Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/intel-ucode@20250512-r0?arch=armv7&distroversion=v3.20&reponame=main
Typeapk
Namespacealpine
Nameintel-ucode
Version20250512-r0
Qualifiers
arch armv7
distroversion v3.20
reponame main
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version20250812-r0
Latest_non_vulnerable_version20260210-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-51nr-8avm-qued
vulnerability_id VCID-51nr-8avm-qued
summary microcode_ctl: From CVEorg collector
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-20012.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-20012.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-20012
reference_id
reference_type
scores
0
value 0.0007
scoring_system epss
scoring_elements 0.21497
published_at 2026-04-02T12:55:00Z
1
value 0.0007
scoring_system epss
scoring_elements 0.21369
published_at 2026-04-18T12:55:00Z
2
value 0.0007
scoring_system epss
scoring_elements 0.21459
published_at 2026-04-11T12:55:00Z
3
value 0.0007
scoring_system epss
scoring_elements 0.21421
published_at 2026-04-12T12:55:00Z
4
value 0.0007
scoring_system epss
scoring_elements 0.21365
published_at 2026-04-13T12:55:00Z
5
value 0.0007
scoring_system epss
scoring_elements 0.21361
published_at 2026-04-16T12:55:00Z
6
value 0.0007
scoring_system epss
scoring_elements 0.21553
published_at 2026-04-04T12:55:00Z
7
value 0.0007
scoring_system epss
scoring_elements 0.21309
published_at 2026-04-07T12:55:00Z
8
value 0.0007
scoring_system epss
scoring_elements 0.21387
published_at 2026-04-08T12:55:00Z
9
value 0.0007
scoring_system epss
scoring_elements 0.21448
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-20012
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20012
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172
reference_id 1105172
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366114
reference_id 2366114
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366114
6
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01322.html
reference_id intel-sa-01322.html
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
1
value 4.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-14T20:19:54Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01322.html
7
reference_url https://access.redhat.com/errata/RHSA-2025:10101
reference_id RHSA-2025:10101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10101
8
reference_url https://access.redhat.com/errata/RHSA-2025:10102
reference_id RHSA-2025:10102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10102
9
reference_url https://access.redhat.com/errata/RHSA-2025:10103
reference_id RHSA-2025:10103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10103
10
reference_url https://access.redhat.com/errata/RHSA-2025:10107
reference_id RHSA-2025:10107
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10107
11
reference_url https://access.redhat.com/errata/RHSA-2025:10108
reference_id RHSA-2025:10108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10108
12
reference_url https://access.redhat.com/errata/RHSA-2025:10109
reference_id RHSA-2025:10109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10109
13
reference_url https://access.redhat.com/errata/RHSA-2025:10111
reference_id RHSA-2025:10111
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10111
14
reference_url https://access.redhat.com/errata/RHSA-2025:10126
reference_id RHSA-2025:10126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10126
15
reference_url https://access.redhat.com/errata/RHSA-2025:10162
reference_id RHSA-2025:10162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10162
16
reference_url https://access.redhat.com/errata/RHSA-2025:10991
reference_id RHSA-2025:10991
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10991
17
reference_url https://usn.ubuntu.com/7535-1/
reference_id USN-7535-1
reference_type
scores
url https://usn.ubuntu.com/7535-1/
fixed_packages
0
url pkg:apk/alpine/intel-ucode@20250512-r0?arch=armv7&distroversion=v3.20&reponame=main
purl pkg:apk/alpine/intel-ucode@20250512-r0?arch=armv7&distroversion=v3.20&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/intel-ucode@20250512-r0%3Farch=armv7&distroversion=v3.20&reponame=main
aliases CVE-2025-20012
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-51nr-8avm-qued
1
url VCID-5cgx-1n9u-gqbh
vulnerability_id VCID-5cgx-1n9u-gqbh
summary microcode_ctl: Exposure of sensitive information
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-45332.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-45332.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-45332
reference_id
reference_type
scores
0
value 0.00104
scoring_system epss
scoring_elements 0.28309
published_at 2026-04-18T12:55:00Z
1
value 0.00104
scoring_system epss
scoring_elements 0.28419
published_at 2026-04-11T12:55:00Z
2
value 0.00104
scoring_system epss
scoring_elements 0.28376
published_at 2026-04-12T12:55:00Z
3
value 0.00104
scoring_system epss
scoring_elements 0.28318
published_at 2026-04-13T12:55:00Z
4
value 0.00104
scoring_system epss
scoring_elements 0.2833
published_at 2026-04-16T12:55:00Z
5
value 0.00104
scoring_system epss
scoring_elements 0.28474
published_at 2026-04-02T12:55:00Z
6
value 0.00104
scoring_system epss
scoring_elements 0.28516
published_at 2026-04-04T12:55:00Z
7
value 0.00104
scoring_system epss
scoring_elements 0.28307
published_at 2026-04-07T12:55:00Z
8
value 0.00104
scoring_system epss
scoring_elements 0.28372
published_at 2026-04-08T12:55:00Z
9
value 0.00104
scoring_system epss
scoring_elements 0.28416
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-45332
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45332
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45332
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172
reference_id 1105172
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366162
reference_id 2366162
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366162
6
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01247.html
reference_id intel-sa-01247.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value 5.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-14T13:56:46Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01247.html
7
reference_url https://access.redhat.com/errata/RHSA-2025:10101
reference_id RHSA-2025:10101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10101
8
reference_url https://access.redhat.com/errata/RHSA-2025:10102
reference_id RHSA-2025:10102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10102
9
reference_url https://access.redhat.com/errata/RHSA-2025:10103
reference_id RHSA-2025:10103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10103
10
reference_url https://access.redhat.com/errata/RHSA-2025:10107
reference_id RHSA-2025:10107
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10107
11
reference_url https://access.redhat.com/errata/RHSA-2025:10108
reference_id RHSA-2025:10108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10108
12
reference_url https://access.redhat.com/errata/RHSA-2025:10109
reference_id RHSA-2025:10109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10109
13
reference_url https://access.redhat.com/errata/RHSA-2025:10111
reference_id RHSA-2025:10111
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10111
14
reference_url https://access.redhat.com/errata/RHSA-2025:10126
reference_id RHSA-2025:10126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10126
15
reference_url https://access.redhat.com/errata/RHSA-2025:10162
reference_id RHSA-2025:10162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10162
16
reference_url https://access.redhat.com/errata/RHSA-2025:10991
reference_id RHSA-2025:10991
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10991
17
reference_url https://usn.ubuntu.com/7535-1/
reference_id USN-7535-1
reference_type
scores
url https://usn.ubuntu.com/7535-1/
fixed_packages
0
url pkg:apk/alpine/intel-ucode@20250512-r0?arch=armv7&distroversion=v3.20&reponame=main
purl pkg:apk/alpine/intel-ucode@20250512-r0?arch=armv7&distroversion=v3.20&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/intel-ucode@20250512-r0%3Farch=armv7&distroversion=v3.20&reponame=main
aliases CVE-2024-45332
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5cgx-1n9u-gqbh
2
url VCID-5vkn-4rqc-qkbk
vulnerability_id VCID-5vkn-4rqc-qkbk
summary microcode_ctl: From CVEorg collector
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24495.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24495.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24495
reference_id
reference_type
scores
0
value 0.00073
scoring_system epss
scoring_elements 0.22271
published_at 2026-04-02T12:55:00Z
1
value 0.00073
scoring_system epss
scoring_elements 0.22149
published_at 2026-04-18T12:55:00Z
2
value 0.00073
scoring_system epss
scoring_elements 0.22236
published_at 2026-04-09T12:55:00Z
3
value 0.00073
scoring_system epss
scoring_elements 0.22255
published_at 2026-04-11T12:55:00Z
4
value 0.00073
scoring_system epss
scoring_elements 0.22214
published_at 2026-04-12T12:55:00Z
5
value 0.00073
scoring_system epss
scoring_elements 0.22154
published_at 2026-04-16T12:55:00Z
6
value 0.00073
scoring_system epss
scoring_elements 0.22314
published_at 2026-04-04T12:55:00Z
7
value 0.00073
scoring_system epss
scoring_elements 0.22099
published_at 2026-04-07T12:55:00Z
8
value 0.00073
scoring_system epss
scoring_elements 0.22182
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24495
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24495
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24495
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172
reference_id 1105172
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366089
reference_id 2366089
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366089
6
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01322.html
reference_id intel-sa-01322.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value 6.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-14T17:16:37Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01322.html
7
reference_url https://access.redhat.com/errata/RHSA-2025:10101
reference_id RHSA-2025:10101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10101
8
reference_url https://access.redhat.com/errata/RHSA-2025:10102
reference_id RHSA-2025:10102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10102
9
reference_url https://access.redhat.com/errata/RHSA-2025:10103
reference_id RHSA-2025:10103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10103
10
reference_url https://access.redhat.com/errata/RHSA-2025:10107
reference_id RHSA-2025:10107
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10107
11
reference_url https://access.redhat.com/errata/RHSA-2025:10108
reference_id RHSA-2025:10108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10108
12
reference_url https://access.redhat.com/errata/RHSA-2025:10109
reference_id RHSA-2025:10109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10109
13
reference_url https://access.redhat.com/errata/RHSA-2025:10111
reference_id RHSA-2025:10111
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10111
14
reference_url https://access.redhat.com/errata/RHSA-2025:10126
reference_id RHSA-2025:10126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10126
15
reference_url https://access.redhat.com/errata/RHSA-2025:10162
reference_id RHSA-2025:10162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10162
16
reference_url https://access.redhat.com/errata/RHSA-2025:10991
reference_id RHSA-2025:10991
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10991
17
reference_url https://usn.ubuntu.com/7535-1/
reference_id USN-7535-1
reference_type
scores
url https://usn.ubuntu.com/7535-1/
fixed_packages
0
url pkg:apk/alpine/intel-ucode@20250512-r0?arch=armv7&distroversion=v3.20&reponame=main
purl pkg:apk/alpine/intel-ucode@20250512-r0?arch=armv7&distroversion=v3.20&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/intel-ucode@20250512-r0%3Farch=armv7&distroversion=v3.20&reponame=main
aliases CVE-2025-24495
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5vkn-4rqc-qkbk
3
url VCID-b55f-n1ed-g7eq
vulnerability_id VCID-b55f-n1ed-g7eq
summary microcode_ctl: Uncaught exception in the core management mechanism
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-20054.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-20054.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-20054
reference_id
reference_type
scores
0
value 0.00039
scoring_system epss
scoring_elements 0.11736
published_at 2026-04-18T12:55:00Z
1
value 0.00039
scoring_system epss
scoring_elements 0.11737
published_at 2026-04-16T12:55:00Z
2
value 0.00047
scoring_system epss
scoring_elements 0.1453
published_at 2026-04-13T12:55:00Z
3
value 0.00047
scoring_system epss
scoring_elements 0.14638
published_at 2026-04-02T12:55:00Z
4
value 0.00047
scoring_system epss
scoring_elements 0.1471
published_at 2026-04-04T12:55:00Z
5
value 0.00047
scoring_system epss
scoring_elements 0.14522
published_at 2026-04-07T12:55:00Z
6
value 0.00047
scoring_system epss
scoring_elements 0.14611
published_at 2026-04-08T12:55:00Z
7
value 0.00047
scoring_system epss
scoring_elements 0.14669
published_at 2026-04-09T12:55:00Z
8
value 0.00047
scoring_system epss
scoring_elements 0.14628
published_at 2026-04-11T12:55:00Z
9
value 0.00047
scoring_system epss
scoring_elements 0.14591
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-20054
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20054
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20054
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172
reference_id 1105172
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366113
reference_id 2366113
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366113
5
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01244.html
reference_id intel-sa-01244.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value 6.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-14T15:48:16Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01244.html
6
reference_url https://usn.ubuntu.com/7535-1/
reference_id USN-7535-1
reference_type
scores
url https://usn.ubuntu.com/7535-1/
fixed_packages
0
url pkg:apk/alpine/intel-ucode@20250512-r0?arch=armv7&distroversion=v3.20&reponame=main
purl pkg:apk/alpine/intel-ucode@20250512-r0?arch=armv7&distroversion=v3.20&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/intel-ucode@20250512-r0%3Farch=armv7&distroversion=v3.20&reponame=main
aliases CVE-2025-20054
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b55f-n1ed-g7eq
4
url VCID-ejhc-6yqt-gkgv
vulnerability_id VCID-ejhc-6yqt-gkgv
summary x86: Indirect Target Selection
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28956.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28956.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-28956
reference_id
reference_type
scores
0
value 0.00091
scoring_system epss
scoring_elements 0.25577
published_at 2026-04-07T12:55:00Z
1
value 0.00091
scoring_system epss
scoring_elements 0.25764
published_at 2026-04-02T12:55:00Z
2
value 0.00091
scoring_system epss
scoring_elements 0.25806
published_at 2026-04-04T12:55:00Z
3
value 0.00091
scoring_system epss
scoring_elements 0.2565
published_at 2026-04-08T12:55:00Z
4
value 0.00091
scoring_system epss
scoring_elements 0.25696
published_at 2026-04-09T12:55:00Z
5
value 0.00091
scoring_system epss
scoring_elements 0.25706
published_at 2026-04-11T12:55:00Z
6
value 0.00227
scoring_system epss
scoring_elements 0.4551
published_at 2026-04-13T12:55:00Z
7
value 0.00227
scoring_system epss
scoring_elements 0.45557
published_at 2026-04-16T12:55:00Z
8
value 0.00227
scoring_system epss
scoring_elements 0.45505
published_at 2026-04-12T12:55:00Z
9
value 0.00227
scoring_system epss
scoring_elements 0.45554
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-28956
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28956
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172
reference_id 1105172
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105193
reference_id 1105193
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105193
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366125
reference_id 2366125
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366125
7
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01153.html
reference_id intel-sa-01153.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value 5.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-14T14:42:03Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01153.html
8
reference_url https://access.redhat.com/errata/RHSA-2025:10101
reference_id RHSA-2025:10101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10101
9
reference_url https://access.redhat.com/errata/RHSA-2025:10102
reference_id RHSA-2025:10102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10102
10
reference_url https://access.redhat.com/errata/RHSA-2025:10103
reference_id RHSA-2025:10103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10103
11
reference_url https://access.redhat.com/errata/RHSA-2025:10107
reference_id RHSA-2025:10107
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10107
12
reference_url https://access.redhat.com/errata/RHSA-2025:10108
reference_id RHSA-2025:10108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10108
13
reference_url https://access.redhat.com/errata/RHSA-2025:10109
reference_id RHSA-2025:10109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10109
14
reference_url https://access.redhat.com/errata/RHSA-2025:10111
reference_id RHSA-2025:10111
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10111
15
reference_url https://access.redhat.com/errata/RHSA-2025:10126
reference_id RHSA-2025:10126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10126
16
reference_url https://access.redhat.com/errata/RHSA-2025:10162
reference_id RHSA-2025:10162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10162
17
reference_url https://access.redhat.com/errata/RHSA-2025:10991
reference_id RHSA-2025:10991
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10991
18
reference_url https://access.redhat.com/errata/RHSA-2025:13962
reference_id RHSA-2025:13962
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13962
19
reference_url https://access.redhat.com/errata/RHSA-2025:19962
reference_id RHSA-2025:19962
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19962
20
reference_url https://access.redhat.com/errata/RHSA-2025:20095
reference_id RHSA-2025:20095
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:20095
21
reference_url https://usn.ubuntu.com/7535-1/
reference_id USN-7535-1
reference_type
scores
url https://usn.ubuntu.com/7535-1/
22
reference_url https://xenbits.xen.org/xsa/advisory-469.html
reference_id XSA-469
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-469.html
fixed_packages
0
url pkg:apk/alpine/intel-ucode@20250512-r0?arch=armv7&distroversion=v3.20&reponame=main
purl pkg:apk/alpine/intel-ucode@20250512-r0?arch=armv7&distroversion=v3.20&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/intel-ucode@20250512-r0%3Farch=armv7&distroversion=v3.20&reponame=main
aliases CVE-2024-28956, XSA-469
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ejhc-6yqt-gkgv
5
url VCID-j4ak-hjn5-guat
vulnerability_id VCID-j4ak-hjn5-guat
summary microcode_ctl: Exposure of sensitive information
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-20623.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-20623.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-20623
reference_id
reference_type
scores
0
value 0.00097
scoring_system epss
scoring_elements 0.26666
published_at 2026-04-18T12:55:00Z
1
value 0.00097
scoring_system epss
scoring_elements 0.26788
published_at 2026-04-11T12:55:00Z
2
value 0.00097
scoring_system epss
scoring_elements 0.26743
published_at 2026-04-12T12:55:00Z
3
value 0.00097
scoring_system epss
scoring_elements 0.26686
published_at 2026-04-13T12:55:00Z
4
value 0.00097
scoring_system epss
scoring_elements 0.26695
published_at 2026-04-16T12:55:00Z
5
value 0.00097
scoring_system epss
scoring_elements 0.26838
published_at 2026-04-02T12:55:00Z
6
value 0.00097
scoring_system epss
scoring_elements 0.26879
published_at 2026-04-04T12:55:00Z
7
value 0.00097
scoring_system epss
scoring_elements 0.26665
published_at 2026-04-07T12:55:00Z
8
value 0.00097
scoring_system epss
scoring_elements 0.26734
published_at 2026-04-08T12:55:00Z
9
value 0.00097
scoring_system epss
scoring_elements 0.26784
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-20623
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20623
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172
reference_id 1105172
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366133
reference_id 2366133
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366133
6
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01247.html
reference_id intel-sa-01247.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value 5.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-14T15:10:08Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01247.html
7
reference_url https://access.redhat.com/errata/RHSA-2025:10101
reference_id RHSA-2025:10101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10101
8
reference_url https://access.redhat.com/errata/RHSA-2025:10102
reference_id RHSA-2025:10102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10102
9
reference_url https://access.redhat.com/errata/RHSA-2025:10103
reference_id RHSA-2025:10103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10103
10
reference_url https://access.redhat.com/errata/RHSA-2025:10107
reference_id RHSA-2025:10107
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10107
11
reference_url https://access.redhat.com/errata/RHSA-2025:10108
reference_id RHSA-2025:10108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10108
12
reference_url https://access.redhat.com/errata/RHSA-2025:10109
reference_id RHSA-2025:10109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10109
13
reference_url https://access.redhat.com/errata/RHSA-2025:10111
reference_id RHSA-2025:10111
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10111
14
reference_url https://access.redhat.com/errata/RHSA-2025:10126
reference_id RHSA-2025:10126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10126
15
reference_url https://access.redhat.com/errata/RHSA-2025:10162
reference_id RHSA-2025:10162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10162
16
reference_url https://access.redhat.com/errata/RHSA-2025:10991
reference_id RHSA-2025:10991
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10991
17
reference_url https://usn.ubuntu.com/7535-1/
reference_id USN-7535-1
reference_type
scores
url https://usn.ubuntu.com/7535-1/
fixed_packages
0
url pkg:apk/alpine/intel-ucode@20250512-r0?arch=armv7&distroversion=v3.20&reponame=main
purl pkg:apk/alpine/intel-ucode@20250512-r0?arch=armv7&distroversion=v3.20&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/intel-ucode@20250512-r0%3Farch=armv7&distroversion=v3.20&reponame=main
aliases CVE-2025-20623
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j4ak-hjn5-guat
6
url VCID-wqfe-hkrk-nbaj
vulnerability_id VCID-wqfe-hkrk-nbaj
summary microcode_ctl: Exposure of sensitive information
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-43420.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-43420.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-43420
reference_id
reference_type
scores
0
value 0.00097
scoring_system epss
scoring_elements 0.26666
published_at 2026-04-18T12:55:00Z
1
value 0.00097
scoring_system epss
scoring_elements 0.26788
published_at 2026-04-11T12:55:00Z
2
value 0.00097
scoring_system epss
scoring_elements 0.26743
published_at 2026-04-12T12:55:00Z
3
value 0.00097
scoring_system epss
scoring_elements 0.26686
published_at 2026-04-13T12:55:00Z
4
value 0.00097
scoring_system epss
scoring_elements 0.26695
published_at 2026-04-16T12:55:00Z
5
value 0.00097
scoring_system epss
scoring_elements 0.26838
published_at 2026-04-02T12:55:00Z
6
value 0.00097
scoring_system epss
scoring_elements 0.26879
published_at 2026-04-04T12:55:00Z
7
value 0.00097
scoring_system epss
scoring_elements 0.26665
published_at 2026-04-07T12:55:00Z
8
value 0.00097
scoring_system epss
scoring_elements 0.26734
published_at 2026-04-08T12:55:00Z
9
value 0.00097
scoring_system epss
scoring_elements 0.26784
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-43420
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43420
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43420
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172
reference_id 1105172
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366159
reference_id 2366159
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366159
6
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01247.html
reference_id intel-sa-01247.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value 5.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-14T13:59:10Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01247.html
7
reference_url https://access.redhat.com/errata/RHSA-2025:10101
reference_id RHSA-2025:10101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10101
8
reference_url https://access.redhat.com/errata/RHSA-2025:10102
reference_id RHSA-2025:10102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10102
9
reference_url https://access.redhat.com/errata/RHSA-2025:10103
reference_id RHSA-2025:10103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10103
10
reference_url https://access.redhat.com/errata/RHSA-2025:10107
reference_id RHSA-2025:10107
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10107
11
reference_url https://access.redhat.com/errata/RHSA-2025:10108
reference_id RHSA-2025:10108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10108
12
reference_url https://access.redhat.com/errata/RHSA-2025:10109
reference_id RHSA-2025:10109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10109
13
reference_url https://access.redhat.com/errata/RHSA-2025:10111
reference_id RHSA-2025:10111
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10111
14
reference_url https://access.redhat.com/errata/RHSA-2025:10126
reference_id RHSA-2025:10126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10126
15
reference_url https://access.redhat.com/errata/RHSA-2025:10162
reference_id RHSA-2025:10162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10162
16
reference_url https://access.redhat.com/errata/RHSA-2025:10991
reference_id RHSA-2025:10991
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10991
17
reference_url https://usn.ubuntu.com/7535-1/
reference_id USN-7535-1
reference_type
scores
url https://usn.ubuntu.com/7535-1/
fixed_packages
0
url pkg:apk/alpine/intel-ucode@20250512-r0?arch=armv7&distroversion=v3.20&reponame=main
purl pkg:apk/alpine/intel-ucode@20250512-r0?arch=armv7&distroversion=v3.20&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/intel-ucode@20250512-r0%3Farch=armv7&distroversion=v3.20&reponame=main
aliases CVE-2024-43420
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wqfe-hkrk-nbaj
7
url VCID-zcxx-ra5c-hyh9
vulnerability_id VCID-zcxx-ra5c-hyh9
summary microcode_ctl: Insufficient resource pool in the core management mechanism
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-20103.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-20103.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-20103
reference_id
reference_type
scores
0
value 0.00092
scoring_system epss
scoring_elements 0.2576
published_at 2026-04-18T12:55:00Z
1
value 0.00092
scoring_system epss
scoring_elements 0.25777
published_at 2026-04-16T12:55:00Z
2
value 0.0011
scoring_system epss
scoring_elements 0.2936
published_at 2026-04-13T12:55:00Z
3
value 0.0011
scoring_system epss
scoring_elements 0.29479
published_at 2026-04-02T12:55:00Z
4
value 0.0011
scoring_system epss
scoring_elements 0.29527
published_at 2026-04-04T12:55:00Z
5
value 0.0011
scoring_system epss
scoring_elements 0.29348
published_at 2026-04-07T12:55:00Z
6
value 0.0011
scoring_system epss
scoring_elements 0.29412
published_at 2026-04-08T12:55:00Z
7
value 0.0011
scoring_system epss
scoring_elements 0.29453
published_at 2026-04-09T12:55:00Z
8
value 0.0011
scoring_system epss
scoring_elements 0.29457
published_at 2026-04-11T12:55:00Z
9
value 0.0011
scoring_system epss
scoring_elements 0.29413
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-20103
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20103
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20103
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172
reference_id 1105172
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366091
reference_id 2366091
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366091
5
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01244.html
reference_id intel-sa-01244.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value 5.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-14T13:49:36Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01244.html
6
reference_url https://usn.ubuntu.com/7535-1/
reference_id USN-7535-1
reference_type
scores
url https://usn.ubuntu.com/7535-1/
fixed_packages
0
url pkg:apk/alpine/intel-ucode@20250512-r0?arch=armv7&distroversion=v3.20&reponame=main
purl pkg:apk/alpine/intel-ucode@20250512-r0?arch=armv7&distroversion=v3.20&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/intel-ucode@20250512-r0%3Farch=armv7&distroversion=v3.20&reponame=main
aliases CVE-2025-20103
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zcxx-ra5c-hyh9
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/intel-ucode@20250512-r0%3Farch=armv7&distroversion=v3.20&reponame=main