Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/intel-microcode@3.20250211.1?distro=trixie
Typedeb
Namespacedebian
Nameintel-microcode
Version3.20250211.1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version3.20250512.1~deb11u1
Latest_non_vulnerable_version3.20260227.1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-3y3x-qqep-43ec
vulnerability_id VCID-3y3x-qqep-43ec
summary microcode_ctl: Improper initialization in UEFI firmware OutOfBandXML module
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31157.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31157.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-31157
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01591
published_at 2026-04-21T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01501
published_at 2026-04-13T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.01487
published_at 2026-04-16T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01503
published_at 2026-04-18T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.01499
published_at 2026-04-02T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.01502
published_at 2026-04-04T12:55:00Z
6
value 0.00012
scoring_system epss
scoring_elements 0.01509
published_at 2026-04-07T12:55:00Z
7
value 0.00012
scoring_system epss
scoring_elements 0.01513
published_at 2026-04-08T12:55:00Z
8
value 0.00012
scoring_system epss
scoring_elements 0.01516
published_at 2026-04-09T12:55:00Z
9
value 0.00012
scoring_system epss
scoring_elements 0.01508
published_at 2026-04-11T12:55:00Z
10
value 0.00012
scoring_system epss
scoring_elements 0.015
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-31157
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31157
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31157
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
reference_id 1095805
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345421
reference_id 2345421
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2345421
5
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
reference_id intel-sa-01139.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value 6.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T15:13:26Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
6
reference_url https://access.redhat.com/errata/RHSA-2025:7043
reference_id RHSA-2025:7043
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7043
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie
1
url pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1%3Fdistro=trixie
2
url pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/intel-microcode@3.20250211.1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20250211.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1%3Fdistro=trixie
4
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie
5
url pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie
6
url pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie
aliases CVE-2024-31157
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3y3x-qqep-43ec
1
url VCID-6thk-vf9t-gygs
vulnerability_id VCID-6thk-vf9t-gygs
summary microcode_ctl: Insufficient granularity of access control in UEFI firmware
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-39279.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-39279.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-39279
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06624
published_at 2026-04-21T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06532
published_at 2026-04-13T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06467
published_at 2026-04-16T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06475
published_at 2026-04-18T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06438
published_at 2026-04-02T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06474
published_at 2026-04-04T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06462
published_at 2026-04-07T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06512
published_at 2026-04-08T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.06553
published_at 2026-04-09T12:55:00Z
9
value 0.00024
scoring_system epss
scoring_elements 0.06548
published_at 2026-04-11T12:55:00Z
10
value 0.00024
scoring_system epss
scoring_elements 0.06541
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-39279
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39279
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39279
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
reference_id 1095805
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345381
reference_id 2345381
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2345381
5
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
reference_id intel-sa-01139.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value 6.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T15:14:06Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
6
reference_url https://access.redhat.com/errata/RHSA-2025:7043
reference_id RHSA-2025:7043
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7043
7
reference_url https://usn.ubuntu.com/7269-1/
reference_id USN-7269-1
reference_type
scores
url https://usn.ubuntu.com/7269-1/
8
reference_url https://usn.ubuntu.com/7269-2/
reference_id USN-7269-2
reference_type
scores
url https://usn.ubuntu.com/7269-2/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie
1
url pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1%3Fdistro=trixie
2
url pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/intel-microcode@3.20250211.1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20250211.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1%3Fdistro=trixie
4
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie
5
url pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie
6
url pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie
aliases CVE-2024-39279
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6thk-vf9t-gygs
2
url VCID-eh71-uhnv-fqeb
vulnerability_id VCID-eh71-uhnv-fqeb
summary Improper handling of physical or environmental conditions in some Intel(R) Processors may allow an authenticated user to enable denial of service via local access.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-39355
reference_id
reference_type
scores
0
value 0.0003
scoring_system epss
scoring_elements 0.08597
published_at 2026-04-21T12:55:00Z
1
value 0.0003
scoring_system epss
scoring_elements 0.0858
published_at 2026-04-12T12:55:00Z
2
value 0.0003
scoring_system epss
scoring_elements 0.08563
published_at 2026-04-13T12:55:00Z
3
value 0.0003
scoring_system epss
scoring_elements 0.08455
published_at 2026-04-16T12:55:00Z
4
value 0.0003
scoring_system epss
scoring_elements 0.08442
published_at 2026-04-18T12:55:00Z
5
value 0.0003
scoring_system epss
scoring_elements 0.08539
published_at 2026-04-02T12:55:00Z
6
value 0.0003
scoring_system epss
scoring_elements 0.08593
published_at 2026-04-04T12:55:00Z
7
value 0.0003
scoring_system epss
scoring_elements 0.0851
published_at 2026-04-07T12:55:00Z
8
value 0.0003
scoring_system epss
scoring_elements 0.08583
published_at 2026-04-08T12:55:00Z
9
value 0.0003
scoring_system epss
scoring_elements 0.08604
published_at 2026-04-09T12:55:00Z
10
value 0.0003
scoring_system epss
scoring_elements 0.086
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-39355
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39355
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
reference_id 1095805
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
4
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01228.html
reference_id intel-sa-01228.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value 5.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T15:12:11Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01228.html
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie
1
url pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1%3Fdistro=trixie
2
url pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/intel-microcode@3.20250211.1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20250211.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1%3Fdistro=trixie
4
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie
5
url pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie
6
url pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie
aliases CVE-2024-39355
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eh71-uhnv-fqeb
3
url VCID-npgb-p786-d3fe
vulnerability_id VCID-npgb-p786-d3fe
summary microcode_ctl: Improper input validation in UEFI firmware
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43758.json
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43758.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-43758
reference_id
reference_type
scores
0
value 0.00022
scoring_system epss
scoring_elements 0.05807
published_at 2026-04-02T12:55:00Z
1
value 0.00022
scoring_system epss
scoring_elements 0.05997
published_at 2026-04-21T12:55:00Z
2
value 0.00022
scoring_system epss
scoring_elements 0.05874
published_at 2026-04-12T12:55:00Z
3
value 0.00022
scoring_system epss
scoring_elements 0.05867
published_at 2026-04-13T12:55:00Z
4
value 0.00022
scoring_system epss
scoring_elements 0.05832
published_at 2026-04-16T12:55:00Z
5
value 0.00022
scoring_system epss
scoring_elements 0.05843
published_at 2026-04-18T12:55:00Z
6
value 0.00022
scoring_system epss
scoring_elements 0.05838
published_at 2026-04-07T12:55:00Z
7
value 0.00022
scoring_system epss
scoring_elements 0.05877
published_at 2026-04-08T12:55:00Z
8
value 0.00022
scoring_system epss
scoring_elements 0.05903
published_at 2026-04-09T12:55:00Z
9
value 0.00022
scoring_system epss
scoring_elements 0.05884
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-43758
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43758
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43758
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
reference_id 1095805
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345416
reference_id 2345416
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2345416
5
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
reference_id intel-sa-01139.html
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-13T20:21:25Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie
1
url pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1%3Fdistro=trixie
2
url pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/intel-microcode@3.20250211.1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20250211.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1%3Fdistro=trixie
4
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie
5
url pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie
6
url pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie
aliases CVE-2023-43758
risk_score 3.7
exploitability 0.5
weighted_severity 7.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-npgb-p786-d3fe
4
url VCID-qtg5-1dxw-sfdc
vulnerability_id VCID-qtg5-1dxw-sfdc
summary microcode_ctl: Improper input validation in UEFI firmware CseVariableStorageSmm
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-29214.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-29214.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-29214
reference_id
reference_type
scores
0
value 0.00022
scoring_system epss
scoring_elements 0.05997
published_at 2026-04-21T12:55:00Z
1
value 0.00022
scoring_system epss
scoring_elements 0.05874
published_at 2026-04-12T12:55:00Z
2
value 0.00022
scoring_system epss
scoring_elements 0.05867
published_at 2026-04-13T12:55:00Z
3
value 0.00022
scoring_system epss
scoring_elements 0.05832
published_at 2026-04-16T12:55:00Z
4
value 0.00022
scoring_system epss
scoring_elements 0.05807
published_at 2026-04-02T12:55:00Z
5
value 0.00022
scoring_system epss
scoring_elements 0.05843
published_at 2026-04-18T12:55:00Z
6
value 0.00022
scoring_system epss
scoring_elements 0.05838
published_at 2026-04-07T12:55:00Z
7
value 0.00022
scoring_system epss
scoring_elements 0.05877
published_at 2026-04-08T12:55:00Z
8
value 0.00022
scoring_system epss
scoring_elements 0.05903
published_at 2026-04-09T12:55:00Z
9
value 0.00022
scoring_system epss
scoring_elements 0.05884
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-29214
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29214
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29214
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
reference_id 1095805
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345365
reference_id 2345365
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2345365
5
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
reference_id intel-sa-01139.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-13T15:17:24Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie
1
url pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1%3Fdistro=trixie
2
url pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/intel-microcode@3.20250211.1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20250211.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1%3Fdistro=trixie
4
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie
5
url pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie
6
url pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie
aliases CVE-2024-29214
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qtg5-1dxw-sfdc
5
url VCID-qzcy-2xsr-vqeh
vulnerability_id VCID-qzcy-2xsr-vqeh
summary microcode_ctl: Improper input validation in UEFI firmware
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28127.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28127.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-28127
reference_id
reference_type
scores
0
value 0.00022
scoring_system epss
scoring_elements 0.05997
published_at 2026-04-21T12:55:00Z
1
value 0.00022
scoring_system epss
scoring_elements 0.05874
published_at 2026-04-12T12:55:00Z
2
value 0.00022
scoring_system epss
scoring_elements 0.05867
published_at 2026-04-13T12:55:00Z
3
value 0.00022
scoring_system epss
scoring_elements 0.05832
published_at 2026-04-16T12:55:00Z
4
value 0.00022
scoring_system epss
scoring_elements 0.05807
published_at 2026-04-02T12:55:00Z
5
value 0.00022
scoring_system epss
scoring_elements 0.05843
published_at 2026-04-18T12:55:00Z
6
value 0.00022
scoring_system epss
scoring_elements 0.05838
published_at 2026-04-07T12:55:00Z
7
value 0.00022
scoring_system epss
scoring_elements 0.05877
published_at 2026-04-08T12:55:00Z
8
value 0.00022
scoring_system epss
scoring_elements 0.05903
published_at 2026-04-09T12:55:00Z
9
value 0.00022
scoring_system epss
scoring_elements 0.05884
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-28127
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28127
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28127
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
reference_id 1095805
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345370
reference_id 2345370
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2345370
5
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
reference_id intel-sa-01139.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-13T15:16:50Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie
1
url pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1%3Fdistro=trixie
2
url pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/intel-microcode@3.20250211.1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20250211.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1%3Fdistro=trixie
4
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie
5
url pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie
6
url pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie
aliases CVE-2024-28127
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qzcy-2xsr-vqeh
6
url VCID-t7rc-zadf-cybq
vulnerability_id VCID-t7rc-zadf-cybq
summary microcode_ctl: Improper input validation in UEFI firmware
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28047.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28047.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-28047
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01591
published_at 2026-04-21T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01607
published_at 2026-04-13T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.01596
published_at 2026-04-16T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.0161
published_at 2026-04-18T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.01499
published_at 2026-04-02T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.01502
published_at 2026-04-04T12:55:00Z
6
value 0.00012
scoring_system epss
scoring_elements 0.01624
published_at 2026-04-07T12:55:00Z
7
value 0.00012
scoring_system epss
scoring_elements 0.01625
published_at 2026-04-08T12:55:00Z
8
value 0.00012
scoring_system epss
scoring_elements 0.01632
published_at 2026-04-09T12:55:00Z
9
value 0.00012
scoring_system epss
scoring_elements 0.01618
published_at 2026-04-11T12:55:00Z
10
value 0.00012
scoring_system epss
scoring_elements 0.01609
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-28047
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28047
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
reference_id 1095805
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345363
reference_id 2345363
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2345363
5
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
reference_id intel-sa-01139.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
1
value 6.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T15:04:18Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
6
reference_url https://access.redhat.com/errata/RHSA-2025:7043
reference_id RHSA-2025:7043
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7043
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie
1
url pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1%3Fdistro=trixie
2
url pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/intel-microcode@3.20250211.1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20250211.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1%3Fdistro=trixie
4
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie
5
url pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie
6
url pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie
aliases CVE-2024-28047
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t7rc-zadf-cybq
7
url VCID-t85u-116v-7uan
vulnerability_id VCID-t85u-116v-7uan
summary microcode_ctl: Improper input validation in XmlCli feature for UEFI firmware
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-24582.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-24582.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-24582
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03496
published_at 2026-04-21T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03392
published_at 2026-04-13T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.03369
published_at 2026-04-16T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.0338
published_at 2026-04-18T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.03435
published_at 2026-04-02T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03449
published_at 2026-04-04T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.03462
published_at 2026-04-07T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03465
published_at 2026-04-08T12:55:00Z
8
value 0.00016
scoring_system epss
scoring_elements 0.03488
published_at 2026-04-09T12:55:00Z
9
value 0.00016
scoring_system epss
scoring_elements 0.03445
published_at 2026-04-11T12:55:00Z
10
value 0.00016
scoring_system epss
scoring_elements 0.03416
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-24582
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24582
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
reference_id 1095805
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345376
reference_id 2345376
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2345376
5
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
reference_id intel-sa-01139.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-13T19:49:18Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie
1
url pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1%3Fdistro=trixie
2
url pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/intel-microcode@3.20250211.1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20250211.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1%3Fdistro=trixie
4
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie
5
url pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie
6
url pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie
aliases CVE-2024-24582
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t85u-116v-7uan
8
url VCID-vsda-kq13-73g1
vulnerability_id VCID-vsda-kq13-73g1
summary microcode_ctl: Improper input validation in UEFI firmware
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34440.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34440.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-34440
reference_id
reference_type
scores
0
value 0.00022
scoring_system epss
scoring_elements 0.05997
published_at 2026-04-21T12:55:00Z
1
value 0.00022
scoring_system epss
scoring_elements 0.05874
published_at 2026-04-12T12:55:00Z
2
value 0.00022
scoring_system epss
scoring_elements 0.05867
published_at 2026-04-13T12:55:00Z
3
value 0.00022
scoring_system epss
scoring_elements 0.05832
published_at 2026-04-16T12:55:00Z
4
value 0.00022
scoring_system epss
scoring_elements 0.05807
published_at 2026-04-02T12:55:00Z
5
value 0.00022
scoring_system epss
scoring_elements 0.05843
published_at 2026-04-18T12:55:00Z
6
value 0.00022
scoring_system epss
scoring_elements 0.05838
published_at 2026-04-07T12:55:00Z
7
value 0.00022
scoring_system epss
scoring_elements 0.05877
published_at 2026-04-08T12:55:00Z
8
value 0.00022
scoring_system epss
scoring_elements 0.05903
published_at 2026-04-09T12:55:00Z
9
value 0.00022
scoring_system epss
scoring_elements 0.05884
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-34440
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34440
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
reference_id 1095805
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345401
reference_id 2345401
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2345401
5
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
reference_id intel-sa-01139.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-13T20:21:01Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie
1
url pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1%3Fdistro=trixie
2
url pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/intel-microcode@3.20250211.1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20250211.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1%3Fdistro=trixie
4
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie
5
url pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie
6
url pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie
aliases CVE-2023-34440
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vsda-kq13-73g1
9
url VCID-wgce-vves-guek
vulnerability_id VCID-wgce-vves-guek
summary kernel: microcode_ctl: From CVEorg collector
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31068.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31068.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-31068
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.03962
published_at 2026-04-21T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.0388
published_at 2026-04-12T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.03854
published_at 2026-04-13T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.03833
published_at 2026-04-16T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.03843
published_at 2026-04-18T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.03877
published_at 2026-04-02T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.03886
published_at 2026-04-04T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.039
published_at 2026-04-07T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.03905
published_at 2026-04-08T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.0393
published_at 2026-04-09T12:55:00Z
10
value 0.00017
scoring_system epss
scoring_elements 0.03899
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-31068
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31068
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
reference_id 1095805
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345359
reference_id 2345359
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2345359
6
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01166.html
reference_id intel-sa-01166.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H
1
value 5.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T15:07:29Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01166.html
7
reference_url https://usn.ubuntu.com/7269-1/
reference_id USN-7269-1
reference_type
scores
url https://usn.ubuntu.com/7269-1/
8
reference_url https://usn.ubuntu.com/7269-2/
reference_id USN-7269-2
reference_type
scores
url https://usn.ubuntu.com/7269-2/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie
1
url pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1%3Fdistro=trixie
2
url pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/intel-microcode@3.20250211.1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20250211.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1%3Fdistro=trixie
4
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie
5
url pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie
6
url pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie
aliases CVE-2024-31068
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wgce-vves-guek
10
url VCID-wv5f-6x7x-7fdw
vulnerability_id VCID-wv5f-6x7x-7fdw
summary kernel: microcode_ctl: From CVEorg collector
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-36293.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-36293.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-36293
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07493
published_at 2026-04-21T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07467
published_at 2026-04-12T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07456
published_at 2026-04-13T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07379
published_at 2026-04-16T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07365
published_at 2026-04-18T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07382
published_at 2026-04-02T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07427
published_at 2026-04-04T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07409
published_at 2026-04-07T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07464
published_at 2026-04-08T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07487
published_at 2026-04-09T12:55:00Z
10
value 0.00027
scoring_system epss
scoring_elements 0.07481
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-36293
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36293
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
reference_id 1095805
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2345367
reference_id 2345367
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2345367
6
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01213.html
reference_id intel-sa-01213.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value 6.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T15:27:21Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01213.html
7
reference_url https://usn.ubuntu.com/7269-1/
reference_id USN-7269-1
reference_type
scores
url https://usn.ubuntu.com/7269-1/
8
reference_url https://usn.ubuntu.com/7269-2/
reference_id USN-7269-2
reference_type
scores
url https://usn.ubuntu.com/7269-2/
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie
1
url pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1%3Fdistro=trixie
2
url pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/intel-microcode@3.20250211.1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20250211.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1%3Fdistro=trixie
4
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie
5
url pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie
6
url pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie
aliases CVE-2024-36293
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wv5f-6x7x-7fdw
11
url VCID-wyf3-shyh-qyhc
vulnerability_id VCID-wyf3-shyh-qyhc
summary Sequence of processor instructions leads to unexpected behavior in the Intel(R) DSA V1.0 for some Intel(R) Xeon(R) Processors may allow an authenticated user to potentially enable denial of service via local access.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-37020
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.01365
published_at 2026-04-21T12:55:00Z
1
value 0.00011
scoring_system epss
scoring_elements 0.01283
published_at 2026-04-12T12:55:00Z
2
value 0.00011
scoring_system epss
scoring_elements 0.01286
published_at 2026-04-13T12:55:00Z
3
value 0.00011
scoring_system epss
scoring_elements 0.01278
published_at 2026-04-16T12:55:00Z
4
value 0.00011
scoring_system epss
scoring_elements 0.01291
published_at 2026-04-18T12:55:00Z
5
value 0.00011
scoring_system epss
scoring_elements 0.01281
published_at 2026-04-02T12:55:00Z
6
value 0.00011
scoring_system epss
scoring_elements 0.01285
published_at 2026-04-04T12:55:00Z
7
value 0.00011
scoring_system epss
scoring_elements 0.01296
published_at 2026-04-07T12:55:00Z
8
value 0.00011
scoring_system epss
scoring_elements 0.01301
published_at 2026-04-08T12:55:00Z
9
value 0.00011
scoring_system epss
scoring_elements 0.01305
published_at 2026-04-09T12:55:00Z
10
value 0.00011
scoring_system epss
scoring_elements 0.01289
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-37020
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37020
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
reference_id 1095805
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805
4
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01194.html
reference_id intel-sa-01194.html
reference_type
scores
0
value 3.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L
1
value 4.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T14:57:53Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01194.html
fixed_packages
0
url pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie
1
url pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1%3Fdistro=trixie
2
url pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/intel-microcode@3.20250211.1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20250211.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1%3Fdistro=trixie
4
url pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie
5
url pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-38q7-4ar3-sqcc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie
6
url pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie
purl pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie
aliases CVE-2024-37020
risk_score 1.4
exploitability 0.5
weighted_severity 2.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wyf3-shyh-qyhc
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1%3Fdistro=trixie