Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/intel-ucode@20240813-r0?arch=armhf&distroversion=v3.17&reponame=main
Typeapk
Namespacealpine
Nameintel-ucode
Version20240813-r0
Qualifiers
arch armhf
distroversion v3.17
reponame main
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version20240910-r0
Latest_non_vulnerable_version20241112-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1xju-dcmn-ube4
vulnerability_id VCID-1xju-dcmn-ube4
summary intel-microcode: Improper input validation in some Intel(R) TDX module software
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-45745.json
reference_id
reference_type
scores
0
value 7.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-45745.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-45745
reference_id
reference_type
scores
0
value 0.00074
scoring_system epss
scoring_elements 0.22426
published_at 2026-04-02T12:55:00Z
1
value 0.00074
scoring_system epss
scoring_elements 0.22326
published_at 2026-04-18T12:55:00Z
2
value 0.00074
scoring_system epss
scoring_elements 0.22397
published_at 2026-04-09T12:55:00Z
3
value 0.00074
scoring_system epss
scoring_elements 0.22418
published_at 2026-04-11T12:55:00Z
4
value 0.00074
scoring_system epss
scoring_elements 0.22376
published_at 2026-04-12T12:55:00Z
5
value 0.00074
scoring_system epss
scoring_elements 0.22319
published_at 2026-04-13T12:55:00Z
6
value 0.00074
scoring_system epss
scoring_elements 0.22333
published_at 2026-04-16T12:55:00Z
7
value 0.00074
scoring_system epss
scoring_elements 0.22472
published_at 2026-04-04T12:55:00Z
8
value 0.00074
scoring_system epss
scoring_elements 0.22259
published_at 2026-04-07T12:55:00Z
9
value 0.00074
scoring_system epss
scoring_elements 0.22342
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-45745
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45745
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2292298
reference_id 2292298
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2292298
5
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01036.html
reference_id intel-sa-01036.html
reference_type
scores
0
value 7.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-24T15:36:31Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01036.html
6
reference_url https://security.netapp.com/advisory/ntap-20240621-0003/
reference_id ntap-20240621-0003
reference_type
scores
0
value 7.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-24T15:36:31Z/
url https://security.netapp.com/advisory/ntap-20240621-0003/
7
reference_url https://usn.ubuntu.com/6797-1/
reference_id USN-6797-1
reference_type
scores
url https://usn.ubuntu.com/6797-1/
fixed_packages
0
url pkg:apk/alpine/intel-ucode@20240813-r0?arch=armhf&distroversion=v3.17&reponame=main
purl pkg:apk/alpine/intel-ucode@20240813-r0?arch=armhf&distroversion=v3.17&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/intel-ucode@20240813-r0%3Farch=armhf&distroversion=v3.17&reponame=main
aliases CVE-2023-45745
risk_score 3.5
exploitability 0.5
weighted_severity 7.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1xju-dcmn-ube4
1
url VCID-3dfb-1sgt-w3a8
vulnerability_id VCID-3dfb-1sgt-w3a8
summary Mirrored regions with different values in 3rd Generation Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable denial of service via local access.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-25939
reference_id
reference_type
scores
0
value 0.00061
scoring_system epss
scoring_elements 0.18992
published_at 2026-04-18T12:55:00Z
1
value 0.00061
scoring_system epss
scoring_elements 0.19123
published_at 2026-04-11T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.19077
published_at 2026-04-12T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.19024
published_at 2026-04-13T12:55:00Z
4
value 0.00061
scoring_system epss
scoring_elements 0.1898
published_at 2026-04-16T12:55:00Z
5
value 0.00061
scoring_system epss
scoring_elements 0.19217
published_at 2026-04-02T12:55:00Z
6
value 0.00061
scoring_system epss
scoring_elements 0.19269
published_at 2026-04-04T12:55:00Z
7
value 0.00061
scoring_system epss
scoring_elements 0.18984
published_at 2026-04-07T12:55:00Z
8
value 0.00061
scoring_system epss
scoring_elements 0.19064
published_at 2026-04-08T12:55:00Z
9
value 0.00061
scoring_system epss
scoring_elements 0.19117
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-25939
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25939
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078742
reference_id 1078742
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078742
4
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01118.html
reference_id intel-sa-01118.html
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
1
value 6.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T16:17:26Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01118.html
5
reference_url https://usn.ubuntu.com/6967-1/
reference_id USN-6967-1
reference_type
scores
url https://usn.ubuntu.com/6967-1/
fixed_packages
0
url pkg:apk/alpine/intel-ucode@20240813-r0?arch=armhf&distroversion=v3.17&reponame=main
purl pkg:apk/alpine/intel-ucode@20240813-r0?arch=armhf&distroversion=v3.17&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/intel-ucode@20240813-r0%3Farch=armhf&distroversion=v3.17&reponame=main
aliases CVE-2024-25939
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3dfb-1sgt-w3a8
2
url VCID-4bw3-w5hz-ekd1
vulnerability_id VCID-4bw3-w5hz-ekd1
summary intel-microcode: Unexpected behavior in Intel(R) Core(TM) Ultra Processors
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-46103.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-46103.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-46103
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.01254
published_at 2026-04-12T12:55:00Z
1
value 0.00011
scoring_system epss
scoring_elements 0.01261
published_at 2026-04-18T12:55:00Z
2
value 0.00011
scoring_system epss
scoring_elements 0.01278
published_at 2026-04-09T12:55:00Z
3
value 0.00011
scoring_system epss
scoring_elements 0.01256
published_at 2026-04-13T12:55:00Z
4
value 0.00011
scoring_system epss
scoring_elements 0.01248
published_at 2026-04-16T12:55:00Z
5
value 0.00011
scoring_system epss
scoring_elements 0.01259
published_at 2026-04-11T12:55:00Z
6
value 0.00011
scoring_system epss
scoring_elements 0.01268
published_at 2026-04-07T12:55:00Z
7
value 0.00011
scoring_system epss
scoring_elements 0.01274
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-46103
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46103
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46103
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2292300
reference_id 2292300
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2292300
5
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01052.html
reference_id intel-sa-01052.html
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-21T15:00:27Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01052.html
6
reference_url https://access.redhat.com/errata/RHSA-2024:9401
reference_id RHSA-2024:9401
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9401
7
reference_url https://usn.ubuntu.com/6797-1/
reference_id USN-6797-1
reference_type
scores
url https://usn.ubuntu.com/6797-1/
fixed_packages
0
url pkg:apk/alpine/intel-ucode@20240813-r0?arch=armhf&distroversion=v3.17&reponame=main
purl pkg:apk/alpine/intel-ucode@20240813-r0?arch=armhf&distroversion=v3.17&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/intel-ucode@20240813-r0%3Farch=armhf&distroversion=v3.17&reponame=main
aliases CVE-2023-46103
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4bw3-w5hz-ekd1
3
url VCID-5dq7-wfyt-2uhz
vulnerability_id VCID-5dq7-wfyt-2uhz
summary kernel: Possible Denial of Service on Intel(R) Processors
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39368.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39368.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-39368
reference_id
reference_type
scores
0
value 0.00204
scoring_system epss
scoring_elements 0.42555
published_at 2026-04-02T12:55:00Z
1
value 0.00204
scoring_system epss
scoring_elements 0.42585
published_at 2026-04-18T12:55:00Z
2
value 0.00204
scoring_system epss
scoring_elements 0.42583
published_at 2026-04-09T12:55:00Z
3
value 0.00204
scoring_system epss
scoring_elements 0.42522
published_at 2026-04-07T12:55:00Z
4
value 0.00204
scoring_system epss
scoring_elements 0.42574
published_at 2026-04-08T12:55:00Z
5
value 0.00204
scoring_system epss
scoring_elements 0.42605
published_at 2026-04-11T12:55:00Z
6
value 0.00204
scoring_system epss
scoring_elements 0.42568
published_at 2026-04-12T12:55:00Z
7
value 0.00204
scoring_system epss
scoring_elements 0.4254
published_at 2026-04-13T12:55:00Z
8
value 0.00204
scoring_system epss
scoring_elements 0.42599
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-39368
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39368
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066108
reference_id 1066108
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066108
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270703
reference_id 2270703
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270703
6
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00972.html
reference_id intel-sa-00972.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-15T15:31:40Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00972.html
7
reference_url https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html
reference_id msg00003.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-15T15:31:40Z/
url https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html
8
reference_url https://security.netapp.com/advisory/ntap-20240405-0007/
reference_id ntap-20240405-0007
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-15T15:31:40Z/
url https://security.netapp.com/advisory/ntap-20240405-0007/
9
reference_url https://access.redhat.com/errata/RHSA-2024:9401
reference_id RHSA-2024:9401
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9401
10
reference_url https://usn.ubuntu.com/6797-1/
reference_id USN-6797-1
reference_type
scores
url https://usn.ubuntu.com/6797-1/
fixed_packages
0
url pkg:apk/alpine/intel-ucode@20240813-r0?arch=armhf&distroversion=v3.17&reponame=main
purl pkg:apk/alpine/intel-ucode@20240813-r0?arch=armhf&distroversion=v3.17&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/intel-ucode@20240813-r0%3Farch=armhf&distroversion=v3.17&reponame=main
aliases CVE-2023-39368
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5dq7-wfyt-2uhz
4
url VCID-9en3-y22n-wydw
vulnerability_id VCID-9en3-y22n-wydw
summary kernel: Local information disclosure on Intel(R) Xeon(R) D processors with Intel(R) SGX due to incorrect calculation in microcode
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43490.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43490.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-43490
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05469
published_at 2026-04-02T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05478
published_at 2026-04-18T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05504
published_at 2026-04-07T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.0554
published_at 2026-04-08T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05561
published_at 2026-04-09T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05536
published_at 2026-04-11T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05524
published_at 2026-04-12T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05517
published_at 2026-04-13T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.05468
published_at 2026-04-16T12:55:00Z
9
value 0.00021
scoring_system epss
scoring_elements 0.05503
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-43490
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43490
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066108
reference_id 1066108
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066108
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270704
reference_id 2270704
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270704
6
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01045.html
reference_id intel-sa-01045.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:34:04Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01045.html
7
reference_url https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html
reference_id msg00003.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:34:04Z/
url https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html
8
reference_url https://security.netapp.com/advisory/ntap-20240405-0009/
reference_id ntap-20240405-0009
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:34:04Z/
url https://security.netapp.com/advisory/ntap-20240405-0009/
9
reference_url https://access.redhat.com/errata/RHSA-2024:9401
reference_id RHSA-2024:9401
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9401
10
reference_url https://usn.ubuntu.com/6797-1/
reference_id USN-6797-1
reference_type
scores
url https://usn.ubuntu.com/6797-1/
fixed_packages
0
url pkg:apk/alpine/intel-ucode@20240813-r0?arch=armhf&distroversion=v3.17&reponame=main
purl pkg:apk/alpine/intel-ucode@20240813-r0?arch=armhf&distroversion=v3.17&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/intel-ucode@20240813-r0%3Farch=armhf&distroversion=v3.17&reponame=main
aliases CVE-2023-43490
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9en3-y22n-wydw
5
url VCID-bzwc-9ueu-gka1
vulnerability_id VCID-bzwc-9ueu-gka1
summary Incorrect behavior order in transition between executive monitor and SMI transfer monitor (STM) in some Intel(R) Processor may allow a privileged user to potentially enable escalation of privilege via local access.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-24853
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03538
published_at 2026-04-16T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.0355
published_at 2026-04-18T12:55:00Z
2
value 0.00019
scoring_system epss
scoring_elements 0.05126
published_at 2026-04-08T12:55:00Z
3
value 0.00019
scoring_system epss
scoring_elements 0.0514
published_at 2026-04-09T12:55:00Z
4
value 0.00019
scoring_system epss
scoring_elements 0.05115
published_at 2026-04-11T12:55:00Z
5
value 0.00019
scoring_system epss
scoring_elements 0.05099
published_at 2026-04-12T12:55:00Z
6
value 0.00019
scoring_system epss
scoring_elements 0.05083
published_at 2026-04-13T12:55:00Z
7
value 0.0002
scoring_system epss
scoring_elements 0.05236
published_at 2026-04-02T12:55:00Z
8
value 0.0002
scoring_system epss
scoring_elements 0.05294
published_at 2026-04-07T12:55:00Z
9
value 0.0002
scoring_system epss
scoring_elements 0.05268
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-24853
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24853
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24853
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078742
reference_id 1078742
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078742
4
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01083.html
reference_id intel-sa-01083.html
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H
1
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-14T19:14:11Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01083.html
5
reference_url https://usn.ubuntu.com/6967-1/
reference_id USN-6967-1
reference_type
scores
url https://usn.ubuntu.com/6967-1/
fixed_packages
0
url pkg:apk/alpine/intel-ucode@20240813-r0?arch=armhf&distroversion=v3.17&reponame=main
purl pkg:apk/alpine/intel-ucode@20240813-r0?arch=armhf&distroversion=v3.17&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/intel-ucode@20240813-r0%3Farch=armhf&distroversion=v3.17&reponame=main
aliases CVE-2024-24853
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bzwc-9ueu-gka1
6
url VCID-dzdf-drjk-m3cj
vulnerability_id VCID-dzdf-drjk-m3cj
summary kernel: Local information disclosure in some Intel(R) processors
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38575.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38575.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-38575
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07655
published_at 2026-04-02T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07626
published_at 2026-04-18T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07667
published_at 2026-04-07T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07727
published_at 2026-04-08T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07745
published_at 2026-04-09T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07743
published_at 2026-04-11T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.0773
published_at 2026-04-12T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07714
published_at 2026-04-13T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07638
published_at 2026-04-16T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07698
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-38575
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38575
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066108
reference_id 1066108
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066108
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270701
reference_id 2270701
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270701
6
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00982.html
reference_id intel-sa-00982.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-27T19:25:29Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00982.html
7
reference_url https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html
reference_id msg00003.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-27T19:25:29Z/
url https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html
8
reference_url https://security.netapp.com/advisory/ntap-20240405-0008/
reference_id ntap-20240405-0008
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-27T19:25:29Z/
url https://security.netapp.com/advisory/ntap-20240405-0008/
9
reference_url https://access.redhat.com/errata/RHSA-2024:9401
reference_id RHSA-2024:9401
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9401
10
reference_url https://usn.ubuntu.com/6797-1/
reference_id USN-6797-1
reference_type
scores
url https://usn.ubuntu.com/6797-1/
fixed_packages
0
url pkg:apk/alpine/intel-ucode@20240813-r0?arch=armhf&distroversion=v3.17&reponame=main
purl pkg:apk/alpine/intel-ucode@20240813-r0?arch=armhf&distroversion=v3.17&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/intel-ucode@20240813-r0%3Farch=armhf&distroversion=v3.17&reponame=main
aliases CVE-2023-38575
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dzdf-drjk-m3cj
7
url VCID-jqnr-61tn-kben
vulnerability_id VCID-jqnr-61tn-kben
summary intel-microcode: Race conditions in some Intel(R) Processors
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-45733.json
reference_id
reference_type
scores
0
value 2.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-45733.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-45733
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03292
published_at 2026-04-02T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.03231
published_at 2026-04-18T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03266
published_at 2026-04-12T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.03245
published_at 2026-04-13T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03221
published_at 2026-04-16T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.03302
published_at 2026-04-04T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.03311
published_at 2026-04-07T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.03315
published_at 2026-04-08T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.03336
published_at 2026-04-09T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.03294
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-45733
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45733
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2292296
reference_id 2292296
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2292296
5
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01051.html
reference_id intel-sa-01051.html
reference_type
scores
0
value 2.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-24T16:02:23Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01051.html
6
reference_url https://access.redhat.com/errata/RHSA-2024:9401
reference_id RHSA-2024:9401
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9401
7
reference_url https://usn.ubuntu.com/6797-1/
reference_id USN-6797-1
reference_type
scores
url https://usn.ubuntu.com/6797-1/
fixed_packages
0
url pkg:apk/alpine/intel-ucode@20240813-r0?arch=armhf&distroversion=v3.17&reponame=main
purl pkg:apk/alpine/intel-ucode@20240813-r0?arch=armhf&distroversion=v3.17&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/intel-ucode@20240813-r0%3Farch=armhf&distroversion=v3.17&reponame=main
aliases CVE-2023-45733
risk_score 1.2
exploitability 0.5
weighted_severity 2.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jqnr-61tn-kben
8
url VCID-mu4u-d5mc-kbgk
vulnerability_id VCID-mu4u-d5mc-kbgk
summary Protection mechanism failure in some 3rd, 4th, and 5th Generation Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-24980
reference_id
reference_type
scores
0
value 0.00055
scoring_system epss
scoring_elements 0.1735
published_at 2026-04-18T12:55:00Z
1
value 0.00055
scoring_system epss
scoring_elements 0.175
published_at 2026-04-11T12:55:00Z
2
value 0.00055
scoring_system epss
scoring_elements 0.17453
published_at 2026-04-12T12:55:00Z
3
value 0.00055
scoring_system epss
scoring_elements 0.174
published_at 2026-04-13T12:55:00Z
4
value 0.00055
scoring_system epss
scoring_elements 0.17342
published_at 2026-04-16T12:55:00Z
5
value 0.00055
scoring_system epss
scoring_elements 0.17508
published_at 2026-04-02T12:55:00Z
6
value 0.00055
scoring_system epss
scoring_elements 0.17555
published_at 2026-04-04T12:55:00Z
7
value 0.00055
scoring_system epss
scoring_elements 0.17335
published_at 2026-04-07T12:55:00Z
8
value 0.00055
scoring_system epss
scoring_elements 0.17427
published_at 2026-04-08T12:55:00Z
9
value 0.00055
scoring_system epss
scoring_elements 0.17488
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-24980
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24980
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24980
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078742
reference_id 1078742
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078742
4
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01100.html
reference_id intel-sa-01100.html
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:L/VI:H/VA:N/SC:L/SI:H/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-14T13:59:03Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01100.html
5
reference_url https://usn.ubuntu.com/6967-1/
reference_id USN-6967-1
reference_type
scores
url https://usn.ubuntu.com/6967-1/
fixed_packages
0
url pkg:apk/alpine/intel-ucode@20240813-r0?arch=armhf&distroversion=v3.17&reponame=main
purl pkg:apk/alpine/intel-ucode@20240813-r0?arch=armhf&distroversion=v3.17&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/intel-ucode@20240813-r0%3Farch=armhf&distroversion=v3.17&reponame=main
aliases CVE-2024-24980
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mu4u-d5mc-kbgk
9
url VCID-p2fk-8snj-x7dy
vulnerability_id VCID-p2fk-8snj-x7dy
summary x86: Register File Data Sampling
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28746.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28746.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-28746
reference_id
reference_type
scores
0
value 0.00051
scoring_system epss
scoring_elements 0.15885
published_at 2026-04-02T12:55:00Z
1
value 0.00051
scoring_system epss
scoring_elements 0.15693
published_at 2026-04-18T12:55:00Z
2
value 0.00051
scoring_system epss
scoring_elements 0.15947
published_at 2026-04-04T12:55:00Z
3
value 0.00051
scoring_system epss
scoring_elements 0.15746
published_at 2026-04-07T12:55:00Z
4
value 0.00051
scoring_system epss
scoring_elements 0.15831
published_at 2026-04-08T12:55:00Z
5
value 0.00051
scoring_system epss
scoring_elements 0.15893
published_at 2026-04-09T12:55:00Z
6
value 0.00051
scoring_system epss
scoring_elements 0.15868
published_at 2026-04-11T12:55:00Z
7
value 0.00051
scoring_system epss
scoring_elements 0.1583
published_at 2026-04-12T12:55:00Z
8
value 0.00051
scoring_system epss
scoring_elements 0.15761
published_at 2026-04-13T12:55:00Z
9
value 0.00051
scoring_system epss
scoring_elements 0.15683
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-28746
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28746
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47233
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47233
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52429
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52429
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52434
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52435
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52447
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52447
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52458
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52458
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52482
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52486
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52488
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52489
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52491
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52491
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52492
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52493
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52493
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52497
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52497
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52498
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52583
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52587
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52587
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52594
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52595
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52597
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52598
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52599
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52600
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52601
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52602
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52603
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52604
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52606
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52607
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52614
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52614
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52615
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52616
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52617
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52618
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52619
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52620
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52622
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52623
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52627
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52627
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52635
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52637
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52642
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52644
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52650
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6270
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6270
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7042
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0340
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0565
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0607
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0841
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0841
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1151
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1151
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22099
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22099
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23849
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23849
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23850
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23850
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23851
58
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24857
59
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24858
60
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24861
61
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26581
62
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26593
63
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26600
64
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26601
65
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26602
66
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26606
67
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26610
68
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26614
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26614
69
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26615
70
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26622
71
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26625
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26625
72
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26627
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26627
73
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26635
74
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26636
75
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26640
76
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26641
77
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26642
78
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26643
79
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26644
80
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26645
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26645
81
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26651
82
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26654
83
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26659
84
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26663
85
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26664
86
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26665
87
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26671
88
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26673
89
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26675
90
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26679
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26679
91
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26684
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26684
92
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26685
93
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26687
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26687
94
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26688
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26688
95
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26689
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26689
96
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26695
97
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26696
98
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26697
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26697
99
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26698
100
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26702
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26702
101
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26704
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26704
102
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26707
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26707
103
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26712
104
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26722
105
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26727
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26727
106
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26733
107
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26735
108
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26736
109
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26743
110
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26744
111
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26747
112
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26748
113
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26749
114
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26751
115
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26752
116
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26753
117
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26754
118
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26763
119
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26764
120
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26766
121
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26771
122
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26772
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26772
123
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26773
124
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26776
125
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26777
126
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26778
127
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26779
128
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26781
129
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26782
130
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26787
131
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26788
132
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26790
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26790
133
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26791
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26791
134
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26793
135
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26795
136
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26801
137
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26804
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26804
138
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26805
139
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26808
140
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26809
141
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26810
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26810
142
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26812
143
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26813
144
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26814
145
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26816
146
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26817
147
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26820
148
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26825
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26825
149
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26833
150
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26835
151
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26839
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26839
152
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26840
153
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26843
154
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26845
155
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26846
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26846
156
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26851
157
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26852
158
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26855
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26855
159
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26857
160
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26859
161
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26861
162
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26862
163
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26863
164
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26870
165
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26872
166
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26874
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26874
167
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26875
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26875
168
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26877
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26877
169
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26878
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26878
170
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26880
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26880
171
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26882
172
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26883
173
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26884
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26884
174
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26885
175
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26889
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26889
176
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26891
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26891
177
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26894
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26894
178
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26895
179
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26897
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26897
180
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26898
181
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26901
182
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26903
183
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26906
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26906
184
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26907
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26907
185
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26910
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26910
186
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26917
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26917
187
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26922
188
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26923
189
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26924
190
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26925
191
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26926
192
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26931
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26931
193
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26934
194
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26935
195
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26937
196
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26950
197
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26951
198
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26955
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26955
199
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26956
200
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26957
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26957
201
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26958
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26958
202
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26960
203
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26961
204
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26965
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26965
205
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26966
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26966
206
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26969
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26969
207
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26970
208
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26973
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26973
209
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26974
210
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26976
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26976
211
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26978
212
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26981
213
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26984
214
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26988
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26988
215
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26993
216
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26994
217
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26997
218
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26999
219
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27000
220
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27001
221
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27004
222
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27008
223
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27013
224
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27020
225
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27024
226
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27025
227
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27028
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27028
228
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27030
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27030
229
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27038
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27038
230
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27043
231
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27044
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27044
232
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27045
233
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27046
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27046
234
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27047
235
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27051
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27051
236
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27052
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27052
237
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27053
238
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27059
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27059
239
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27065
240
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27073
241
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27074
242
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27075
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27075
243
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27076
244
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27077
245
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27078
246
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27388
247
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27437
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27437
248
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
249
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066108
reference_id 1066108
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066108
250
reference_url http://www.openwall.com/lists/oss-security/2024/03/12/13
reference_id 13
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/
url http://www.openwall.com/lists/oss-security/2024/03/12/13
251
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270700
reference_id 2270700
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270700
252
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK/
reference_id EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK/
253
reference_url https://security.gentoo.org/glsa/202409-10
reference_id GLSA-202409-10
reference_type
scores
url https://security.gentoo.org/glsa/202409-10
254
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H63LGAQXPEVJOES73U4XK65I6DASOAAG/
reference_id H63LGAQXPEVJOES73U4XK65I6DASOAAG
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H63LGAQXPEVJOES73U4XK65I6DASOAAG/
255
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00898.html
reference_id intel-sa-00898.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00898.html
256
reference_url https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html
reference_id msg00003.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/
url https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html
257
reference_url https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
reference_id msg00017.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/
url https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
258
reference_url https://access.redhat.com/errata/RHSA-2024:5101
reference_id RHSA-2024:5101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5101
259
reference_url https://access.redhat.com/errata/RHSA-2024:8157
reference_id RHSA-2024:8157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8157
260
reference_url https://access.redhat.com/errata/RHSA-2024:8158
reference_id RHSA-2024:8158
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8158
261
reference_url https://access.redhat.com/errata/RHSA-2024:8162
reference_id RHSA-2024:8162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8162
262
reference_url https://access.redhat.com/errata/RHSA-2024:9401
reference_id RHSA-2024:9401
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9401
263
reference_url https://usn.ubuntu.com/6797-1/
reference_id USN-6797-1
reference_type
scores
url https://usn.ubuntu.com/6797-1/
264
reference_url https://xenbits.xen.org/xsa/advisory-452.html
reference_id XSA-452
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-452.html
265
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/
reference_id ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/
fixed_packages
0
url pkg:apk/alpine/intel-ucode@20240813-r0?arch=armhf&distroversion=v3.17&reponame=main
purl pkg:apk/alpine/intel-ucode@20240813-r0?arch=armhf&distroversion=v3.17&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/intel-ucode@20240813-r0%3Farch=armhf&distroversion=v3.17&reponame=main
aliases CVE-2023-28746, XSA-452
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p2fk-8snj-x7dy
10
url VCID-uj7d-tpax-fqhd
vulnerability_id VCID-uj7d-tpax-fqhd
summary kernel: local privilege escalation on Intel microcode on Intel(R) Xeon(R)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22655.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22655.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22655
reference_id
reference_type
scores
0
value 0.00032
scoring_system epss
scoring_elements 0.09099
published_at 2026-04-02T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.09012
published_at 2026-04-18T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.09152
published_at 2026-04-12T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.09072
published_at 2026-04-07T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.09183
published_at 2026-04-09T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.09185
published_at 2026-04-11T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09138
published_at 2026-04-13T12:55:00Z
7
value 0.00032
scoring_system epss
scoring_elements 0.09032
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22655
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22655
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066108
reference_id 1066108
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066108
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270698
reference_id 2270698
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270698
6
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00960.html
reference_id intel-sa-00960.html
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-14T18:28:48Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00960.html
7
reference_url https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html
reference_id msg00003.html
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-14T18:28:48Z/
url https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html
8
reference_url https://security.netapp.com/advisory/ntap-20240405-0006/
reference_id ntap-20240405-0006
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-14T18:28:48Z/
url https://security.netapp.com/advisory/ntap-20240405-0006/
9
reference_url https://access.redhat.com/errata/RHSA-2024:9401
reference_id RHSA-2024:9401
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9401
10
reference_url https://usn.ubuntu.com/6797-1/
reference_id USN-6797-1
reference_type
scores
url https://usn.ubuntu.com/6797-1/
fixed_packages
0
url pkg:apk/alpine/intel-ucode@20240813-r0?arch=armhf&distroversion=v3.17&reponame=main
purl pkg:apk/alpine/intel-ucode@20240813-r0?arch=armhf&distroversion=v3.17&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/intel-ucode@20240813-r0%3Farch=armhf&distroversion=v3.17&reponame=main
aliases CVE-2023-22655
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uj7d-tpax-fqhd
11
url VCID-xb28-un42-1uag
vulnerability_id VCID-xb28-un42-1uag
summary Improper isolation in the Intel(R) Core(TM) Ultra Processor stream cache mechanism may allow an authenticated user to potentially enable escalation of privilege via local access.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42667
reference_id
reference_type
scores
0
value 0.00045
scoring_system epss
scoring_elements 0.1383
published_at 2026-04-18T12:55:00Z
1
value 0.00045
scoring_system epss
scoring_elements 0.14067
published_at 2026-04-02T12:55:00Z
2
value 0.00045
scoring_system epss
scoring_elements 0.14019
published_at 2026-04-11T12:55:00Z
3
value 0.00045
scoring_system epss
scoring_elements 0.13982
published_at 2026-04-12T12:55:00Z
4
value 0.00045
scoring_system epss
scoring_elements 0.13932
published_at 2026-04-13T12:55:00Z
5
value 0.00045
scoring_system epss
scoring_elements 0.13836
published_at 2026-04-16T12:55:00Z
6
value 0.00045
scoring_system epss
scoring_elements 0.14121
published_at 2026-04-04T12:55:00Z
7
value 0.00045
scoring_system epss
scoring_elements 0.13927
published_at 2026-04-07T12:55:00Z
8
value 0.00045
scoring_system epss
scoring_elements 0.14011
published_at 2026-04-08T12:55:00Z
9
value 0.00045
scoring_system epss
scoring_elements 0.14064
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42667
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42667
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42667
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078742
reference_id 1078742
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078742
4
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01038.html
reference_id intel-sa-01038.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-14T15:09:41Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01038.html
5
reference_url https://usn.ubuntu.com/6967-1/
reference_id USN-6967-1
reference_type
scores
url https://usn.ubuntu.com/6967-1/
fixed_packages
0
url pkg:apk/alpine/intel-ucode@20240813-r0?arch=armhf&distroversion=v3.17&reponame=main
purl pkg:apk/alpine/intel-ucode@20240813-r0?arch=armhf&distroversion=v3.17&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/intel-ucode@20240813-r0%3Farch=armhf&distroversion=v3.17&reponame=main
aliases CVE-2023-42667
risk_score 2.4
exploitability 0.5
weighted_severity 4.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xb28-un42-1uag
12
url VCID-z8gt-jznd-ryht
vulnerability_id VCID-z8gt-jznd-ryht
summary Improper isolation in some Intel(R) Processors stream cache mechanism may allow an authenticated user to potentially enable escalation of privilege via local access.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-49141
reference_id
reference_type
scores
0
value 0.00051
scoring_system epss
scoring_elements 0.16041
published_at 2026-04-18T12:55:00Z
1
value 0.00051
scoring_system epss
scoring_elements 0.16212
published_at 2026-04-02T12:55:00Z
2
value 0.00051
scoring_system epss
scoring_elements 0.162
published_at 2026-04-11T12:55:00Z
3
value 0.00051
scoring_system epss
scoring_elements 0.16161
published_at 2026-04-12T12:55:00Z
4
value 0.00051
scoring_system epss
scoring_elements 0.16093
published_at 2026-04-13T12:55:00Z
5
value 0.00051
scoring_system epss
scoring_elements 0.16026
published_at 2026-04-16T12:55:00Z
6
value 0.00051
scoring_system epss
scoring_elements 0.16273
published_at 2026-04-04T12:55:00Z
7
value 0.00051
scoring_system epss
scoring_elements 0.16068
published_at 2026-04-07T12:55:00Z
8
value 0.00051
scoring_system epss
scoring_elements 0.16153
published_at 2026-04-08T12:55:00Z
9
value 0.00051
scoring_system epss
scoring_elements 0.16217
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-49141
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49141
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49141
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078742
reference_id 1078742
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078742
4
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01046.html
reference_id intel-sa-01046.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-14T14:39:50Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01046.html
5
reference_url https://usn.ubuntu.com/6967-1/
reference_id USN-6967-1
reference_type
scores
url https://usn.ubuntu.com/6967-1/
fixed_packages
0
url pkg:apk/alpine/intel-ucode@20240813-r0?arch=armhf&distroversion=v3.17&reponame=main
purl pkg:apk/alpine/intel-ucode@20240813-r0?arch=armhf&distroversion=v3.17&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/intel-ucode@20240813-r0%3Farch=armhf&distroversion=v3.17&reponame=main
aliases CVE-2023-49141
risk_score 2.4
exploitability 0.5
weighted_severity 4.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z8gt-jznd-ryht
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/intel-ucode@20240813-r0%3Farch=armhf&distroversion=v3.17&reponame=main