Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/intel-ucode@20250812-r0?arch=loongarch64&distroversion=v3.22&reponame=main
Typeapk
Namespacealpine
Nameintel-ucode
Version20250812-r0
Qualifiers
arch loongarch64
distroversion v3.22
reponame main
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version20260210-r0
Latest_non_vulnerable_version20260210-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-2ues-wvyq-6qc9
vulnerability_id VCID-2ues-wvyq-6qc9
summary Improperly implemented security check for standard in the DDRIO configuration for some Intel(R) Xeon(R) 6 Processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32086
reference_id
reference_type
scores
0
value 0.00013
scoring_system epss
scoring_elements 0.02098
published_at 2026-04-11T12:55:00Z
1
value 0.00013
scoring_system epss
scoring_elements 0.02101
published_at 2026-04-02T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.02053
published_at 2026-04-16T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.02079
published_at 2026-04-13T12:55:00Z
4
value 0.00013
scoring_system epss
scoring_elements 0.02084
published_at 2026-04-12T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.02108
published_at 2026-04-04T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.02103
published_at 2026-04-07T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.02104
published_at 2026-04-08T12:55:00Z
8
value 0.00013
scoring_system epss
scoring_elements 0.02122
published_at 2026-04-09T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02568
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32086
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32086
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32086
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
reference_id 1110983
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
4
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01367.html
reference_id intel-sa-01367.html
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N
1
value 4.5
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-13T15:04:21Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01367.html
5
reference_url https://usn.ubuntu.com/7866-1/
reference_id USN-7866-1
reference_type
scores
url https://usn.ubuntu.com/7866-1/
fixed_packages
0
url pkg:apk/alpine/intel-ucode@20250812-r0?arch=loongarch64&distroversion=v3.22&reponame=main
purl pkg:apk/alpine/intel-ucode@20250812-r0?arch=loongarch64&distroversion=v3.22&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/intel-ucode@20250812-r0%3Farch=loongarch64&distroversion=v3.22&reponame=main
aliases CVE-2025-32086
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2ues-wvyq-6qc9
1
url VCID-4uuw-pm94-1kak
vulnerability_id VCID-4uuw-pm94-1kak
summary Missing reference to active allocated resource for some Intel(R) Xeon(R) processors may allow an authenticated user to potentially enable denial of service via local access.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-21090
reference_id
reference_type
scores
0
value 0.00031
scoring_system epss
scoring_elements 0.09017
published_at 2026-04-02T12:55:00Z
1
value 0.00031
scoring_system epss
scoring_elements 0.09104
published_at 2026-04-11T12:55:00Z
2
value 0.00031
scoring_system epss
scoring_elements 0.09071
published_at 2026-04-12T12:55:00Z
3
value 0.00031
scoring_system epss
scoring_elements 0.09058
published_at 2026-04-13T12:55:00Z
4
value 0.00031
scoring_system epss
scoring_elements 0.08952
published_at 2026-04-16T12:55:00Z
5
value 0.00031
scoring_system epss
scoring_elements 0.09068
published_at 2026-04-04T12:55:00Z
6
value 0.00031
scoring_system epss
scoring_elements 0.08992
published_at 2026-04-07T12:55:00Z
7
value 0.00031
scoring_system epss
scoring_elements 0.09072
published_at 2026-04-08T12:55:00Z
8
value 0.00031
scoring_system epss
scoring_elements 0.09103
published_at 2026-04-09T12:55:00Z
9
value 0.00032
scoring_system epss
scoring_elements 0.09145
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-21090
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21090
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
reference_id 1110983
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
3
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01313.html
reference_id intel-sa-01313.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value 4.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:P/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-12T19:09:39Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01313.html
4
reference_url https://usn.ubuntu.com/7866-1/
reference_id USN-7866-1
reference_type
scores
url https://usn.ubuntu.com/7866-1/
fixed_packages
0
url pkg:apk/alpine/intel-ucode@20250812-r0?arch=loongarch64&distroversion=v3.22&reponame=main
purl pkg:apk/alpine/intel-ucode@20250812-r0?arch=loongarch64&distroversion=v3.22&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/intel-ucode@20250812-r0%3Farch=loongarch64&distroversion=v3.22&reponame=main
aliases CVE-2025-21090
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4uuw-pm94-1kak
2
url VCID-75cx-avm7-tfcb
vulnerability_id VCID-75cx-avm7-tfcb
summary Improper handling of overlap between protected memory ranges for some Intel(R) Xeon(R) 6 processor with Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-22889
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03485
published_at 2026-04-11T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03482
published_at 2026-04-02T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.03407
published_at 2026-04-16T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.03432
published_at 2026-04-13T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.03457
published_at 2026-04-12T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03493
published_at 2026-04-04T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.03505
published_at 2026-04-07T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03507
published_at 2026-04-08T12:55:00Z
8
value 0.00016
scoring_system epss
scoring_elements 0.0353
published_at 2026-04-09T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.04119
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-22889
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22889
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22889
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
reference_id 1110983
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
4
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01311.html
reference_id intel-sa-01311.html
reference_type
scores
0
value 7.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
1
value 7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-13T18:04:29Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01311.html
5
reference_url https://usn.ubuntu.com/7866-1/
reference_id USN-7866-1
reference_type
scores
url https://usn.ubuntu.com/7866-1/
fixed_packages
0
url pkg:apk/alpine/intel-ucode@20250812-r0?arch=loongarch64&distroversion=v3.22&reponame=main
purl pkg:apk/alpine/intel-ucode@20250812-r0?arch=loongarch64&distroversion=v3.22&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/intel-ucode@20250812-r0%3Farch=loongarch64&distroversion=v3.22&reponame=main
aliases CVE-2025-22889
risk_score 2.4
exploitability 0.5
weighted_severity 4.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-75cx-avm7-tfcb
3
url VCID-7wcy-5hnc-tfh4
vulnerability_id VCID-7wcy-5hnc-tfh4
summary Improper Isolation or Compartmentalization in the stream cache mechanism for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege via local access.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-20109
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03426
published_at 2026-04-18T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03362
published_at 2026-04-02T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.03416
published_at 2026-04-09T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.03347
published_at 2026-04-12T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.03324
published_at 2026-04-13T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.033
published_at 2026-04-16T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.03375
published_at 2026-04-11T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03391
published_at 2026-04-07T12:55:00Z
8
value 0.00016
scoring_system epss
scoring_elements 0.03395
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-20109
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20109
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
reference_id 1110983
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
4
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01249.html
reference_id intel-sa-01249.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-12T19:16:39Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01249.html
5
reference_url https://usn.ubuntu.com/7866-1/
reference_id USN-7866-1
reference_type
scores
url https://usn.ubuntu.com/7866-1/
fixed_packages
0
url pkg:apk/alpine/intel-ucode@20250812-r0?arch=loongarch64&distroversion=v3.22&reponame=main
purl pkg:apk/alpine/intel-ucode@20250812-r0?arch=loongarch64&distroversion=v3.22&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/intel-ucode@20250812-r0%3Farch=loongarch64&distroversion=v3.22&reponame=main
aliases CVE-2025-20109
risk_score 2.4
exploitability 0.5
weighted_severity 4.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7wcy-5hnc-tfh4
4
url VCID-8nyc-r2e4-17gr
vulnerability_id VCID-8nyc-r2e4-17gr
summary Insufficient control flow management in the Alias Checking Trusted Module (ACTM) firmware for some Intel(R) Xeon(R) processors may allow a privileged user to potentially enable escalation of privilege via local access.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24305
reference_id
reference_type
scores
0
value 7e-05
scoring_system epss
scoring_elements 0.00606
published_at 2026-04-02T12:55:00Z
1
value 7e-05
scoring_system epss
scoring_elements 0.00593
published_at 2026-04-11T12:55:00Z
2
value 7e-05
scoring_system epss
scoring_elements 0.00589
published_at 2026-04-12T12:55:00Z
3
value 7e-05
scoring_system epss
scoring_elements 0.0059
published_at 2026-04-13T12:55:00Z
4
value 7e-05
scoring_system epss
scoring_elements 0.00585
published_at 2026-04-16T12:55:00Z
5
value 7e-05
scoring_system epss
scoring_elements 0.006
published_at 2026-04-04T12:55:00Z
6
value 7e-05
scoring_system epss
scoring_elements 0.00601
published_at 2026-04-07T12:55:00Z
7
value 7e-05
scoring_system epss
scoring_elements 0.00599
published_at 2026-04-08T12:55:00Z
8
value 8e-05
scoring_system epss
scoring_elements 0.00694
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24305
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24305
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24305
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
reference_id 1110983
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
3
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01313.html
reference_id intel-sa-01313.html
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N
1
value 7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-13T18:04:22Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01313.html
4
reference_url https://usn.ubuntu.com/7866-1/
reference_id USN-7866-1
reference_type
scores
url https://usn.ubuntu.com/7866-1/
fixed_packages
0
url pkg:apk/alpine/intel-ucode@20250812-r0?arch=loongarch64&distroversion=v3.22&reponame=main
purl pkg:apk/alpine/intel-ucode@20250812-r0?arch=loongarch64&distroversion=v3.22&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/intel-ucode@20250812-r0%3Farch=loongarch64&distroversion=v3.22&reponame=main
aliases CVE-2025-24305
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8nyc-r2e4-17gr
5
url VCID-f859-13vd-7uef
vulnerability_id VCID-f859-13vd-7uef
summary Out-of-bounds write in the memory subsystem for some Intel(R) Xeon(R) 6 processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-26403
reference_id
reference_type
scores
0
value 0.00013
scoring_system epss
scoring_elements 0.02098
published_at 2026-04-11T12:55:00Z
1
value 0.00013
scoring_system epss
scoring_elements 0.02101
published_at 2026-04-02T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.02053
published_at 2026-04-16T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.02079
published_at 2026-04-13T12:55:00Z
4
value 0.00013
scoring_system epss
scoring_elements 0.02084
published_at 2026-04-12T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.02108
published_at 2026-04-04T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.02103
published_at 2026-04-07T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.02104
published_at 2026-04-08T12:55:00Z
8
value 0.00013
scoring_system epss
scoring_elements 0.02122
published_at 2026-04-09T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02568
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-26403
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26403
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
reference_id 1110983
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
4
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01367.html
reference_id intel-sa-01367.html
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N
1
value 4.5
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-13T15:04:08Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01367.html
5
reference_url https://usn.ubuntu.com/7866-1/
reference_id USN-7866-1
reference_type
scores
url https://usn.ubuntu.com/7866-1/
fixed_packages
0
url pkg:apk/alpine/intel-ucode@20250812-r0?arch=loongarch64&distroversion=v3.22&reponame=main
purl pkg:apk/alpine/intel-ucode@20250812-r0?arch=loongarch64&distroversion=v3.22&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/intel-ucode@20250812-r0%3Farch=loongarch64&distroversion=v3.22&reponame=main
aliases CVE-2025-26403
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f859-13vd-7uef
6
url VCID-gmr7-umz8-9fhm
vulnerability_id VCID-gmr7-umz8-9fhm
summary Insufficient granularity of access control in the OOB-MSM for some Intel(R) Xeon(R) 6 Scalable processors may allow a privileged user to potentially enable escalation of privilege via adjacent access.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-22839
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05742
published_at 2026-04-11T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05666
published_at 2026-04-02T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05686
published_at 2026-04-16T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.0573
published_at 2026-04-13T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05735
published_at 2026-04-12T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05706
published_at 2026-04-04T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05699
published_at 2026-04-07T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05738
published_at 2026-04-08T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.05765
published_at 2026-04-09T12:55:00Z
9
value 0.00023
scoring_system epss
scoring_elements 0.06168
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-22839
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22839
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22839
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
reference_id 1110983
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
4
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01310.html
reference_id intel-sa-01310.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:L
1
value 7.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:A/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-12T19:09:05Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01310.html
5
reference_url https://usn.ubuntu.com/7866-1/
reference_id USN-7866-1
reference_type
scores
url https://usn.ubuntu.com/7866-1/
fixed_packages
0
url pkg:apk/alpine/intel-ucode@20250812-r0?arch=loongarch64&distroversion=v3.22&reponame=main
purl pkg:apk/alpine/intel-ucode@20250812-r0?arch=loongarch64&distroversion=v3.22&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/intel-ucode@20250812-r0%3Farch=loongarch64&distroversion=v3.22&reponame=main
aliases CVE-2025-22839
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gmr7-umz8-9fhm
7
url VCID-j6j9-vj4t-bfa6
vulnerability_id VCID-j6j9-vj4t-bfa6
summary Improper buffer restrictions for some Intel(R) Xeon(R) Processor firmware with SGX enabled may allow a privileged user to potentially enable escalation of privilege via local access.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-20053
reference_id
reference_type
scores
0
value 0.00013
scoring_system epss
scoring_elements 0.02098
published_at 2026-04-11T12:55:00Z
1
value 0.00013
scoring_system epss
scoring_elements 0.02101
published_at 2026-04-02T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.02053
published_at 2026-04-16T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.02079
published_at 2026-04-13T12:55:00Z
4
value 0.00013
scoring_system epss
scoring_elements 0.02084
published_at 2026-04-12T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.02108
published_at 2026-04-04T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.02103
published_at 2026-04-07T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.02104
published_at 2026-04-08T12:55:00Z
8
value 0.00013
scoring_system epss
scoring_elements 0.02122
published_at 2026-04-09T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02568
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-20053
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20053
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
reference_id 1110983
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
4
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01313.html
reference_id intel-sa-01313.html
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N
1
value 7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-12T18:24:39Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01313.html
5
reference_url https://usn.ubuntu.com/7866-1/
reference_id USN-7866-1
reference_type
scores
url https://usn.ubuntu.com/7866-1/
fixed_packages
0
url pkg:apk/alpine/intel-ucode@20250812-r0?arch=loongarch64&distroversion=v3.22&reponame=main
purl pkg:apk/alpine/intel-ucode@20250812-r0?arch=loongarch64&distroversion=v3.22&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/intel-ucode@20250812-r0%3Farch=loongarch64&distroversion=v3.22&reponame=main
aliases CVE-2025-20053
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j6j9-vj4t-bfa6
8
url VCID-kha2-8ez1-gfhr
vulnerability_id VCID-kha2-8ez1-gfhr
summary Sequence of processor instructions leads to unexpected behavior for some Intel(R) Xeon(R) 6 Scalable processors may allow an authenticated user to potentially enable escalation of privilege via local access
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-22840
reference_id
reference_type
scores
0
value 8e-05
scoring_system epss
scoring_elements 0.00775
published_at 2026-04-09T12:55:00Z
1
value 8e-05
scoring_system epss
scoring_elements 0.0078
published_at 2026-04-08T12:55:00Z
2
value 8e-05
scoring_system epss
scoring_elements 0.00763
published_at 2026-04-16T12:55:00Z
3
value 8e-05
scoring_system epss
scoring_elements 0.00762
published_at 2026-04-12T12:55:00Z
4
value 8e-05
scoring_system epss
scoring_elements 0.00769
published_at 2026-04-11T12:55:00Z
5
value 8e-05
scoring_system epss
scoring_elements 0.00781
published_at 2026-04-07T12:55:00Z
6
value 9e-05
scoring_system epss
scoring_elements 0.00883
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-22840
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22840
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
reference_id 1110983
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983
4
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01308.html
reference_id intel-sa-01308.html
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L
1
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-14T03:55:09Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01308.html
5
reference_url https://usn.ubuntu.com/7866-1/
reference_id USN-7866-1
reference_type
scores
url https://usn.ubuntu.com/7866-1/
fixed_packages
0
url pkg:apk/alpine/intel-ucode@20250812-r0?arch=loongarch64&distroversion=v3.22&reponame=main
purl pkg:apk/alpine/intel-ucode@20250812-r0?arch=loongarch64&distroversion=v3.22&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/intel-ucode@20250812-r0%3Farch=loongarch64&distroversion=v3.22&reponame=main
aliases CVE-2025-22840
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kha2-8ez1-gfhr
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/intel-ucode@20250812-r0%3Farch=loongarch64&distroversion=v3.22&reponame=main