Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/intel-ucode@20250211-r0?arch=ppc64le&distroversion=edge&reponame=main
Typeapk
Namespacealpine
Nameintel-ucode
Version20250211-r0
Qualifiers
arch ppc64le
distroversion edge
reponame main
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version20250512-r0
Latest_non_vulnerable_version20260210-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-eh71-uhnv-fqeb
vulnerability_id VCID-eh71-uhnv-fqeb
summary Improper handling of physical or environmental conditions in some Intel(R) Processors may allow an authenticated user to enable denial of service via local access.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-39355
reference_id
reference_type
scores
0
value 0.0003
scoring_system epss
scoring_elements 0.08442
published_at 2026-04-18T12:55:00Z
1
value 0.0003
scoring_system epss
scoring_elements 0.086
published_at 2026-04-11T12:55:00Z
2
value 0.0003
scoring_system epss
scoring_elements 0.0858
published_at 2026-04-12T12:55:00Z
3
value 0.0003
scoring_system epss
scoring_elements 0.08563
published_at 2026-04-13T12:55:00Z
4
value 0.0003
scoring_system epss
scoring_elements 0.08455
published_at 2026-04-16T12:55:00Z
5
value 0.0003
scoring_system epss
scoring_elements 0.08539
published_at 2026-04-02T12:55:00Z
6
value 0.0003
scoring_system epss
scoring_elements 0.08593
published_at 2026-04-04T12:55:00Z
7
value 0.0003
scoring_system epss
scoring_elements 0.0851
published_at 2026-04-07T12:55:00Z
8
value 0.0003
scoring_system epss
scoring_elements 0.08583
published_at 2026-04-08T12:55:00Z
9
value 0.0003
scoring_system epss
scoring_elements 0.08604
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-39355
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39355
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
reference_id 1095805
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
4
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01228.html
reference_id intel-sa-01228.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value 5.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T15:12:11Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01228.html
fixed_packages
0
url pkg:apk/alpine/intel-ucode@20250211-r0?arch=ppc64le&distroversion=edge&reponame=main
purl pkg:apk/alpine/intel-ucode@20250211-r0?arch=ppc64le&distroversion=edge&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/intel-ucode@20250211-r0%3Farch=ppc64le&distroversion=edge&reponame=main
aliases CVE-2024-39355
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eh71-uhnv-fqeb
1
url VCID-npgb-p786-d3fe
vulnerability_id VCID-npgb-p786-d3fe
summary microcode_ctl: Improper input validation in UEFI firmware
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43758.json
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43758.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-43758
reference_id
reference_type
scores
0
value 0.00022
scoring_system epss
scoring_elements 0.05807
published_at 2026-04-02T12:55:00Z
1
value 0.00022
scoring_system epss
scoring_elements 0.05832
published_at 2026-04-16T12:55:00Z
2
value 0.00022
scoring_system epss
scoring_elements 0.05884
published_at 2026-04-11T12:55:00Z
3
value 0.00022
scoring_system epss
scoring_elements 0.05874
published_at 2026-04-12T12:55:00Z
4
value 0.00022
scoring_system epss
scoring_elements 0.05867
published_at 2026-04-13T12:55:00Z
5
value 0.00022
scoring_system epss
scoring_elements 0.05843
published_at 2026-04-18T12:55:00Z
6
value 0.00022
scoring_system epss
scoring_elements 0.05838
published_at 2026-04-07T12:55:00Z
7
value 0.00022
scoring_system epss
scoring_elements 0.05877
published_at 2026-04-08T12:55:00Z
8
value 0.00022
scoring_system epss
scoring_elements 0.05903
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-43758
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43758
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43758
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
reference_id 1095805
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345416
reference_id 2345416
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2345416
5
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
reference_id intel-sa-01139.html
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-13T20:21:25Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
fixed_packages
0
url pkg:apk/alpine/intel-ucode@20250211-r0?arch=ppc64le&distroversion=edge&reponame=main
purl pkg:apk/alpine/intel-ucode@20250211-r0?arch=ppc64le&distroversion=edge&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/intel-ucode@20250211-r0%3Farch=ppc64le&distroversion=edge&reponame=main
aliases CVE-2023-43758
risk_score 3.7
exploitability 0.5
weighted_severity 7.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-npgb-p786-d3fe
2
url VCID-wgce-vves-guek
vulnerability_id VCID-wgce-vves-guek
summary kernel: microcode_ctl: From CVEorg collector
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31068.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31068.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-31068
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.03843
published_at 2026-04-18T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.03899
published_at 2026-04-11T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.0388
published_at 2026-04-12T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.03854
published_at 2026-04-13T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.03833
published_at 2026-04-16T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.03877
published_at 2026-04-02T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.03886
published_at 2026-04-04T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.039
published_at 2026-04-07T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.03905
published_at 2026-04-08T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.0393
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-31068
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31068
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
reference_id 1095805
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345359
reference_id 2345359
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2345359
6
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01166.html
reference_id intel-sa-01166.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H
1
value 5.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T15:07:29Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01166.html
7
reference_url https://usn.ubuntu.com/7269-1/
reference_id USN-7269-1
reference_type
scores
url https://usn.ubuntu.com/7269-1/
8
reference_url https://usn.ubuntu.com/7269-2/
reference_id USN-7269-2
reference_type
scores
url https://usn.ubuntu.com/7269-2/
fixed_packages
0
url pkg:apk/alpine/intel-ucode@20250211-r0?arch=ppc64le&distroversion=edge&reponame=main
purl pkg:apk/alpine/intel-ucode@20250211-r0?arch=ppc64le&distroversion=edge&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/intel-ucode@20250211-r0%3Farch=ppc64le&distroversion=edge&reponame=main
aliases CVE-2024-31068
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wgce-vves-guek
3
url VCID-wv5f-6x7x-7fdw
vulnerability_id VCID-wv5f-6x7x-7fdw
summary kernel: microcode_ctl: From CVEorg collector
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-36293.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-36293.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-36293
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07365
published_at 2026-04-18T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07481
published_at 2026-04-11T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07467
published_at 2026-04-12T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07456
published_at 2026-04-13T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07379
published_at 2026-04-16T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07382
published_at 2026-04-02T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07427
published_at 2026-04-04T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07409
published_at 2026-04-07T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07464
published_at 2026-04-08T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07487
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-36293
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36293
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
reference_id 1095805
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345367
reference_id 2345367
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2345367
6
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01213.html
reference_id intel-sa-01213.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value 6.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T15:27:21Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01213.html
7
reference_url https://usn.ubuntu.com/7269-1/
reference_id USN-7269-1
reference_type
scores
url https://usn.ubuntu.com/7269-1/
8
reference_url https://usn.ubuntu.com/7269-2/
reference_id USN-7269-2
reference_type
scores
url https://usn.ubuntu.com/7269-2/
fixed_packages
0
url pkg:apk/alpine/intel-ucode@20250211-r0?arch=ppc64le&distroversion=edge&reponame=main
purl pkg:apk/alpine/intel-ucode@20250211-r0?arch=ppc64le&distroversion=edge&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/intel-ucode@20250211-r0%3Farch=ppc64le&distroversion=edge&reponame=main
aliases CVE-2024-36293
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wv5f-6x7x-7fdw
4
url VCID-wyf3-shyh-qyhc
vulnerability_id VCID-wyf3-shyh-qyhc
summary Sequence of processor instructions leads to unexpected behavior in the Intel(R) DSA V1.0 for some Intel(R) Xeon(R) Processors may allow an authenticated user to potentially enable denial of service via local access.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-37020
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.01291
published_at 2026-04-18T12:55:00Z
1
value 0.00011
scoring_system epss
scoring_elements 0.01289
published_at 2026-04-11T12:55:00Z
2
value 0.00011
scoring_system epss
scoring_elements 0.01283
published_at 2026-04-12T12:55:00Z
3
value 0.00011
scoring_system epss
scoring_elements 0.01286
published_at 2026-04-13T12:55:00Z
4
value 0.00011
scoring_system epss
scoring_elements 0.01278
published_at 2026-04-16T12:55:00Z
5
value 0.00011
scoring_system epss
scoring_elements 0.01281
published_at 2026-04-02T12:55:00Z
6
value 0.00011
scoring_system epss
scoring_elements 0.01285
published_at 2026-04-04T12:55:00Z
7
value 0.00011
scoring_system epss
scoring_elements 0.01296
published_at 2026-04-07T12:55:00Z
8
value 0.00011
scoring_system epss
scoring_elements 0.01301
published_at 2026-04-08T12:55:00Z
9
value 0.00011
scoring_system epss
scoring_elements 0.01305
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-37020
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37020
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
reference_id 1095805
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
4
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01194.html
reference_id intel-sa-01194.html
reference_type
scores
0
value 3.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L
1
value 4.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T14:57:53Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01194.html
fixed_packages
0
url pkg:apk/alpine/intel-ucode@20250211-r0?arch=ppc64le&distroversion=edge&reponame=main
purl pkg:apk/alpine/intel-ucode@20250211-r0?arch=ppc64le&distroversion=edge&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/intel-ucode@20250211-r0%3Farch=ppc64le&distroversion=edge&reponame=main
aliases CVE-2024-37020
risk_score 1.4
exploitability 0.5
weighted_severity 2.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wyf3-shyh-qyhc
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/intel-ucode@20250211-r0%3Farch=ppc64le&distroversion=edge&reponame=main