuntu.com/5535-1/
reference_id USN-5535-1
reference_type
scores
url https://usn.ubuntu.com/5535-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20220510.1~deb10u1
purl pkg:deb/debian/intel-microcode@3.20220510.1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1xju-dcmn-ube4
1
vulnerability VCID-2ues-wvyq-6qc9
2
vulnerability VCID-2ytx-vj3b-rfhb
3
vulnerability VCID-3dfb-1sgt-w3a8
4
vulnerability VCID-3y3x-qqep-43ec
5
vulnerability VCID-4429-qf2w-jqg3
6
vulnerability VCID-4bw3-w5hz-ekd1
7
vulnerability VCID-4uuw-pm94-1kak
8
vulnerability VCID-51nr-8avm-qued
9
vulnerability VCID-5cgx-1n9u-gqbh
10
vulnerability VCID-5dq7-wfyt-2uhz
11
vulnerability VCID-5vkn-4rqc-qkbk
12
vulnerability VCID-6ake-v15c-k7aq
13
vulnerability VCID-6mzy-wsz1-cyhf
14
vulnerability VCID-6thk-vf9t-gygs
15
vulnerability VCID-6vn3-vpg9-gfbk
16
vulnerability VCID-75cx-avm7-tfcb
17
vulnerability VCID-7wcy-5hnc-tfh4
18
vulnerability VCID-8nyc-r2e4-17gr
19
vulnerability VCID-8vx6-ctvp-8qeq
20
vulnerability VCID-9en3-y22n-wydw
21
vulnerability VCID-b55f-n1ed-g7eq
22
vulnerability VCID-bzwc-9ueu-gka1
23
vulnerability VCID-csy7-esn4-u3gq
24
vulnerability VCID-dzdf-drjk-m3cj
25
vulnerability VCID-eh71-uhnv-fqeb
26
vulnerability VCID-ejhc-6yqt-gkgv
27
vulnerability VCID-ejsj-eyej-huc6
28
vulnerability VCID-f859-13vd-7uef
29
vulnerability VCID-f91c-4ty9-h7a2
30
vulnerability VCID-fe46-8fs3-p3fd
31
vulnerability VCID-gmr7-umz8-9fhm
32
vulnerability VCID-j4ak-hjn5-guat
33
vulnerability VCID-j6j9-vj4t-bfa6
34
vulnerability VCID-jqnr-61tn-kben
35
vulnerability VCID-jwaz-e1v9-uyep
36
vulnerability VCID-kha2-8ez1-gfhr
37
vulnerability VCID-mekt-8gm1-33ej
38
vulnerability VCID-mu4u-d5mc-kbgk
39
vulnerability VCID-npgb-p786-d3fe
40
vulnerability VCID-p2fk-8snj-x7dy
41
vulnerability VCID-pgps-58ra-1ugy
42
vulnerability VCID-qtg5-1dxw-sfdc
43
vulnerability VCID-qzcy-2xsr-vqeh
44
vulnerability VCID-r46f-12hj-7ybb
45
vulnerability VCID-t56a-46c7-fybe
46
vulnerability VCID-t7rc-zadf-cybq
47
vulnerability VCID-t85u-116v-7uan
48
vulnerability VCID-td6e-x2qb-syg3
49
vulnerability VCID-trxm-8mg3-4bbr
50
vulnerability VCID-uj7d-tpax-fqhd
51
vulnerability VCID-vsda-kq13-73g1
52
vulnerability VCID-w7k1-y36j-3ye6
53
vulnerability VCID-wgce-vves-guek
54
vulnerability VCID-wqfe-hkrk-nbaj
55
vulnerability VCID-wv5f-6x7x-7fdw
56
vulnerability VCID-wyf3-shyh-qyhc
57
vulnerability VCID-xb28-un42-1uag
58
vulnerability VCID-z8gt-jznd-ryht
59
vulnerability VCID-zcxx-ra5c-hyh9
60
vulnerability VCID-ztyd-jwnm-m3gd
61
vulnerability VCID-zx9g-4trv-hfgc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20220510.1~deb10u1
aliases CVE-2021-0145
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-efqu-9zy2-xyh5
4
url VCID-et7e-7pq2-eubr
vulnerability_id VCID-et7e-7pq2-eubr
summary hw: cpu: information disclosure in Intel® Xeon® Scalable Processors
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33117.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33117.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-33117
reference_id
reference_type
scores
0
value 0.00136
scoring_system epss
scoring_elements 0.33276
published_at 2026-04-01T12:55:00Z
1
value 0.00136
scoring_system epss
scoring_elements 0.33411
published_at 2026-04-02T12:55:00Z
2
value 0.00136
scoring_system epss
scoring_elements 0.33312
published_at 2026-04-18T12:55:00Z
3
value 0.00136
scoring_system epss
scoring_elements 0.33358
published_at 2026-04-09T12:55:00Z
4
value 0.00136
scoring_system epss
scoring_elements 0.33361
published_at 2026-04-11T12:55:00Z
5
value 0.00136
scoring_system epss
scoring_elements 0.33319
published_at 2026-04-12T12:55:00Z
6
value 0.00136
scoring_system epss
scoring_elements 0.33296
published_at 2026-04-13T12:55:00Z
7
value 0.00136
scoring_system epss
scoring_elements 0.33336
published_at 2026-04-16T12:55:00Z
8
value 0.00136
scoring_system epss
scoring_elements 0.33442
published_at 2026-04-04T12:55:00Z
9
value 0.00136
scoring_system epss
scoring_elements 0.33281
published_at 2026-04-07T12:55:00Z
10
value 0.00136
scoring_system epss
scoring_elements 0.33324
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-33117
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33117
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33117
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2086729
reference_id 2086729
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2086729
5
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00586.html
reference_id intel-sa-00586.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:51Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00586.html
6
reference_url https://security.netapp.com/advisory/ntap-20220818-0001/
reference_id ntap-20220818-0001
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:51Z/
url https://security.netapp.com/advisory/ntap-20220818-0001/
7
reference_url https://usn.ubuntu.com/5486-1/
reference_id USN-5486-1
reference_type
scores
url https://usn.ubuntu.com/5486-1/
8
reference_url https://usn.ubuntu.com/5535-1/
reference_id USN-5535-1
reference_type
scores
url https://usn.ubuntu.com/5535-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20220510.1~deb10u1
purl pkg:deb/debian/intel-microcode@3.20220510.1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1xju-dcmn-ube4
1
vulnerability VCID-2ues-wvyq-6qc9
2
vulnerability VCID-2ytx-vj3b-rfhb
3
vulnerability VCID-3dfb-1sgt-w3a8
4
vulnerability VCID-3y3x-qqep-43ec
5
vulnerability VCID-4429-qf2w-jqg3
6
vulnerability VCID-4bw3-w5hz-ekd1
7
vulnerability VCID-4uuw-pm94-1kak
8
vulnerability VCID-51nr-8avm-qued
9
vulnerability VCID-5cgx-1n9u-gqbh
10
vulnerability VCID-5dq7-wfyt-2uhz
11
vulnerability VCID-5vkn-4rqc-qkbk
12
vulnerability VCID-6ake-v15c-k7aq
13
vulnerability VCID-6mzy-wsz1-cyhf
14
vulnerability VCID-6thk-vf9t-gygs
15
vulnerability VCID-6vn3-vpg9-gfbk
16
vulnerability VCID-75cx-avm7-tfcb
17
vulnerability VCID-7wcy-5hnc-tfh4
18
vulnerability VCID-8nyc-r2e4-17gr
19
vulnerability VCID-8vx6-ctvp-8qeq
20
vulnerability VCID-9en3-y22n-wydw
21
vulnerability VCID-b55f-n1ed-g7eq
22
vulnerability VCID-bzwc-9ueu-gka1
23
vulnerability VCID-csy7-esn4-u3gq
24
vulnerability VCID-dzdf-drjk-m3cj
25
vulnerability VCID-eh71-uhnv-fqeb
26
vulnerability VCID-ejhc-6yqt-gkgv
27
vulnerability VCID-ejsj-eyej-huc6
28
vulnerability VCID-f859-13vd-7uef
29
vulnerability VCID-f91c-4ty9-h7a2
30
vulnerability VCID-fe46-8fs3-p3fd
31
vulnerability VCID-gmr7-umz8-9fhm
32
vulnerability VCID-j4ak-hjn5-guat
33
vulnerability VCID-j6j9-vj4t-bfa6
34
vulnerability VCID-jqnr-61tn-kben
35
vulnerability VCID-jwaz-e1v9-uyep
36
vulnerability VCID-kha2-8ez1-gfhr
37
vulnerability VCID-mekt-8gm1-33ej
38
vulnerability VCID-mu4u-d5mc-kbgk
39
vulnerability VCID-npgb-p786-d3fe
40
vulnerability VCID-p2fk-8snj-x7dy
41
vulnerability VCID-pgps-58ra-1ugy
42
vulnerability VCID-qtg5-1dxw-sfdc
43
vulnerability VCID-qzcy-2xsr-vqeh
44
vulnerability VCID-r46f-12hj-7ybb
45
vulnerability VCID-t56a-46c7-fybe
46
vulnerability VCID-t7rc-zadf-cybq
47
vulnerability VCID-t85u-116v-7uan
48
vulnerability VCID-td6e-x2qb-syg3
49
vulnerability VCID-trxm-8mg3-4bbr
50
vulnerability VCID-uj7d-tpax-fqhd
51
vulnerability VCID-vsda-kq13-73g1
52
vulnerability VCID-w7k1-y36j-3ye6
53
vulnerability VCID-wgce-vves-guek
54
vulnerability VCID-wqfe-hkrk-nbaj
55
vulnerability VCID-wv5f-6x7x-7fdw
56
vulnerability VCID-wyf3-shyh-qyhc
57
vulnerability VCID-xb28-un42-1uag
58
vulnerability VCID-z8gt-jznd-ryht
59
vulnerability VCID-zcxx-ra5c-hyh9
60
vulnerability VCID-ztyd-jwnm-m3gd
61
vulnerability VCID-zx9g-4trv-hfgc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20220510.1~deb10u1
aliases CVE-2021-33117
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-et7e-7pq2-eubr
5
url VCID-f85r-c2em-vkhg
vulnerability_id VCID-f85r-c2em-vkhg
summary microcode: Out of bounds read for some Intel Atom processors
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33120.json
reference_id
reference_type
scores
0
value 3.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33120.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-33120
reference_id
reference_type
scores
0
value 0.00686
scoring_system epss
scoring_elements 0.71644
published_at 2026-04-01T12:55:00Z
1
value 0.00686
scoring_system epss
scoring_elements 0.71651
published_at 2026-04-02T12:55:00Z
2
value 0.00686
scoring_system epss
scoring_elements 0.7173
published_at 2026-04-18T12:55:00Z
3
value 0.00686
scoring_system epss
scoring_elements 0.71699
published_at 2026-04-12T12:55:00Z
4
value 0.00686
scoring_system epss
scoring_elements 0.71681
published_at 2026-04-13T12:55:00Z
5
value 0.00686
scoring_system epss
scoring_elements 0.71724
published_at 2026-04-16T12:55:00Z
6
value 0.00686
scoring_system epss
scoring_elements 0.71669
published_at 2026-04-04T12:55:00Z
7
value 0.00686
scoring_system epss
scoring_elements 0.71642
published_at 2026-04-07T12:55:00Z
8
value 0.00686
scoring_system epss
scoring_elements 0.71682
published_at 2026-04-08T12:55:00Z
9
value 0.00686
scoring_system epss
scoring_elements 0.71692
published_at 2026-04-09T12:55:00Z
10
value 0.00686
scoring_system epss
scoring_elements 0.71716
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-33120
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33120
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33120
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2049558
reference_id 2049558
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2049558
5
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00589.html
reference_id intel-sa-00589.html
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:21:22Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00589.html
6
reference_url https://usn.ubuntu.com/5486-1/
reference_id USN-5486-1
reference_type
scores
url https://usn.ubuntu.com/5486-1/
7
reference_url https://usn.ubuntu.com/5535-1/
reference_id USN-5535-1
reference_type
scores
url https://usn.ubuntu.com/5535-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20220510.1~deb10u1
purl pkg:deb/debian/intel-microcode@3.20220510.1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1xju-dcmn-ube4
1
vulnerability VCID-2ues-wvyq-6qc9
2
vulnerability VCID-2ytx-vj3b-rfhb
3
vulnerability VCID-3dfb-1sgt-w3a8
4
vulnerability VCID-3y3x-qqep-43ec
5
vulnerability VCID-4429-qf2w-jqg3
6
vulnerability VCID-4bw3-w5hz-ekd1
7
vulnerability VCID-4uuw-pm94-1kak
8
vulnerability VCID-51nr-8avm-qued
9
vulnerability VCID-5cgx-1n9u-gqbh
10
vulnerability VCID-5dq7-wfyt-2uhz
11
vulnerability VCID-5vkn-4rqc-qkbk
12
vulnerability VCID-6ake-v15c-k7aq
13
vulnerability VCID-6mzy-wsz1-cyhf
14
vulnerability VCID-6thk-vf9t-gygs
15
vulnerability VCID-6vn3-vpg9-gfbk
16
vulnerability VCID-75cx-avm7-tfcb
17
vulnerability VCID-7wcy-5hnc-tfh4
18
vulnerability VCID-8nyc-r2e4-17gr
19
vulnerability VCID-8vx6-ctvp-8qeq
20
vulnerability VCID-9en3-y22n-wydw
21
vulnerability VCID-b55f-n1ed-g7eq
22
vulnerability VCID-bzwc-9ueu-gka1
23
vulnerability VCID-csy7-esn4-u3gq
24
vulnerability VCID-dzdf-drjk-m3cj
25
vulnerability VCID-eh71-uhnv-fqeb
26
vulnerability VCID-ejhc-6yqt-gkgv
27
vulnerability VCID-ejsj-eyej-huc6
28
vulnerability VCID-f859-13vd-7uef
29
vulnerability VCID-f91c-4ty9-h7a2
30
vulnerability VCID-fe46-8fs3-p3fd
31
vulnerability VCID-gmr7-umz8-9fhm
32
vulnerability VCID-j4ak-hjn5-guat
33
vulnerability VCID-j6j9-vj4t-bfa6
34
vulnerability VCID-jqnr-61tn-kben
35
vulnerability VCID-jwaz-e1v9-uyep
36
vulnerability VCID-kha2-8ez1-gfhr
37
vulnerability VCID-mekt-8gm1-33ej
38
vulnerability VCID-mu4u-d5mc-kbgk
39
vulnerability VCID-npgb-p786-d3fe
40
vulnerability VCID-p2fk-8snj-x7dy
41
vulnerability VCID-pgps-58ra-1ugy
42
vulnerability VCID-qtg5-1dxw-sfdc
43
vulnerability VCID-qzcy-2xsr-vqeh
44
vulnerability VCID-r46f-12hj-7ybb
45
vulnerability VCID-t56a-46c7-fybe
46
vulnerability VCID-t7rc-zadf-cybq
47
vulnerability VCID-t85u-116v-7uan
48
vulnerability VCID-td6e-x2qb-syg3
49
vulnerability VCID-trxm-8mg3-4bbr
50
vulnerability VCID-uj7d-tpax-fqhd
51
vulnerability VCID-vsda-kq13-73g1
52
vulnerability VCID-w7k1-y36j-3ye6
53
vulnerability VCID-wgce-vves-guek
54
vulnerability VCID-wqfe-hkrk-nbaj
55
vulnerability VCID-wv5f-6x7x-7fdw
56
vulnerability VCID-wyf3-shyh-qyhc
57
vulnerability VCID-xb28-un42-1uag
58
vulnerability VCID-z8gt-jznd-ryht
59
vulnerability VCID-zcxx-ra5c-hyh9
60
vulnerability VCID-ztyd-jwnm-m3gd
61
vulnerability VCID-zx9g-4trv-hfgc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20220510.1~deb10u1
aliases CVE-2021-33120
risk_score 1.6
exploitability 0.5
weighted_severity 3.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f85r-c2em-vkhg
6
url VCID-g5ab-2m1x-yqat
vulnerability_id VCID-g5ab-2m1x-yqat
summary hw: improper isolation of shared resources in some Intel Processors
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-24511.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-24511.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-24511
reference_id
reference_type
scores
0
value 0.00063
scoring_system epss
scoring_elements 0.19504
published_at 2026-04-01T12:55:00Z
1
value 0.00063
scoring_system epss
scoring_elements 0.19404
published_at 2026-04-18T12:55:00Z
2
value 0.00063
scoring_system epss
scoring_elements 0.19436
published_at 2026-04-13T12:55:00Z
3
value 0.00063
scoring_system epss
scoring_elements 0.19396
published_at 2026-04-16T12:55:00Z
4
value 0.00063
scoring_system epss
scoring_elements 0.19639
published_at 2026-04-02T12:55:00Z
5
value 0.00063
scoring_system epss
scoring_elements 0.19687
published_at 2026-04-04T12:55:00Z
6
value 0.00063
scoring_system epss
scoring_elements 0.19408
published_at 2026-04-07T12:55:00Z
7
value 0.00063
scoring_system epss
scoring_elements 0.19486
published_at 2026-04-08T12:55:00Z
8
value 0.00063
scoring_system epss
scoring_elements 0.19538
published_at 2026-04-09T12:55:00Z
9
value 0.00063
scoring_system epss
scoring_elements 0.19541
published_at 2026-04-11T12:55:00Z
10
value 0.00063
scoring_system epss
scoring_elements 0.19494
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-24511
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24489
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24511
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24512
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24513
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1962702
reference_id 1962702
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1962702
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989615
reference_id 989615
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989615
9
reference_url https://security.archlinux.org/ASA-202106-34
reference_id ASA-202106-34
reference_type
scores
url https://security.archlinux.org/ASA-202106-34
10
reference_url https://security.archlinux.org/AVG-2051
reference_id AVG-2051
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2051
11
reference_url https://access.redhat.com/errata/RHSA-2021:2299
reference_id RHSA-2021:2299
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2299
12
reference_url https://access.redhat.com/errata/RHSA-2021:2300
reference_id RHSA-2021:2300
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2300
13
reference_url https://access.redhat.com/errata/RHSA-2021:2301
reference_id RHSA-2021:2301
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2301
14
reference_url https://access.redhat.com/errata/RHSA-2021:2302
reference_id RHSA-2021:2302
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2302
15
reference_url https://access.redhat.com/errata/RHSA-2021:2303
reference_id RHSA-2021:2303
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2303
16
reference_url https://access.redhat.com/errata/RHSA-2021:2304
reference_id RHSA-2021:2304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2304
17
reference_url https://access.redhat.com/errata/RHSA-2021:2305
reference_id RHSA-2021:2305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2305
18
reference_url https://access.redhat.com/errata/RHSA-2021:2306
reference_id RHSA-2021:2306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2306
19
reference_url https://access.redhat.com/errata/RHSA-2021:2307
reference_id RHSA-2021:2307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2307
20
reference_url https://access.redhat.com/errata/RHSA-2021:2308
reference_id RHSA-2021:2308
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2308
21
reference_url https://access.redhat.com/errata/RHSA-2021:3027
reference_id RHSA-2021:3027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3027
22
reference_url https://access.redhat.com/errata/RHSA-2021:3028
reference_id RHSA-2021:3028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3028
23
reference_url https://access.redhat.com/errata/RHSA-2021:3029
reference_id RHSA-2021:3029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3029
24
reference_url https://access.redhat.com/errata/RHSA-2021:3176
reference_id RHSA-2021:3176
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3176
25
reference_url https://access.redhat.com/errata/RHSA-2021:3255
reference_id RHSA-2021:3255
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3255
26
reference_url https://access.redhat.com/errata/RHSA-2021:3317
reference_id RHSA-2021:3317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3317
27
reference_url https://access.redhat.com/errata/RHSA-2021:3322
reference_id RHSA-2021:3322
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3322
28
reference_url https://access.redhat.com/errata/RHSA-2021:3323
reference_id RHSA-2021:3323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3323
29
reference_url https://access.redhat.com/errata/RHSA-2021:3364
reference_id RHSA-2021:3364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3364
30
reference_url https://usn.ubuntu.com/4985-1/
reference_id USN-4985-1
reference_type
scores
url https://usn.ubuntu.com/4985-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20220510.1~deb10u1
purl pkg:deb/debian/intel-microcode@3.20220510.1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1xju-dcmn-ube4
1
vulnerability VCID-2ues-wvyq-6qc9
2
vulnerability VCID-2ytx-vj3b-rfhb
3
vulnerability VCID-3dfb-1sgt-w3a8
4
vulnerability VCID-3y3x-qqep-43ec
5
vulnerability VCID-4429-qf2w-jqg3
6
vulnerability VCID-4bw3-w5hz-ekd1
7
vulnerability VCID-4uuw-pm94-1kak
8
vulnerability VCID-51nr-8avm-qued
9
vulnerability VCID-5cgx-1n9u-gqbh
10
vulnerability VCID-5dq7-wfyt-2uhz
11
vulnerability VCID-5vkn-4rqc-qkbk
12
vulnerability VCID-6ake-v15c-k7aq
13
vulnerability VCID-6mzy-wsz1-cyhf
14
vulnerability VCID-6thk-vf9t-gygs
15
vulnerability VCID-6vn3-vpg9-gfbk
16
vulnerability VCID-75cx-avm7-tfcb
17
vulnerability VCID-7wcy-5hnc-tfh4
18
vulnerability VCID-8nyc-r2e4-17gr
19
vulnerability VCID-8vx6-ctvp-8qeq
20
vulnerability VCID-9en3-y22n-wydw
21
vulnerability VCID-b55f-n1ed-g7eq
22
vulnerability VCID-bzwc-9ueu-gka1
23
vulnerability VCID-csy7-esn4-u3gq
24
vulnerability VCID-dzdf-drjk-m3cj
25
vulnerability VCID-eh71-uhnv-fqeb
26
vulnerability VCID-ejhc-6yqt-gkgv
27
vulnerability VCID-ejsj-eyej-huc6
28
vulnerability VCID-f859-13vd-7uef
29
vulnerability VCID-f91c-4ty9-h7a2
30
vulnerability VCID-fe46-8fs3-p3fd
31
vulnerability VCID-gmr7-umz8-9fhm
32
vulnerability VCID-j4ak-hjn5-guat
33
vulnerability VCID-j6j9-vj4t-bfa6
34
vulnerability VCID-jqnr-61tn-kben
35
vulnerability VCID-jwaz-e1v9-uyep
36
vulnerability VCID-kha2-8ez1-gfhr
37
vulnerability VCID-mekt-8gm1-33ej
38
vulnerability VCID-mu4u-d5mc-kbgk
39
vulnerability VCID-npgb-p786-d3fe
40
vulnerability VCID-p2fk-8snj-x7dy
41
vulnerability VCID-pgps-58ra-1ugy
42
vulnerability VCID-qtg5-1dxw-sfdc
43
vulnerability VCID-qzcy-2xsr-vqeh
44
vulnerability VCID-r46f-12hj-7ybb
45
vulnerability VCID-t56a-46c7-fybe
46
vulnerability VCID-t7rc-zadf-cybq
47
vulnerability VCID-t85u-116v-7uan
48
vulnerability VCID-td6e-x2qb-syg3
49
vulnerability VCID-trxm-8mg3-4bbr
50
vulnerability VCID-uj7d-tpax-fqhd
51
vulnerability VCID-vsda-kq13-73g1
52
vulnerability VCID-w7k1-y36j-3ye6
53
vulnerability VCID-wgce-vves-guek
54
vulnerability VCID-wqfe-hkrk-nbaj
55
vulnerability VCID-wv5f-6x7x-7fdw
56
vulnerability VCID-wyf3-shyh-qyhc
57
vulnerability VCID-xb28-un42-1uag
58
vulnerability VCID-z8gt-jznd-ryht
59
vulnerability VCID-zcxx-ra5c-hyh9
60
vulnerability VCID-ztyd-jwnm-m3gd
61
vulnerability VCID-zx9g-4trv-hfgc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20220510.1~deb10u1
aliases CVE-2020-24511
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g5ab-2m1x-yqat
7
url VCID-grm7-9n9w-ffc2
vulnerability_id VCID-grm7-9n9w-ffc2
summary Multiple vulnerabilities have been discovered in intel-microcode, the worst of which can lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0127.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0127.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-0127
reference_id
reference_type
scores
0
value 0.00073
scoring_system epss
scoring_elements 0.22155
published_at 2026-04-01T12:55:00Z
1
value 0.00073
scoring_system epss
scoring_elements 0.22313
published_at 2026-04-02T12:55:00Z
2
value 0.00073
scoring_system epss
scoring_elements 0.22192
published_at 2026-04-18T12:55:00Z
3
value 0.00073
scoring_system epss
scoring_elements 0.22278
published_at 2026-04-09T12:55:00Z
4
value 0.00073
scoring_system epss
scoring_elements 0.22299
published_at 2026-04-11T12:55:00Z
5
value 0.00073
scoring_system epss
scoring_elements 0.22257
published_at 2026-04-12T12:55:00Z
6
value 0.00073
scoring_system epss
scoring_elements 0.22197
published_at 2026-04-13T12:55:00Z
7
value 0.00073
scoring_system epss
scoring_elements 0.22199
published_at 2026-04-16T12:55:00Z
8
value 0.00073
scoring_system epss
scoring_elements 0.22357
published_at 2026-04-04T12:55:00Z
9
value 0.00073
scoring_system epss
scoring_elements 0.22141
published_at 2026-04-07T12:55:00Z
10
value 0.00073
scoring_system epss
scoring_elements 0.22224
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-0127
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0127
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0127
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2049528
reference_id 2049528
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2049528
5
reference_url https://security.gentoo.org/glsa/202402-22
reference_id GLSA-202402-22
reference_type
scores
url https://security.gentoo.org/glsa/202402-22
6
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html
reference_id intel-sa-00532.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:21:55Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html
7
reference_url https://security.netapp.com/advisory/ntap-20220210-0008/
reference_id ntap-20220210-0008
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:21:55Z/
url https://security.netapp.com/advisory/ntap-20220210-0008/
8
reference_url https://usn.ubuntu.com/5486-1/
reference_id USN-5486-1
reference_type
scores
url https://usn.ubuntu.com/5486-1/
9
reference_url https://usn.ubuntu.com/5535-1/
reference_id USN-5535-1
reference_type
scores
url https://usn.ubuntu.com/5535-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20220510.1~deb10u1
purl pkg:deb/debian/intel-microcode@3.20220510.1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1xju-dcmn-ube4
1
vulnerability VCID-2ues-wvyq-6qc9
2
vulnerability VCID-2ytx-vj3b-rfhb
3
vulnerability VCID-3dfb-1sgt-w3a8
4
vulnerability VCID-3y3x-qqep-43ec
5
vulnerability VCID-4429-qf2w-jqg3
6
vulnerability VCID-4bw3-w5hz-ekd1
7
vulnerability VCID-4uuw-pm94-1kak
8
vulnerability VCID-51nr-8avm-qued
9
vulnerability VCID-5cgx-1n9u-gqbh
10
vulnerability VCID-5dq7-wfyt-2uhz
11
vulnerability VCID-5vkn-4rqc-qkbk
12
vulnerability VCID-6ake-v15c-k7aq
13
vulnerability VCID-6mzy-wsz1-cyhf
14
vulnerability VCID-6thk-vf9t-gygs
15
vulnerability VCID-6vn3-vpg9-gfbk
16
vulnerability VCID-75cx-avm7-tfcb
17
vulnerability VCID-7wcy-5hnc-tfh4
18
vulnerability VCID-8nyc-r2e4-17gr
19
vulnerability VCID-8vx6-ctvp-8qeq
20
vulnerability VCID-9en3-y22n-wydw
21
vulnerability VCID-b55f-n1ed-g7eq
22
vulnerability VCID-bzwc-9ueu-gka1
23
vulnerability VCID-csy7-esn4-u3gq
24
vulnerability VCID-dzdf-drjk-m3cj
25
vulnerability VCID-eh71-uhnv-fqeb
26
vulnerability VCID-ejhc-6yqt-gkgv
27
vulnerability VCID-ejsj-eyej-huc6
28
vulnerability VCID-f859-13vd-7uef
29
vulnerability VCID-f91c-4ty9-h7a2
30
vulnerability VCID-fe46-8fs3-p3fd
31
vulnerability VCID-gmr7-umz8-9fhm
32
vulnerability VCID-j4ak-hjn5-guat
33
vulnerability VCID-j6j9-vj4t-bfa6
34
vulnerability VCID-jqnr-61tn-kben
35
vulnerability VCID-jwaz-e1v9-uyep
36
vulnerability VCID-kha2-8ez1-gfhr
37
vulnerability VCID-mekt-8gm1-33ej
38
vulnerability VCID-mu4u-d5mc-kbgk
39
vulnerability VCID-npgb-p786-d3fe
40
vulnerability VCID-p2fk-8snj-x7dy
41
vulnerability VCID-pgps-58ra-1ugy
42
vulnerability VCID-qtg5-1dxw-sfdc
43
vulnerability VCID-qzcy-2xsr-vqeh
44
vulnerability VCID-r46f-12hj-7ybb
45
vulnerability VCID-t56a-46c7-fybe
46
vulnerability VCID-t7rc-zadf-cybq
47
vulnerability VCID-t85u-116v-7uan
48
vulnerability VCID-td6e-x2qb-syg3
49
vulnerability VCID-trxm-8mg3-4bbr
50
vulnerability VCID-uj7d-tpax-fqhd
51
vulnerability VCID-vsda-kq13-73g1
52
vulnerability VCID-w7k1-y36j-3ye6
53
vulnerability VCID-wgce-vves-guek
54
vulnerability VCID-wqfe-hkrk-nbaj
55
vulnerability VCID-wv5f-6x7x-7fdw
56
vulnerability VCID-wyf3-shyh-qyhc
57
vulnerability VCID-xb28-un42-1uag
58
vulnerability VCID-z8gt-jznd-ryht
59
vulnerability VCID-zcxx-ra5c-hyh9
60
vulnerability VCID-ztyd-jwnm-m3gd
61
vulnerability VCID-zx9g-4trv-hfgc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20220510.1~deb10u1
aliases CVE-2021-0127
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-grm7-9n9w-ffc2
8
url VCID-jezv-tu74-b3ae
vulnerability_id VCID-jezv-tu74-b3ae
summary hw: Information disclosure issue in Intel SGX via RAPL interface
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8695.json
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8695.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-8695
reference_id
reference_type
scores
0
value 0.00148
scoring_system epss
scoring_elements 0.35081
published_at 2026-04-01T12:55:00Z
1
value 0.00148
scoring_system epss
scoring_elements 0.35282
published_at 2026-04-02T12:55:00Z
2
value 0.00148
scoring_system epss
scoring_elements 0.3531
published_at 2026-04-04T12:55:00Z
3
value 0.00148
scoring_system epss
scoring_elements 0.35191
published_at 2026-04-07T12:55:00Z
4
value 0.00148
scoring_system epss
scoring_elements 0.35236
published_at 2026-04-08T12:55:00Z
5
value 0.00148
scoring_system epss
scoring_elements 0.35262
published_at 2026-04-09T12:55:00Z
6
value 0.00148
scoring_system epss
scoring_elements 0.35265
published_at 2026-04-11T12:55:00Z
7
value 0.00148
scoring_system epss
scoring_elements 0.35229
published_at 2026-04-12T12:55:00Z
8
value 0.00148
scoring_system epss
scoring_elements 0.35205
published_at 2026-04-13T12:55:00Z
9
value 0.00148
scoring_system epss
scoring_elements 0.35244
published_at 2026-04-16T12:55:00Z
10
value 0.00148
scoring_system epss
scoring_elements 0.3523
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-8695
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8695
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1828583
reference_id 1828583
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1828583
5
reference_url https://access.redhat.com/errata/RHSA-2020:5083
reference_id RHSA-2020:5083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5083
6
reference_url https://access.redhat.com/errata/RHSA-2020:5085
reference_id RHSA-2020:5085
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5085
7
reference_url https://access.redhat.com/errata/RHSA-2020:5181
reference_id RHSA-2020:5181
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5181
8
reference_url https://access.redhat.com/errata/RHSA-2020:5182
reference_id RHSA-2020:5182
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5182
9
reference_url https://access.redhat.com/errata/RHSA-2020:5183
reference_id RHSA-2020:5183
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5183
10
reference_url https://access.redhat.com/errata/RHSA-2020:5185
reference_id RHSA-2020:5185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5185
11
reference_url https://access.redhat.com/errata/RHSA-2020:5186
reference_id RHSA-2020:5186
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5186
12
reference_url https://access.redhat.com/errata/RHSA-2020:5188
reference_id RHSA-2020:5188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5188
13
reference_url https://access.redhat.com/errata/RHSA-2020:5190
reference_id RHSA-2020:5190
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5190
14
reference_url https://access.redhat.com/errata/RHSA-2020:5369
reference_id RHSA-2020:5369
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5369
15
reference_url https://access.redhat.com/errata/RHSA-2021:3027
reference_id RHSA-2021:3027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3027
16
reference_url https://access.redhat.com/errata/RHSA-2021:3028
reference_id RHSA-2021:3028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3028
17
reference_url https://access.redhat.com/errata/RHSA-2021:3029
reference_id RHSA-2021:3029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3029
18
reference_url https://access.redhat.com/errata/RHSA-2021:3176
reference_id RHSA-2021:3176
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3176
19
reference_url https://access.redhat.com/errata/RHSA-2021:3255
reference_id RHSA-2021:3255
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3255
20
reference_url https://access.redhat.com/errata/RHSA-2021:3317
reference_id RHSA-2021:3317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3317
21
reference_url https://access.redhat.com/errata/RHSA-2021:3322
reference_id RHSA-2021:3322
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3322
22
reference_url https://access.redhat.com/errata/RHSA-2021:3323
reference_id RHSA-2021:3323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3323
23
reference_url https://access.redhat.com/errata/RHSA-2021:3364
reference_id RHSA-2021:3364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3364
24
reference_url https://usn.ubuntu.com/4628-1/
reference_id USN-4628-1
reference_type
scores
url https://usn.ubuntu.com/4628-1/
25
reference_url https://usn.ubuntu.com/4628-3/
reference_id USN-4628-3
reference_type
scores
url https://usn.ubuntu.com/4628-3/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20220510.1~deb10u1
purl pkg:deb/debian/intel-microcode@3.20220510.1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1xju-dcmn-ube4
1
vulnerability VCID-2ues-wvyq-6qc9
2
vulnerability VCID-2ytx-vj3b-rfhb
3
vulnerability VCID-3dfb-1sgt-w3a8
4
vulnerability VCID-3y3x-qqep-43ec
5
vulnerability VCID-4429-qf2w-jqg3
6
vulnerability VCID-4bw3-w5hz-ekd1
7
vulnerability VCID-4uuw-pm94-1kak
8
vulnerability VCID-51nr-8avm-qued
9
vulnerability VCID-5cgx-1n9u-gqbh
10
vulnerability VCID-5dq7-wfyt-2uhz
11
vulnerability VCID-5vkn-4rqc-qkbk
12
vulnerability VCID-6ake-v15c-k7aq
13
vulnerability VCID-6mzy-wsz1-cyhf
14
vulnerability VCID-6thk-vf9t-gygs
15
vulnerability VCID-6vn3-vpg9-gfbk
16
vulnerability VCID-75cx-avm7-tfcb
17
vulnerability VCID-7wcy-5hnc-tfh4
18
vulnerability VCID-8nyc-r2e4-17gr
19
vulnerability VCID-8vx6-ctvp-8qeq
20
vulnerability VCID-9en3-y22n-wydw
21
vulnerability VCID-b55f-n1ed-g7eq
22
vulnerability VCID-bzwc-9ueu-gka1
23
vulnerability VCID-csy7-esn4-u3gq
24
vulnerability VCID-dzdf-drjk-m3cj
25
vulnerability VCID-eh71-uhnv-fqeb
26
vulnerability VCID-ejhc-6yqt-gkgv
27
vulnerability VCID-ejsj-eyej-huc6
28
vulnerability VCID-f859-13vd-7uef
29
vulnerability VCID-f91c-4ty9-h7a2
30
vulnerability VCID-fe46-8fs3-p3fd
31
vulnerability VCID-gmr7-umz8-9fhm
32
vulnerability VCID-j4ak-hjn5-guat
33
vulnerability VCID-j6j9-vj4t-bfa6
34
vulnerability VCID-jqnr-61tn-kben
35
vulnerability VCID-jwaz-e1v9-uyep
36
vulnerability VCID-kha2-8ez1-gfhr
37
vulnerability VCID-mekt-8gm1-33ej
38
vulnerability VCID-mu4u-d5mc-kbgk
39
vulnerability VCID-npgb-p786-d3fe
40
vulnerability VCID-p2fk-8snj-x7dy
41
vulnerability VCID-pgps-58ra-1ugy
42
vulnerability VCID-qtg5-1dxw-sfdc
43
vulnerability VCID-qzcy-2xsr-vqeh
44
vulnerability VCID-r46f-12hj-7ybb
45
vulnerability VCID-t56a-46c7-fybe
46
vulnerability VCID-t7rc-zadf-cybq
47
vulnerability VCID-t85u-116v-7uan
48
vulnerability VCID-td6e-x2qb-syg3
49
vulnerability VCID-trxm-8mg3-4bbr
50
vulnerability VCID-uj7d-tpax-fqhd
51
vulnerability VCID-vsda-kq13-73g1
52
vulnerability VCID-w7k1-y36j-3ye6
53
vulnerability VCID-wgce-vves-guek
54
vulnerability VCID-wqfe-hkrk-nbaj
55
vulnerability VCID-wv5f-6x7x-7fdw
56
vulnerability VCID-wyf3-shyh-qyhc
57
vulnerability VCID-xb28-un42-1uag
58
vulnerability VCID-z8gt-jznd-ryht
59
vulnerability VCID-zcxx-ra5c-hyh9
60
vulnerability VCID-ztyd-jwnm-m3gd
61
vulnerability VCID-zx9g-4trv-hfgc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20220510.1~deb10u1
aliases CVE-2020-8695
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jezv-tu74-b3ae
9
url VCID-juy7-j265-cfax
vulnerability_id VCID-juy7-j265-cfax
summary hw: Vector Register Leakage-Active
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8696.json
reference_id
reference_type
scores
0
value 2.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8696.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-8696
reference_id
reference_type
scores
0
value 0.00243
scoring_system epss
scoring_elements 0.47512
published_at 2026-04-01T12:55:00Z
1
value 0.00243
scoring_system epss
scoring_elements 0.4762
published_at 2026-04-18T12:55:00Z
2
value 0.00243
scoring_system epss
scoring_elements 0.4757
published_at 2026-04-13T12:55:00Z
3
value 0.00243
scoring_system epss
scoring_elements 0.47628
published_at 2026-04-16T12:55:00Z
4
value 0.00243
scoring_system epss
scoring_elements 0.47541
published_at 2026-04-02T12:55:00Z
5
value 0.00243
scoring_system epss
scoring_elements 0.47561
published_at 2026-04-12T12:55:00Z
6
value 0.00243
scoring_system epss
scoring_elements 0.4751
published_at 2026-04-07T12:55:00Z
7
value 0.00243
scoring_system epss
scoring_elements 0.47565
published_at 2026-04-08T12:55:00Z
8
value 0.00243
scoring_system epss
scoring_elements 0.47585
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-8696
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8696
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890355
reference_id 1890355
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890355
5
reference_url https://security.archlinux.org/ASA-202102-34
reference_id ASA-202102-34
reference_type
scores
url https://security.archlinux.org/ASA-202102-34
6
reference_url https://security.archlinux.org/AVG-1588
reference_id AVG-1588
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1588
7
reference_url https://access.redhat.com/errata/RHSA-2020:5083
reference_id RHSA-2020:5083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5083
8
reference_url https://access.redhat.com/errata/RHSA-2020:5084
reference_id RHSA-2020:5084
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5084
9
reference_url https://access.redhat.com/errata/RHSA-2020:5085
reference_id RHSA-2020:5085
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5085
10
reference_url https://access.redhat.com/errata/RHSA-2020:5181
reference_id RHSA-2020:5181
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5181
11
reference_url https://access.redhat.com/errata/RHSA-2020:5182
reference_id RHSA-2020:5182
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5182
12
reference_url https://access.redhat.com/errata/RHSA-2020:5183
reference_id RHSA-2020:5183
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5183
13
reference_url https://access.redhat.com/errata/RHSA-2020:5184
reference_id RHSA-2020:5184
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5184
14
reference_url https://access.redhat.com/errata/RHSA-2020:5185
reference_id RHSA-2020:5185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5185
15
reference_url https://access.redhat.com/errata/RHSA-2020:5186
reference_id RHSA-2020:5186
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5186
16
reference_url https://access.redhat.com/errata/RHSA-2020:5188
reference_id RHSA-2020:5188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5188
17
reference_url https://access.redhat.com/errata/RHSA-2020:5189
reference_id RHSA-2020:5189
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5189
18
reference_url https://access.redhat.com/errata/RHSA-2020:5190
reference_id RHSA-2020:5190
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5190
19
reference_url https://access.redhat.com/errata/RHSA-2020:5369
reference_id RHSA-2020:5369
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5369
20
reference_url https://access.redhat.com/errata/RHSA-2021:3027
reference_id RHSA-2021:3027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3027
21
reference_url https://access.redhat.com/errata/RHSA-2021:3028
reference_id RHSA-2021:3028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3028
22
reference_url https://access.redhat.com/errata/RHSA-2021:3029
reference_id RHSA-2021:3029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3029
23
reference_url https://access.redhat.com/errata/RHSA-2021:3176
reference_id RHSA-2021:3176
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3176
24
reference_url https://access.redhat.com/errata/RHSA-2021:3255
reference_id RHSA-2021:3255
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3255
25
reference_url https://access.redhat.com/errata/RHSA-2021:3317
reference_id RHSA-2021:3317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3317
26
reference_url https://access.redhat.com/errata/RHSA-2021:3322
reference_id RHSA-2021:3322
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3322
27
reference_url https://access.redhat.com/errata/RHSA-2021:3323
reference_id RHSA-2021:3323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3323
28
reference_url https://access.redhat.com/errata/RHSA-2021:3364
reference_id RHSA-2021:3364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3364
29
reference_url https://usn.ubuntu.com/4628-1/
reference_id USN-4628-1
reference_type
scores
url https://usn.ubuntu.com/4628-1/
30
reference_url https://usn.ubuntu.com/4628-3/
reference_id USN-4628-3
reference_type
scores
url https://usn.ubuntu.com/4628-3/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20220510.1~deb10u1
purl pkg:deb/debian/intel-microcode@3.20220510.1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1xju-dcmn-ube4
1
vulnerability VCID-2ues-wvyq-6qc9
2
vulnerability VCID-2ytx-vj3b-rfhb
3
vulnerability VCID-3dfb-1sgt-w3a8
4
vulnerability VCID-3y3x-qqep-43ec
5
vulnerability VCID-4429-qf2w-jqg3
6
vulnerability VCID-4bw3-w5hz-ekd1
7
vulnerability VCID-4uuw-pm94-1kak
8
vulnerability VCID-51nr-8avm-qued
9
vulnerability VCID-5cgx-1n9u-gqbh
10
vulnerability VCID-5dq7-wfyt-2uhz
11
vulnerability VCID-5vkn-4rqc-qkbk
12
vulnerability VCID-6ake-v15c-k7aq
13
vulnerability VCID-6mzy-wsz1-cyhf
14
vulnerability VCID-6thk-vf9t-gygs
15
vulnerability VCID-6vn3-vpg9-gfbk
16
vulnerability VCID-75cx-avm7-tfcb
17
vulnerability VCID-7wcy-5hnc-tfh4
18
vulnerability VCID-8nyc-r2e4-17gr
19
vulnerability VCID-8vx6-ctvp-8qeq
20
vulnerability VCID-9en3-y22n-wydw
21
vulnerability VCID-b55f-n1ed-g7eq
22
vulnerability VCID-bzwc-9ueu-gka1
23
vulnerability VCID-csy7-esn4-u3gq
24
vulnerability VCID-dzdf-drjk-m3cj
25
vulnerability VCID-eh71-uhnv-fqeb
26
vulnerability VCID-ejhc-6yqt-gkgv
27
vulnerability VCID-ejsj-eyej-huc6
28
vulnerability VCID-f859-13vd-7uef
29
vulnerability VCID-f91c-4ty9-h7a2
30
vulnerability VCID-fe46-8fs3-p3fd
31
vulnerability VCID-gmr7-umz8-9fhm
32
vulnerability VCID-j4ak-hjn5-guat
33
vulnerability VCID-j6j9-vj4t-bfa6
34
vulnerability VCID-jqnr-61tn-kben
35
vulnerability VCID-jwaz-e1v9-uyep
36
vulnerability VCID-kha2-8ez1-gfhr
37
vulnerability VCID-mekt-8gm1-33ej
38
vulnerability VCID-mu4u-d5mc-kbgk
39
vulnerability VCID-npgb-p786-d3fe
40
vulnerability VCID-p2fk-8snj-x7dy
41
vulnerability VCID-pgps-58ra-1ugy
42
vulnerability VCID-qtg5-1dxw-sfdc
43
vulnerability VCID-qzcy-2xsr-vqeh
44
vulnerability VCID-r46f-12hj-7ybb
45
vulnerability VCID-t56a-46c7-fybe
46
vulnerability VCID-t7rc-zadf-cybq
47
vulnerability VCID-t85u-116v-7uan
48
vulnerability VCID-td6e-x2qb-syg3
49
vulnerability VCID-trxm-8mg3-4bbr
50
vulnerability VCID-uj7d-tpax-fqhd
51
vulnerability VCID-vsda-kq13-73g1
52
vulnerability VCID-w7k1-y36j-3ye6
53
vulnerability VCID-wgce-vves-guek
54
vulnerability VCID-wqfe-hkrk-nbaj
55
vulnerability VCID-wv5f-6x7x-7fdw
56
vulnerability VCID-wyf3-shyh-qyhc
57
vulnerability VCID-xb28-un42-1uag
58
vulnerability VCID-z8gt-jznd-ryht
59
vulnerability VCID-zcxx-ra5c-hyh9
60
vulnerability VCID-ztyd-jwnm-m3gd
61
vulnerability VCID-zx9g-4trv-hfgc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20220510.1~deb10u1
aliases CVE-2020-8696
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-juy7-j265-cfax
10
url VCID-jwaz-e1v9-uyep
vulnerability_id VCID-jwaz-e1v9-uyep
summary hw: cpu: Incomplete cleanup in specific special register read operations (aka SRBDS update)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21127.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21127.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21127
reference_id
reference_type
scores
0
value 0.00278
scoring_system epss
scoring_elements 0.5116
published_at 2026-04-02T12:55:00Z
1
value 0.00278
scoring_system epss
scoring_elements 0.51201
published_at 2026-04-13T12:55:00Z
2
value 0.00278
scoring_system epss
scoring_elements 0.51216
published_at 2026-04-12T12:55:00Z
3
value 0.00278
scoring_system epss
scoring_elements 0.51238
published_at 2026-04-11T12:55:00Z
4
value 0.00278
scoring_system epss
scoring_elements 0.51193
published_at 2026-04-09T12:55:00Z
5
value 0.00278
scoring_system epss
scoring_elements 0.51197
published_at 2026-04-08T12:55:00Z
6
value 0.00278
scoring_system epss
scoring_elements 0.51185
published_at 2026-04-04T12:55:00Z
7
value 0.00278
scoring_system epss
scoring_elements 0.51142
published_at 2026-04-07T12:55:00Z
8
value 0.00466
scoring_system epss
scoring_elements 0.64431
published_at 2026-04-18T12:55:00Z
9
value 0.00466
scoring_system epss
scoring_elements 0.6442
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21127
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url http://www.openwall.com/lists/oss-security/2022/06/16/1
reference_id 1
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:38Z/
url http://www.openwall.com/lists/oss-security/2022/06/16/1
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2090243
reference_id 2090243
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2090243
10
reference_url https://www.debian.org/security/2022/dsa-5178
reference_id dsa-5178
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:38Z/
url https://www.debian.org/security/2022/dsa-5178
11
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html
reference_id intel-sa-00615.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:38Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html
12
reference_url https://security.netapp.com/advisory/ntap-20220624-0008/
reference_id ntap-20220624-0008
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:38Z/
url https://security.netapp.com/advisory/ntap-20220624-0008/
13
reference_url https://usn.ubuntu.com/5486-1/
reference_id USN-5486-1
reference_type
scores
url https://usn.ubuntu.com/5486-1/
14
reference_url https://usn.ubuntu.com/5535-1/
reference_id USN-5535-1
reference_type
scores
url https://usn.ubuntu.com/5535-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20220510.1~deb10u1
purl pkg:deb/debian/intel-microcode@3.20220510.1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1xju-dcmn-ube4
1
vulnerability VCID-2ues-wvyq-6qc9
2
vulnerability VCID-2ytx-vj3b-rfhb
3
vulnerability VCID-3dfb-1sgt-w3a8
4
vulnerability VCID-3y3x-qqep-43ec
5
vulnerability VCID-4429-qf2w-jqg3
6
vulnerability VCID-4bw3-w5hz-ekd1
7
vulnerability VCID-4uuw-pm94-1kak
8
vulnerability VCID-51nr-8avm-qued
9
vulnerability VCID-5cgx-1n9u-gqbh
10
vulnerability VCID-5dq7-wfyt-2uhz
11
vulnerability VCID-5vkn-4rqc-qkbk
12
vulnerability VCID-6ake-v15c-k7aq
13
vulnerability VCID-6mzy-wsz1-cyhf
14
vulnerability VCID-6thk-vf9t-gygs
15
vulnerability VCID-6vn3-vpg9-gfbk
16
vulnerability VCID-75cx-avm7-tfcb
17
vulnerability VCID-7wcy-5hnc-tfh4
18
vulnerability VCID-8nyc-r2e4-17gr
19
vulnerability VCID-8vx6-ctvp-8qeq
20
vulnerability VCID-9en3-y22n-wydw
21
vulnerability VCID-b55f-n1ed-g7eq
22
vulnerability VCID-bzwc-9ueu-gka1
23
vulnerability VCID-csy7-esn4-u3gq
24
vulnerability VCID-dzdf-drjk-m3cj
25
vulnerability VCID-eh71-uhnv-fqeb
26
vulnerability VCID-ejhc-6yqt-gkgv
27
vulnerability VCID-ejsj-eyej-huc6
28
vulnerability VCID-f859-13vd-7uef
29
vulnerability VCID-f91c-4ty9-h7a2
30
vulnerability VCID-fe46-8fs3-p3fd
31
vulnerability VCID-gmr7-umz8-9fhm
32
vulnerability VCID-j4ak-hjn5-guat
33
vulnerability VCID-j6j9-vj4t-bfa6
34
vulnerability VCID-jqnr-61tn-kben
35
vulnerability VCID-jwaz-e1v9-uyep
36
vulnerability VCID-kha2-8ez1-gfhr
37
vulnerability VCID-mekt-8gm1-33ej
38
vulnerability VCID-mu4u-d5mc-kbgk
39
vulnerability VCID-npgb-p786-d3fe
40
vulnerability VCID-p2fk-8snj-x7dy
41
vulnerability VCID-pgps-58ra-1ugy
42
vulnerability VCID-qtg5-1dxw-sfdc
43
vulnerability VCID-qzcy-2xsr-vqeh
44
vulnerability VCID-r46f-12hj-7ybb
45
vulnerability VCID-t56a-46c7-fybe
46
vulnerability VCID-t7rc-zadf-cybq
47
vulnerability VCID-t85u-116v-7uan
48
vulnerability VCID-td6e-x2qb-syg3
49
vulnerability VCID-trxm-8mg3-4bbr
50
vulnerability VCID-uj7d-tpax-fqhd
51
vulnerability VCID-vsda-kq13-73g1
52
vulnerability VCID-w7k1-y36j-3ye6
53
vulnerability VCID-wgce-vves-guek
54
vulnerability VCID-wqfe-hkrk-nbaj
55
vulnerability VCID-wv5f-6x7x-7fdw
56
vulnerability VCID-wyf3-shyh-qyhc
57
vulnerability VCID-xb28-un42-1uag
58
vulnerability VCID-z8gt-jznd-ryht
59
vulnerability VCID-zcxx-ra5c-hyh9
60
vulnerability VCID-ztyd-jwnm-m3gd
61
vulnerability VCID-zx9g-4trv-hfgc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20220510.1~deb10u1
1
url pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
purl pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ues-wvyq-6qc9
1
vulnerability VCID-38q7-4ar3-sqcc
2
vulnerability VCID-3y3x-qqep-43ec
3
vulnerability VCID-4uuw-pm94-1kak
4
vulnerability VCID-51nr-8avm-qued
5
vulnerability VCID-5cgx-1n9u-gqbh
6
vulnerability VCID-5vkn-4rqc-qkbk
7
vulnerability VCID-6ake-v15c-k7aq
8
vulnerability VCID-6thk-vf9t-gygs
9
vulnerability VCID-75cx-avm7-tfcb
10
vulnerability VCID-7wcy-5hnc-tfh4
11
vulnerability VCID-8nyc-r2e4-17gr
12
vulnerability VCID-b55f-n1ed-g7eq
13
vulnerability VCID-eh71-uhnv-fqeb
14
vulnerability VCID-ejhc-6yqt-gkgv
15
vulnerability VCID-ejsj-eyej-huc6
16
vulnerability VCID-f859-13vd-7uef
17
vulnerability VCID-gmr7-umz8-9fhm
18
vulnerability VCID-j4ak-hjn5-guat
19
vulnerability VCID-j6j9-vj4t-bfa6
20
vulnerability VCID-kha2-8ez1-gfhr
21
vulnerability VCID-mekt-8gm1-33ej
22
vulnerability VCID-npgb-p786-d3fe
23
vulnerability VCID-qtg5-1dxw-sfdc
24
vulnerability VCID-qzcy-2xsr-vqeh
25
vulnerability VCID-r46f-12hj-7ybb
26
vulnerability VCID-t7rc-zadf-cybq
27
vulnerability VCID-t85u-116v-7uan
28
vulnerability VCID-vsda-kq13-73g1
29
vulnerability VCID-w7k1-y36j-3ye6
30
vulnerability VCID-wgce-vves-guek
31
vulnerability VCID-wqfe-hkrk-nbaj
32
vulnerability VCID-wv5f-6x7x-7fdw
33
vulnerability VCID-wyf3-shyh-qyhc
34
vulnerability VCID-zcxx-ra5c-hyh9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
aliases CVE-2022-21127
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jwaz-e1v9-uyep
11
url VCID-k9bk-q1ds-6ke5
vulnerability_id VCID-k9bk-q1ds-6ke5
summary hw: vt-d related privilege escalation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-24489.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-24489.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-24489
reference_id
reference_type
scores
0
value 0.00068
scoring_system epss
scoring_elements 0.21075
published_at 2026-04-01T12:55:00Z
1
value 0.00068
scoring_system epss
scoring_elements 0.21093
published_at 2026-04-18T12:55:00Z
2
value 0.00068
scoring_system epss
scoring_elements 0.21091
published_at 2026-04-13T12:55:00Z
3
value 0.00068
scoring_system epss
scoring_elements 0.21082
published_at 2026-04-16T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.21228
published_at 2026-04-02T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.21281
published_at 2026-04-04T12:55:00Z
6
value 0.00068
scoring_system epss
scoring_elements 0.21032
published_at 2026-04-07T12:55:00Z
7
value 0.00068
scoring_system epss
scoring_elements 0.21114
published_at 2026-04-08T12:55:00Z
8
value 0.00068
scoring_system epss
scoring_elements 0.21175
published_at 2026-04-09T12:55:00Z
9
value 0.00068
scoring_system epss
scoring_elements 0.21185
published_at 2026-04-11T12:55:00Z
10
value 0.00068
scoring_system epss
scoring_elements 0.21142
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-24489
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24489
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24511
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24512
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24513
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1962650
reference_id 1962650
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1962650
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989615
reference_id 989615
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989615
9
reference_url https://security.archlinux.org/ASA-202106-34
reference_id ASA-202106-34
reference_type
scores
url https://security.archlinux.org/ASA-202106-34
10
reference_url https://security.archlinux.org/AVG-2051
reference_id AVG-2051
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2051
11
reference_url https://access.redhat.com/errata/RHSA-2021:2299
reference_id RHSA-2021:2299
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2299
12
reference_url https://access.redhat.com/errata/RHSA-2021:2300
reference_id RHSA-2021:2300
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2300
13
reference_url https://access.redhat.com/errata/RHSA-2021:2301
reference_id RHSA-2021:2301
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2301
14
reference_url https://access.redhat.com/errata/RHSA-2021:2302
reference_id RHSA-2021:2302
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2302
15
reference_url https://access.redhat.com/errata/RHSA-2021:2303
reference_id RHSA-2021:2303
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2303
16
reference_url https://access.redhat.com/errata/RHSA-2021:2304
reference_id RHSA-2021:2304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2304
17
reference_url https://access.redhat.com/errata/RHSA-2021:2305
reference_id RHSA-2021:2305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2305
18
reference_url https://access.redhat.com/errata/RHSA-2021:2306
reference_id RHSA-2021:2306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2306
19
reference_url https://access.redhat.com/errata/RHSA-2021:2307
reference_id RHSA-2021:2307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2307
20
reference_url https://access.redhat.com/errata/RHSA-2021:2308
reference_id RHSA-2021:2308
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2308
21
reference_url https://access.redhat.com/errata/RHSA-2021:2519
reference_id RHSA-2021:2519
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2519
22
reference_url https://access.redhat.com/errata/RHSA-2021:2522
reference_id RHSA-2021:2522
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2522
23
reference_url https://access.redhat.com/errata/RHSA-2021:3027
reference_id RHSA-2021:3027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3027
24
reference_url https://access.redhat.com/errata/RHSA-2021:3028
reference_id RHSA-2021:3028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3028
25
reference_url https://access.redhat.com/errata/RHSA-2021:3029
reference_id RHSA-2021:3029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3029
26
reference_url https://access.redhat.com/errata/RHSA-2021:3176
reference_id RHSA-2021:3176
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3176
27
reference_url https://access.redhat.com/errata/RHSA-2021:3255
reference_id RHSA-2021:3255
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3255
28
reference_url https://access.redhat.com/errata/RHSA-2021:3317
reference_id RHSA-2021:3317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3317
29
reference_url https://access.redhat.com/errata/RHSA-2021:3322
reference_id RHSA-2021:3322
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3322
30
reference_url https://access.redhat.com/errata/RHSA-2021:3323
reference_id RHSA-2021:3323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3323
31
reference_url https://access.redhat.com/errata/RHSA-2021:3364
reference_id RHSA-2021:3364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3364
32
reference_url https://usn.ubuntu.com/4985-1/
reference_id USN-4985-1
reference_type
scores
url https://usn.ubuntu.com/4985-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20220510.1~deb10u1
purl pkg:deb/debian/intel-microcode@3.20220510.1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1xju-dcmn-ube4
1
vulnerability VCID-2ues-wvyq-6qc9
2
vulnerability VCID-2ytx-vj3b-rfhb
3
vulnerability VCID-3dfb-1sgt-w3a8
4
vulnerability VCID-3y3x-qqep-43ec
5
vulnerability VCID-4429-qf2w-jqg3
6
vulnerability VCID-4bw3-w5hz-ekd1
7
vulnerability VCID-4uuw-pm94-1kak
8
vulnerability VCID-51nr-8avm-qued
9
vulnerability VCID-5cgx-1n9u-gqbh
10
vulnerability VCID-5dq7-wfyt-2uhz
11
vulnerability VCID-5vkn-4rqc-qkbk
12
vulnerability VCID-6ake-v15c-k7aq
13
vulnerability VCID-6mzy-wsz1-cyhf
14
vulnerability VCID-6thk-vf9t-gygs
15
vulnerability VCID-6vn3-vpg9-gfbk
16
vulnerability VCID-75cx-avm7-tfcb
17
vulnerability VCID-7wcy-5hnc-tfh4
18
vulnerability VCID-8nyc-r2e4-17gr
19
vulnerability VCID-8vx6-ctvp-8qeq
20
vulnerability VCID-9en3-y22n-wydw
21
vulnerability VCID-b55f-n1ed-g7eq
22
vulnerability VCID-bzwc-9ueu-gka1
23
vulnerability VCID-csy7-esn4-u3gq
24
vulnerability VCID-dzdf-drjk-m3cj
25
vulnerability VCID-eh71-uhnv-fqeb
26
vulnerability VCID-ejhc-6yqt-gkgv
27
vulnerability VCID-ejsj-eyej-huc6
28
vulnerability VCID-f859-13vd-7uef
29
vulnerability VCID-f91c-4ty9-h7a2
30
vulnerability VCID-fe46-8fs3-p3fd
31
vulnerability VCID-gmr7-umz8-9fhm
32
vulnerability VCID-j4ak-hjn5-guat
33
vulnerability VCID-j6j9-vj4t-bfa6
34
vulnerability VCID-jqnr-61tn-kben
35
vulnerability VCID-jwaz-e1v9-uyep
36
vulnerability VCID-kha2-8ez1-gfhr
37
vulnerability VCID-mekt-8gm1-33ej
38
vulnerability VCID-mu4u-d5mc-kbgk
39
vulnerability VCID-npgb-p786-d3fe
40
vulnerability VCID-p2fk-8snj-x7dy
41
vulnerability VCID-pgps-58ra-1ugy
42
vulnerability VCID-qtg5-1dxw-sfdc
43
vulnerability VCID-qzcy-2xsr-vqeh
44
vulnerability VCID-r46f-12hj-7ybb
45
vulnerability VCID-t56a-46c7-fybe
46
vulnerability VCID-t7rc-zadf-cybq
47
vulnerability VCID-t85u-116v-7uan
48
vulnerability VCID-td6e-x2qb-syg3
49
vulnerability VCID-trxm-8mg3-4bbr
50
vulnerability VCID-uj7d-tpax-fqhd
51
vulnerability VCID-vsda-kq13-73g1
52
vulnerability VCID-w7k1-y36j-3ye6
53
vulnerability VCID-wgce-vves-guek
54
vulnerability VCID-wqfe-hkrk-nbaj
55
vulnerability VCID-wv5f-6x7x-7fdw
56
vulnerability VCID-wyf3-shyh-qyhc
57
vulnerability VCID-xb28-un42-1uag
58
vulnerability VCID-z8gt-jznd-ryht
59
vulnerability VCID-zcxx-ra5c-hyh9
60
vulnerability VCID-ztyd-jwnm-m3gd
61
vulnerability VCID-zx9g-4trv-hfgc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20220510.1~deb10u1
aliases CVE-2020-24489
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k9bk-q1ds-6ke5
12
url VCID-pxy4-1vew-vffs
vulnerability_id VCID-pxy4-1vew-vffs
summary hw: observable timing discrepancy in some Intel Processors
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-24512.json
reference_id
reference_type
scores
0
value 2.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-24512.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-24512
reference_id
reference_type
scores
0
value 0.00064
scoring_system epss
scoring_elements 0.20018
published_at 2026-04-01T12:55:00Z
1
value 0.00064
scoring_system epss
scoring_elements 0.19989
published_at 2026-04-18T12:55:00Z
2
value 0.00064
scoring_system epss
scoring_elements 0.20004
published_at 2026-04-13T12:55:00Z
3
value 0.00064
scoring_system epss
scoring_elements 0.19986
published_at 2026-04-16T12:55:00Z
4
value 0.00064
scoring_system epss
scoring_elements 0.20166
published_at 2026-04-02T12:55:00Z
5
value 0.00064
scoring_system epss
scoring_elements 0.20225
published_at 2026-04-04T12:55:00Z
6
value 0.00064
scoring_system epss
scoring_elements 0.19951
published_at 2026-04-07T12:55:00Z
7
value 0.00064
scoring_system epss
scoring_elements 0.20031
published_at 2026-04-08T12:55:00Z
8
value 0.00064
scoring_system epss
scoring_elements 0.2009
published_at 2026-04-09T12:55:00Z
9
value 0.00064
scoring_system epss
scoring_elements 0.20108
published_at 2026-04-11T12:55:00Z
10
value 0.00064
scoring_system epss
scoring_elements 0.20062
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-24512
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24489
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24511
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24512
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24513
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1962722
reference_id 1962722
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1962722
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989615
reference_id 989615
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989615
9
reference_url https://security.archlinux.org/ASA-202106-34
reference_id ASA-202106-34
reference_type
scores
url https://security.archlinux.org/ASA-202106-34
10
reference_url https://security.archlinux.org/AVG-2051
reference_id AVG-2051
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2051
11
reference_url https://access.redhat.com/errata/RHSA-2021:2299
reference_id RHSA-2021:2299
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2299
12
reference_url https://access.redhat.com/errata/RHSA-2021:2300
reference_id RHSA-2021:2300
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2300
13
reference_url https://access.redhat.com/errata/RHSA-2021:2301
reference_id RHSA-2021:2301
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2301
14
reference_url https://access.redhat.com/errata/RHSA-2021:2302
reference_id RHSA-2021:2302
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2302
15
reference_url https://access.redhat.com/errata/RHSA-2021:2303
reference_id RHSA-2021:2303
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2303
16
reference_url https://access.redhat.com/errata/RHSA-2021:2304
reference_id RHSA-2021:2304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2304
17
reference_url https://access.redhat.com/errata/RHSA-2021:2305
reference_id RHSA-2021:2305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2305
18
reference_url https://access.redhat.com/errata/RHSA-2021:2306
reference_id RHSA-2021:2306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2306
19
reference_url https://access.redhat.com/errata/RHSA-2021:2307
reference_id RHSA-2021:2307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2307
20
reference_url https://access.redhat.com/errata/RHSA-2021:2308
reference_id RHSA-2021:2308
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2308
21
reference_url https://access.redhat.com/errata/RHSA-2021:3027
reference_id RHSA-2021:3027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3027
22
reference_url https://access.redhat.com/errata/RHSA-2021:3028
reference_id RHSA-2021:3028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3028
23
reference_url https://access.redhat.com/errata/RHSA-2021:3029
reference_id RHSA-2021:3029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3029
24
reference_url https://access.redhat.com/errata/RHSA-2021:3176
reference_id RHSA-2021:3176
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3176
25
reference_url https://access.redhat.com/errata/RHSA-2021:3255
reference_id RHSA-2021:3255
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3255
26
reference_url https://access.redhat.com/errata/RHSA-2021:3317
reference_id RHSA-2021:3317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3317
27
reference_url https://access.redhat.com/errata/RHSA-2021:3322
reference_id RHSA-2021:3322
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3322
28
reference_url https://access.redhat.com/errata/RHSA-2021:3323
reference_id RHSA-2021:3323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3323
29
reference_url https://access.redhat.com/errata/RHSA-2021:3364
reference_id RHSA-2021:3364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3364
30
reference_url https://usn.ubuntu.com/4985-1/
reference_id USN-4985-1
reference_type
scores
url https://usn.ubuntu.com/4985-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20220510.1~deb10u1
purl pkg:deb/debian/intel-microcode@3.20220510.1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1xju-dcmn-ube4
1
vulnerability VCID-2ues-wvyq-6qc9
2
vulnerability VCID-2ytx-vj3b-rfhb
3
vulnerability VCID-3dfb-1sgt-w3a8
4
vulnerability VCID-3y3x-qqep-43ec
5
vulnerability VCID-4429-qf2w-jqg3
6
vulnerability VCID-4bw3-w5hz-ekd1
7
vulnerability VCID-4uuw-pm94-1kak
8
vulnerability VCID-51nr-8avm-qued
9
vulnerability VCID-5cgx-1n9u-gqbh
10
vulnerability VCID-5dq7-wfyt-2uhz
11
vulnerability VCID-5vkn-4rqc-qkbk
12
vulnerability VCID-6ake-v15c-k7aq
13
vulnerability VCID-6mzy-wsz1-cyhf
14
vulnerability VCID-6thk-vf9t-gygs
15
vulnerability VCID-6vn3-vpg9-gfbk
16
vulnerability VCID-75cx-avm7-tfcb
17
vulnerability VCID-7wcy-5hnc-tfh4
18
vulnerability VCID-8nyc-r2e4-17gr
19
vulnerability VCID-8vx6-ctvp-8qeq
20
vulnerability VCID-9en3-y22n-wydw
21
vulnerability VCID-b55f-n1ed-g7eq
22
vulnerability VCID-bzwc-9ueu-gka1
23
vulnerability VCID-csy7-esn4-u3gq
24
vulnerability VCID-dzdf-drjk-m3cj
25
vulnerability VCID-eh71-uhnv-fqeb
26
vulnerability VCID-ejhc-6yqt-gkgv
27
vulnerability VCID-ejsj-eyej-huc6
28
vulnerability VCID-f859-13vd-7uef
29
vulnerability VCID-f91c-4ty9-h7a2
30
vulnerability VCID-fe46-8fs3-p3fd
31
vulnerability VCID-gmr7-umz8-9fhm
32
vulnerability VCID-j4ak-hjn5-guat
33
vulnerability VCID-j6j9-vj4t-bfa6
34
vulnerability VCID-jqnr-61tn-kben
35
vulnerability VCID-jwaz-e1v9-uyep
36
vulnerability VCID-kha2-8ez1-gfhr
37
vulnerability VCID-mekt-8gm1-33ej
38
vulnerability VCID-mu4u-d5mc-kbgk
39
vulnerability VCID-npgb-p786-d3fe
40
vulnerability VCID-p2fk-8snj-x7dy
41
vulnerability VCID-pgps-58ra-1ugy
42
vulnerability VCID-qtg5-1dxw-sfdc
43
vulnerability VCID-qzcy-2xsr-vqeh
44
vulnerability VCID-r46f-12hj-7ybb
45
vulnerability VCID-t56a-46c7-fybe
46
vulnerability VCID-t7rc-zadf-cybq
47
vulnerability VCID-t85u-116v-7uan
48
vulnerability VCID-td6e-x2qb-syg3
49
vulnerability VCID-trxm-8mg3-4bbr
50
vulnerability VCID-uj7d-tpax-fqhd
51
vulnerability VCID-vsda-kq13-73g1
52
vulnerability VCID-w7k1-y36j-3ye6
53
vulnerability VCID-wgce-vves-guek
54
vulnerability VCID-wqfe-hkrk-nbaj
55
vulnerability VCID-wv5f-6x7x-7fdw
56
vulnerability VCID-wyf3-shyh-qyhc
57
vulnerability VCID-xb28-un42-1uag
58
vulnerability VCID-z8gt-jznd-ryht
59
vulnerability VCID-zcxx-ra5c-hyh9
60
vulnerability VCID-ztyd-jwnm-m3gd
61
vulnerability VCID-zx9g-4trv-hfgc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20220510.1~deb10u1
aliases CVE-2020-24512
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pxy4-1vew-vffs
13
url VCID-td6e-x2qb-syg3
vulnerability_id VCID-td6e-x2qb-syg3
summary x86: MMIO Stale Data vulnerabilities
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21125.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21125.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21125
reference_id
reference_type
scores
0
value 0.00242
scoring_system epss
scoring_elements 0.47421
published_at 2026-04-02T12:55:00Z
1
value 0.00242
scoring_system epss
scoring_elements 0.47447
published_at 2026-04-13T12:55:00Z
2
value 0.00242
scoring_system epss
scoring_elements 0.47466
published_at 2026-04-11T12:55:00Z
3
value 0.00242
scoring_system epss
scoring_elements 0.47443
published_at 2026-04-09T12:55:00Z
4
value 0.00242
scoring_system epss
scoring_elements 0.47446
published_at 2026-04-08T12:55:00Z
5
value 0.00242
scoring_system epss
scoring_elements 0.47441
published_at 2026-04-12T12:55:00Z
6
value 0.00242
scoring_system epss
scoring_elements 0.47391
published_at 2026-04-07T12:55:00Z
7
value 0.00536
scoring_system epss
scoring_elements 0.67511
published_at 2026-04-18T12:55:00Z
8
value 0.00536
scoring_system epss
scoring_elements 0.67499
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21125
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
46
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
47
reference_url http://www.openwall.com/lists/oss-security/2022/06/16/1
reference_id 1
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/
url http://www.openwall.com/lists/oss-security/2022/06/16/1
48
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2090240
reference_id 2090240
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2090240
49
reference_url http://xenbits.xen.org/xsa/advisory-404.html
reference_id advisory-404.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/
url http://xenbits.xen.org/xsa/advisory-404.html
50
reference_url https://www.debian.org/security/2022/dsa-5173
reference_id dsa-5173
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/
url https://www.debian.org/security/2022/dsa-5173
51
reference_url https://www.debian.org/security/2022/dsa-5178
reference_id dsa-5178
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/
url https://www.debian.org/security/2022/dsa-5178
52
reference_url https://www.debian.org/security/2022/dsa-5184
reference_id dsa-5184
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/
url https://www.debian.org/security/2022/dsa-5184
53
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV/
reference_id FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV/
54
reference_url https://security.gentoo.org/glsa/202208-23
reference_id GLSA-202208-23
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/
url https://security.gentoo.org/glsa/202208-23
55
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html
reference_id intel-sa-00615.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html
56
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS/
reference_id MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS/
57
reference_url https://security.netapp.com/advisory/ntap-20220624-0008/
reference_id ntap-20220624-0008
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/
url https://security.netapp.com/advisory/ntap-20220624-0008/
58
reference_url https://access.redhat.com/errata/RHSA-2022:5937
reference_id RHSA-2022:5937
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5937
59
reference_url https://access.redhat.com/errata/RHSA-2022:5939
reference_id RHSA-2022:5939
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5939
60
reference_url https://access.redhat.com/errata/RHSA-2022:6437
reference_id RHSA-2022:6437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6437
61
reference_url https://access.redhat.com/errata/RHSA-2022:6460
reference_id RHSA-2022:6460
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6460
62
reference_url https://access.redhat.com/errata/RHSA-2022:6872
reference_id RHSA-2022:6872
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6872
63
reference_url https://access.redhat.com/errata/RHSA-2022:6983
reference_id RHSA-2022:6983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6983
64
reference_url https://access.redhat.com/errata/RHSA-2022:6991
reference_id RHSA-2022:6991
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6991
65
reference_url https://access.redhat.com/errata/RHSA-2022:7279
reference_id RHSA-2022:7279
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7279
66
reference_url https://access.redhat.com/errata/RHSA-2022:7280
reference_id RHSA-2022:7280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7280
67
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
68
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
69
reference_url https://access.redhat.com/errata/RHSA-2022:8973
reference_id RHSA-2022:8973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8973
70
reference_url https://access.redhat.com/errata/RHSA-2022:8974
reference_id RHSA-2022:8974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8974
71
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/
reference_id RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/
72
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA/
reference_id T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA/
73
reference_url https://usn.ubuntu.com/5484-1/
reference_id USN-5484-1
reference_type
scores
url https://usn.ubuntu.com/5484-1/
74
reference_url https://usn.ubuntu.com/5485-1/
reference_id USN-5485-1
reference_type
scores
url https://usn.ubuntu.com/5485-1/
75
reference_url https://usn.ubuntu.com/5485-2/
reference_id USN-5485-2
reference_type
scores
url https://usn.ubuntu.com/5485-2/
76
reference_url https://usn.ubuntu.com/5505-1/
reference_id USN-5505-1
reference_type
scores
url https://usn.ubuntu.com/5505-1/
77
reference_url https://usn.ubuntu.com/5513-1/
reference_id USN-5513-1
reference_type
scores
url https://usn.ubuntu.com/5513-1/
78
reference_url https://usn.ubuntu.com/5529-1/
reference_id USN-5529-1
reference_type
scores
url https://usn.ubuntu.com/5529-1/
79
reference_url https://usn.ubuntu.com/5535-1/
reference_id USN-5535-1
reference_type
scores
url https://usn.ubuntu.com/5535-1/
80
reference_url https://xenbits.xen.org/xsa/advisory-404.html
reference_id XSA-404
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-404.html
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20220510.1~deb10u1
purl pkg:deb/debian/intel-microcode@3.20220510.1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1xju-dcmn-ube4
1
vulnerability VCID-2ues-wvyq-6qc9
2
vulnerability VCID-2ytx-vj3b-rfhb
3
vulnerability VCID-3dfb-1sgt-w3a8
4
vulnerability VCID-3y3x-qqep-43ec
5
vulnerability VCID-4429-qf2w-jqg3
6
vulnerability VCID-4bw3-w5hz-ekd1
7
vulnerability VCID-4uuw-pm94-1kak
8
vulnerability VCID-51nr-8avm-qued
9
vulnerability VCID-5cgx-1n9u-gqbh
10
vulnerability VCID-5dq7-wfyt-2uhz
11
vulnerability VCID-5vkn-4rqc-qkbk
12
vulnerability VCID-6ake-v15c-k7aq
13
vulnerability VCID-6mzy-wsz1-cyhf
14
vulnerability VCID-6thk-vf9t-gygs
15
vulnerability VCID-6vn3-vpg9-gfbk
16
vulnerability VCID-75cx-avm7-tfcb
17
vulnerability VCID-7wcy-5hnc-tfh4
18
vulnerability VCID-8nyc-r2e4-17gr
19
vulnerability VCID-8vx6-ctvp-8qeq
20
vulnerability VCID-9en3-y22n-wydw
21
vulnerability VCID-b55f-n1ed-g7eq
22
vulnerability VCID-bzwc-9ueu-gka1
23
vulnerability VCID-csy7-esn4-u3gq
24
vulnerability VCID-dzdf-drjk-m3cj
25
vulnerability VCID-eh71-uhnv-fqeb
26
vulnerability VCID-ejhc-6yqt-gkgv
27
vulnerability VCID-ejsj-eyej-huc6
28
vulnerability VCID-f859-13vd-7uef
29
vulnerability VCID-f91c-4ty9-h7a2
30
vulnerability VCID-fe46-8fs3-p3fd
31
vulnerability VCID-gmr7-umz8-9fhm
32
vulnerability VCID-j4ak-hjn5-guat
33
vulnerability VCID-j6j9-vj4t-bfa6
34
vulnerability VCID-jqnr-61tn-kben
35
vulnerability VCID-jwaz-e1v9-uyep
36
vulnerability VCID-kha2-8ez1-gfhr
37
vulnerability VCID-mekt-8gm1-33ej
38
vulnerability VCID-mu4u-d5mc-kbgk
39
vulnerability VCID-npgb-p786-d3fe
40
vulnerability VCID-p2fk-8snj-x7dy
41
vulnerability VCID-pgps-58ra-1ugy
42
vulnerability VCID-qtg5-1dxw-sfdc
43
vulnerability VCID-qzcy-2xsr-vqeh
44
vulnerability VCID-r46f-12hj-7ybb
45
vulnerability VCID-t56a-46c7-fybe
46
vulnerability VCID-t7rc-zadf-cybq
47
vulnerability VCID-t85u-116v-7uan
48
vulnerability VCID-td6e-x2qb-syg3
49
vulnerability VCID-trxm-8mg3-4bbr
50
vulnerability VCID-uj7d-tpax-fqhd
51
vulnerability VCID-vsda-kq13-73g1
52
vulnerability VCID-w7k1-y36j-3ye6
53
vulnerability VCID-wgce-vves-guek
54
vulnerability VCID-wqfe-hkrk-nbaj
55
vulnerability VCID-wv5f-6x7x-7fdw
56
vulnerability VCID-wyf3-shyh-qyhc
57
vulnerability VCID-xb28-un42-1uag
58
vulnerability VCID-z8gt-jznd-ryht
59
vulnerability VCID-zcxx-ra5c-hyh9
60
vulnerability VCID-ztyd-jwnm-m3gd
61
vulnerability VCID-zx9g-4trv-hfgc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20220510.1~deb10u1
1
url pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
purl pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2ues-wvyq-6qc9
1
vulnerability VCID-38q7-4ar3-sqcc
2
vulnerability VCID-3y3x-qqep-43ec
3
vulnerability VCID-4uuw-pm94-1kak
4
vulnerability VCID-51nr-8avm-qued
5
vulnerability VCID-5cgx-1n9u-gqbh
6
vulnerability VCID-5vkn-4rqc-qkbk
7
vulnerability VCID-6ake-v15c-k7aq
8
vulnerability VCID-6thk-vf9t-gygs
9
vulnerability VCID-75cx-avm7-tfcb
10
vulnerability VCID-7wcy-5hnc-tfh4
11
vulnerability VCID-8nyc-r2e4-17gr
12
vulnerability VCID-b55f-n1ed-g7eq
13
vulnerability VCID-eh71-uhnv-fqeb
14
vulnerability VCID-ejhc-6yqt-gkgv
15
vulnerability VCID-ejsj-eyej-huc6
16
vulnerability VCID-f859-13vd-7uef
17
vulnerability VCID-gmr7-umz8-9fhm
18
vulnerability VCID-j4ak-hjn5-guat
19
vulnerability VCID-j6j9-vj4t-bfa6
20
vulnerability VCID-kha2-8ez1-gfhr
21
vulnerability VCID-mekt-8gm1-33ej
22
vulnerability VCID-npgb-p786-d3fe
23
vulnerability VCID-qtg5-1dxw-sfdc
24
vulnerability VCID-qzcy-2xsr-vqeh
25
vulnerability VCID-r46f-12hj-7ybb
26
vulnerability VCID-t7rc-zadf-cybq
27
vulnerability VCID-t85u-116v-7uan
28
vulnerability VCID-vsda-kq13-73g1
29
vulnerability VCID-w7k1-y36j-3ye6
30
vulnerability VCID-wgce-vves-guek
31
vulnerability VCID-wqfe-hkrk-nbaj
32
vulnerability VCID-wv5f-6x7x-7fdw
33
vulnerability VCID-wyf3-shyh-qyhc
34
vulnerability VCID-zcxx-ra5c-hyh9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1
aliases CVE-2022-21125
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-td6e-x2qb-syg3
14
url VCID-upx5-38qt-3kg9
vulnerability_id VCID-upx5-38qt-3kg9
summary hw: Fast forward store predictor
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8698.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8698.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-8698
reference_id
reference_type
scores
0
value 0.00266
scoring_system epss
scoring_elements 0.50043
published_at 2026-04-01T12:55:00Z
1
value 0.00266
scoring_system epss
scoring_elements 0.50136
published_at 2026-04-18T12:55:00Z
2
value 0.00266
scoring_system epss
scoring_elements 0.50091
published_at 2026-04-13T12:55:00Z
3
value 0.00266
scoring_system epss
scoring_elements 0.50135
published_at 2026-04-16T12:55:00Z
4
value 0.00266
scoring_system epss
scoring_elements 0.50077
published_at 2026-04-02T12:55:00Z
5
value 0.00266
scoring_system epss
scoring_elements 0.50105
published_at 2026-04-04T12:55:00Z
6
value 0.00266
scoring_system epss
scoring_elements 0.50055
published_at 2026-04-07T12:55:00Z
7
value 0.00266
scoring_system epss
scoring_elements 0.50109
published_at 2026-04-08T12:55:00Z
8
value 0.00266
scoring_system epss
scoring_elements 0.50103
published_at 2026-04-09T12:55:00Z
9
value 0.00266
scoring_system epss
scoring_elements 0.5012
published_at 2026-04-11T12:55:00Z
10
value 0.00266
scoring_system epss
scoring_elements 0.50094
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-8698
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8698
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890356
reference_id 1890356
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890356
5
reference_url https://security.archlinux.org/ASA-202102-34
reference_id ASA-202102-34
reference_type
scores
url https://security.archlinux.org/ASA-202102-34
6
reference_url https://security.archlinux.org/AVG-1588
reference_id AVG-1588
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1588
7
reference_url https://access.redhat.com/errata/RHSA-2020:5083
reference_id RHSA-2020:5083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5083
8
reference_url https://access.redhat.com/errata/RHSA-2020:5084
reference_id RHSA-2020:5084
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5084
9
reference_url https://access.redhat.com/errata/RHSA-2020:5085
reference_id RHSA-2020:5085
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5085
10
reference_url https://access.redhat.com/errata/RHSA-2020:5181
reference_id RHSA-2020:5181
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5181
11
reference_url https://access.redhat.com/errata/RHSA-2020:5182
reference_id RHSA-2020:5182
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5182
12
reference_url https://access.redhat.com/errata/RHSA-2020:5183
reference_id RHSA-2020:5183
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5183
13
reference_url https://access.redhat.com/errata/RHSA-2020:5184
reference_id RHSA-2020:5184
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5184
14
reference_url https://access.redhat.com/errata/RHSA-2020:5185
reference_id RHSA-2020:5185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5185
15
reference_url https://access.redhat.com/errata/RHSA-2020:5186
reference_id RHSA-2020:5186
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5186
16
reference_url https://access.redhat.com/errata/RHSA-2020:5188
reference_id RHSA-2020:5188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5188
17
reference_url https://access.redhat.com/errata/RHSA-2020:5189
reference_id RHSA-2020:5189
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5189
18
reference_url https://access.redhat.com/errata/RHSA-2020:5190
reference_id RHSA-2020:5190
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5190
19
reference_url https://access.redhat.com/errata/RHSA-2020:5369
reference_id RHSA-2020:5369
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5369
20
reference_url https://access.redhat.com/errata/RHSA-2021:3027
reference_id RHSA-2021:3027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3027
21
reference_url https://access.redhat.com/errata/RHSA-2021:3028
reference_id RHSA-2021:3028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3028
22
reference_url https://access.redhat.com/errata/RHSA-2021:3029
reference_id RHSA-2021:3029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3029
23
reference_url https://access.redhat.com/errata/RHSA-2021:3176
reference_id RHSA-2021:3176
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3176
24
reference_url https://access.redhat.com/errata/RHSA-2021:3255
reference_id RHSA-2021:3255
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3255
25
reference_url https://access.redhat.com/errata/RHSA-2021:3317
reference_id RHSA-2021:3317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3317
26
reference_url https://access.redhat.com/errata/RHSA-2021:3322
reference_id RHSA-2021:3322
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3322
27
reference_url https://access.redhat.com/errata/RHSA-2021:3323
reference_id RHSA-2021:3323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3323
28
reference_url https://access.redhat.com/errata/RHSA-2021:3364
reference_id RHSA-2021:3364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3364
29
reference_url https://usn.ubuntu.com/4628-1/
reference_id USN-4628-1
reference_type
scores
url https://usn.ubuntu.com/4628-1/
30
reference_url https://usn.ubuntu.com/4628-3/
reference_id USN-4628-3
reference_type
scores
url https://usn.ubuntu.com/4628-3/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20220510.1~deb10u1
purl pkg:deb/debian/intel-microcode@3.20220510.1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1xju-dcmn-ube4
1
vulnerability VCID-2ues-wvyq-6qc9
2
vulnerability VCID-2ytx-vj3b-rfhb
3
vulnerability VCID-3dfb-1sgt-w3a8
4
vulnerability VCID-3y3x-qqep-43ec
5
vulnerability VCID-4429-qf2w-jqg3
6
vulnerability VCID-4bw3-w5hz-ekd1
7
vulnerability VCID-4uuw-pm94-1kak
8
vulnerability VCID-51nr-8avm-qued
9
vulnerability VCID-5cgx-1n9u-gqbh
10
vulnerability VCID-5dq7-wfyt-2uhz
11
vulnerability VCID-5vkn-4rqc-qkbk
12
vulnerability VCID-6ake-v15c-k7aq
13
vulnerability VCID-6mzy-wsz1-cyhf
14
vulnerability VCID-6thk-vf9t-gygs
15
vulnerability VCID-6vn3-vpg9-gfbk
16
vulnerability VCID-75cx-avm7-tfcb
17
vulnerability VCID-7wcy-5hnc-tfh4
18
vulnerability VCID-8nyc-r2e4-17gr
19
vulnerability VCID-8vx6-ctvp-8qeq
20
vulnerability VCID-9en3-y22n-wydw
21
vulnerability VCID-b55f-n1ed-g7eq
22
vulnerability VCID-bzwc-9ueu-gka1
23
vulnerability VCID-csy7-esn4-u3gq
24
vulnerability VCID-dzdf-drjk-m3cj
25
vulnerability VCID-eh71-uhnv-fqeb
26
vulnerability VCID-ejhc-6yqt-gkgv
27
vulnerability VCID-ejsj-eyej-huc6
28
vulnerability VCID-f859-13vd-7uef
29
vulnerability VCID-f91c-4ty9-h7a2
30
vulnerability VCID-fe46-8fs3-p3fd
31
vulnerability VCID-gmr7-umz8-9fhm
32
vulnerability VCID-j4ak-hjn5-guat
33
vulnerability VCID-j6j9-vj4t-bfa6
34
vulnerability VCID-jqnr-61tn-kben
35
vulnerability VCID-jwaz-e1v9-uyep
36
vulnerability VCID-kha2-8ez1-gfhr
37
vulnerability VCID-mekt-8gm1-33ej
38
vulnerability VCID-mu4u-d5mc-kbgk
39
vulnerability VCID-npgb-p786-d3fe
40
vulnerability VCID-p2fk-8snj-x7dy
41
vulnerability VCID-pgps-58ra-1ugy
42
vulnerability VCID-qtg5-1dxw-sfdc
43
vulnerability VCID-qzcy-2xsr-vqeh
44
vulnerability VCID-r46f-12hj-7ybb
45
vulnerability VCID-t56a-46c7-fybe
46
vulnerability VCID-t7rc-zadf-cybq
47
vulnerability VCID-t85u-116v-7uan
48
vulnerability VCID-td6e-x2qb-syg3
49
vulnerability VCID-trxm-8mg3-4bbr
50
vulnerability VCID-uj7d-tpax-fqhd
51
vulnerability VCID-vsda-kq13-73g1
52
vulnerability VCID-w7k1-y36j-3ye6
53
vulnerability VCID-wgce-vves-guek
54
vulnerability VCID-wqfe-hkrk-nbaj
55
vulnerability VCID-wv5f-6x7x-7fdw
56
vulnerability VCID-wyf3-shyh-qyhc
57
vulnerability VCID-xb28-un42-1uag
58
vulnerability VCID-z8gt-jznd-ryht
59
vulnerability VCID-zcxx-ra5c-hyh9
60
vulnerability VCID-ztyd-jwnm-m3gd
61
vulnerability VCID-zx9g-4trv-hfgc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20220510.1~deb10u1
aliases CVE-2020-8698
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-upx5-38qt-3kg9
15
url VCID-x4zx-7h35-nuf6
vulnerability_id VCID-x4zx-7h35-nuf6
summary hw: information disclosure on some Intel Atom processors
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-24513.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-24513.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-24513
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05609
published_at 2026-04-01T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05672
published_at 2026-04-18T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05706
published_at 2026-04-13T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05661
published_at 2026-04-16T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05643
published_at 2026-04-02T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05683
published_at 2026-04-04T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05675
published_at 2026-04-07T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05715
published_at 2026-04-08T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.05741
published_at 2026-04-09T12:55:00Z
9
value 0.00021
scoring_system epss
scoring_elements 0.0572
published_at 2026-04-11T12:55:00Z
10
value 0.00021
scoring_system epss
scoring_elements 0.05712
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-24513
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24489
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24511
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24512
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24513
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1962666
reference_id 1962666
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1962666
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989615
reference_id 989615
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989615
9
reference_url https://security.archlinux.org/ASA-202106-34
reference_id ASA-202106-34
reference_type
scores
url https://security.archlinux.org/ASA-202106-34
10
reference_url https://security.archlinux.org/AVG-2051
reference_id AVG-2051
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2051
11
reference_url https://access.redhat.com/errata/RHSA-2021:2299
reference_id RHSA-2021:2299
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2299
12
reference_url https://access.redhat.com/errata/RHSA-2021:2300
reference_id RHSA-2021:2300
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2300
13
reference_url https://access.redhat.com/errata/RHSA-2021:2301
reference_id RHSA-2021:2301
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2301
14
reference_url https://access.redhat.com/errata/RHSA-2021:2302
reference_id RHSA-2021:2302
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2302
15
reference_url https://access.redhat.com/errata/RHSA-2021:2303
reference_id RHSA-2021:2303
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2303
16
reference_url https://access.redhat.com/errata/RHSA-2021:2304
reference_id RHSA-2021:2304
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2304
17
reference_url https://access.redhat.com/errata/RHSA-2021:2305
reference_id RHSA-2021:2305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2305
18
reference_url https://access.redhat.com/errata/RHSA-2021:2306
reference_id RHSA-2021:2306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2306
19
reference_url https://access.redhat.com/errata/RHSA-2021:2307
reference_id RHSA-2021:2307
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2307
20
reference_url https://access.redhat.com/errata/RHSA-2021:2308
reference_id RHSA-2021:2308
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2308
21
reference_url https://usn.ubuntu.com/4985-1/
reference_id USN-4985-1
reference_type
scores
url https://usn.ubuntu.com/4985-1/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20220510.1~deb10u1
purl pkg:deb/debian/intel-microcode@3.20220510.1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1xju-dcmn-ube4
1
vulnerability VCID-2ues-wvyq-6qc9
2
vulnerability VCID-2ytx-vj3b-rfhb
3
vulnerability VCID-3dfb-1sgt-w3a8
4
vulnerability VCID-3y3x-qqep-43ec
5
vulnerability VCID-4429-qf2w-jqg3
6
vulnerability VCID-4bw3-w5hz-ekd1
7
vulnerability VCID-4uuw-pm94-1kak
8
vulnerability VCID-51nr-8avm-qued
9
vulnerability VCID-5cgx-1n9u-gqbh
10
vulnerability VCID-5dq7-wfyt-2uhz
11
vulnerability VCID-5vkn-4rqc-qkbk
12
vulnerability VCID-6ake-v15c-k7aq
13
vulnerability VCID-6mzy-wsz1-cyhf
14
vulnerability VCID-6thk-vf9t-gygs
15
vulnerability VCID-6vn3-vpg9-gfbk
16
vulnerability VCID-75cx-avm7-tfcb
17
vulnerability VCID-7wcy-5hnc-tfh4
18
vulnerability VCID-8nyc-r2e4-17gr
19
vulnerability VCID-8vx6-ctvp-8qeq
20
vulnerability VCID-9en3-y22n-wydw
21
vulnerability VCID-b55f-n1ed-g7eq
22
vulnerability VCID-bzwc-9ueu-gka1
23
vulnerability VCID-csy7-esn4-u3gq
24
vulnerability VCID-dzdf-drjk-m3cj
25
vulnerability VCID-eh71-uhnv-fqeb
26
vulnerability VCID-ejhc-6yqt-gkgv
27
vulnerability VCID-ejsj-eyej-huc6
28
vulnerability VCID-f859-13vd-7uef
29
vulnerability VCID-f91c-4ty9-h7a2
30
vulnerability VCID-fe46-8fs3-p3fd
31
vulnerability VCID-gmr7-umz8-9fhm
32
vulnerability VCID-j4ak-hjn5-guat
33
vulnerability VCID-j6j9-vj4t-bfa6
34
vulnerability VCID-jqnr-61tn-kben
35
vulnerability VCID-jwaz-e1v9-uyep
36
vulnerability VCID-kha2-8ez1-gfhr
37
vulnerability VCID-mekt-8gm1-33ej
38
vulnerability VCID-mu4u-d5mc-kbgk
39
vulnerability VCID-npgb-p786-d3fe
40
vulnerability VCID-p2fk-8snj-x7dy
41
vulnerability VCID-pgps-58ra-1ugy
42
vulnerability VCID-qtg5-1dxw-sfdc
43
vulnerability VCID-qzcy-2xsr-vqeh
44
vulnerability VCID-r46f-12hj-7ybb
45
vulnerability VCID-t56a-46c7-fybe
46
vulnerability VCID-t7rc-zadf-cybq
47
vulnerability VCID-t85u-116v-7uan
48
vulnerability VCID-td6e-x2qb-syg3
49
vulnerability VCID-trxm-8mg3-4bbr
50
vulnerability VCID-uj7d-tpax-fqhd
51
vulnerability VCID-vsda-kq13-73g1
52
vulnerability VCID-w7k1-y36j-3ye6
53
vulnerability VCID-wgce-vves-guek
54
vulnerability VCID-wqfe-hkrk-nbaj
55
vulnerability VCID-wv5f-6x7x-7fdw
56
vulnerability VCID-wyf3-shyh-qyhc
57
vulnerability VCID-xb28-un42-1uag
58
vulnerability VCID-z8gt-jznd-ryht
59
vulnerability VCID-zcxx-ra5c-hyh9
60
vulnerability VCID-ztyd-jwnm-m3gd
61
vulnerability VCID-zx9g-4trv-hfgc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20220510.1~deb10u1
aliases CVE-2020-24513
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x4zx-7h35-nuf6
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20220510.1~deb10u1