{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","type":"deb","namespace":"debian","name":"intel-microcode","version":"3.20260227.1","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79238?format=json","vulnerability_id":"VCID-156n-abxx-d3fp","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-14607","reference_id":"","reference_type":"","scores":[{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.35719","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36066","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36262","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36295","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36131","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.3618","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36198","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36204","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36167","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36141","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36183","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36168","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36116","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.35886","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.35853","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.35766","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.3565","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-14607"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14607","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14607"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925518?format=json","purl":"pkg:deb/debian/intel-microcode@3.20191115.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20191115.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2019-14607"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-156n-abxx-d3fp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76370?format=json","vulnerability_id":"VCID-1xju-dcmn-ube4","summary":"intel-microcode: Improper input validation in some Intel(R) TDX module software","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-45745.json","reference_id":"","reference_type":"","scores":[{"value":"7.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-45745.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-45745","reference_id":"","reference_type":"","scores":[{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22426","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22081","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22275","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22127","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22114","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22104","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22002","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22472","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22259","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22342","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22397","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22418","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22376","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22319","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22333","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22326","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-45745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45745"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2292298","reference_id":"2292298","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2292298"},{"reference_url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01036.html","reference_id":"intel-sa-01036.html","reference_type":"","scores":[{"value":"7.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-24T15:36:31Z/"}],"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01036.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240621-0003/","reference_id":"ntap-20240621-0003","reference_type":"","scores":[{"value":"7.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-24T15:36:31Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240621-0003/"},{"reference_url":"https://usn.ubuntu.com/6797-1/","reference_id":"USN-6797-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6797-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925544?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240514.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240514.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925543?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240514.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240514.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925545?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240514.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240514.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2023-45745"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1xju-dcmn-ube4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96641?format=json","vulnerability_id":"VCID-2ues-wvyq-6qc9","summary":"Improperly implemented security check for standard in the DDRIO configuration for some Intel(R) Xeon(R) 6 Processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-32086","reference_id":"","reference_type":"","scores":[{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02053","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02101","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02122","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02098","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02084","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02079","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02108","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02103","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02104","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02656","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02666","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02678","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02568","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05188","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.0515","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05139","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-32086"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32086","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32086"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983","reference_id":"1110983","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983"},{"reference_url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01367.html","reference_id":"intel-sa-01367.html","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N"},{"value":"4.5","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-13T15:04:21Z/"}],"url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01367.html"},{"reference_url":"https://usn.ubuntu.com/7866-1/","reference_id":"USN-7866-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7866-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925556?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250812.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250812.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925555?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250812.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250812.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925558?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250812.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250812.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925557?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250812.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250812.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2025-32086"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2ues-wvyq-6qc9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79442?format=json","vulnerability_id":"VCID-2ytx-vj3b-rfhb","summary":"hw: cpu: information disclosure in certain Intel processors","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21151.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21151.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21151","reference_id":"","reference_type":"","scores":[{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16785","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16982","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16918","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.1692","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16956","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16863","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16845","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.168","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16668","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17137","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.1719","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16968","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17058","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17114","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.1709","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17043","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21151"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010947","reference_id":"1010947","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010947"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2086730","reference_id":"2086730","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2086730"},{"reference_url":"https://security.archlinux.org/AVG-2796","reference_id":"AVG-2796","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2796"},{"reference_url":"https://www.debian.org/security/2022/dsa-5178","reference_id":"dsa-5178","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:47Z/"}],"url":"https://www.debian.org/security/2022/dsa-5178"},{"reference_url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00617.html","reference_id":"intel-sa-00617.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:47Z/"}],"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00617.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220826-0003/","reference_id":"ntap-20220826-0003","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:47Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220826-0003/"},{"reference_url":"https://usn.ubuntu.com/5486-1/","reference_id":"USN-5486-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5486-1/"},{"reference_url":"https://usn.ubuntu.com/5535-1/","reference_id":"USN-5535-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5535-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925525?format=json","purl":"pkg:deb/debian/intel-microcode@3.20220510.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20220510.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925524?format=json","purl":"pkg:deb/debian/intel-microcode@3.20220510.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20220510.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2022-21151"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2ytx-vj3b-rfhb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64641?format=json","vulnerability_id":"VCID-38q7-4ar3-sqcc","summary":"microcode_ctl: From CVEorg collector","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31648.json","reference_id":"","reference_type":"","scores":[{"value":"2.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31648.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31648","reference_id":"","reference_type":"","scores":[{"value":"5e-05","scoring_system":"epss","scoring_elements":"0.00267","published_at":"2026-05-07T12:55:00Z"},{"value":"5e-05","scoring_system":"epss","scoring_elements":"0.00237","published_at":"2026-04-11T12:55:00Z"},{"value":"5e-05","scoring_system":"epss","scoring_elements":"0.00235","published_at":"2026-04-16T12:55:00Z"},{"value":"5e-05","scoring_system":"epss","scoring_elements":"0.00234","published_at":"2026-04-13T12:55:00Z"},{"value":"5e-05","scoring_system":"epss","scoring_elements":"0.00236","published_at":"2026-04-18T12:55:00Z"},{"value":"5e-05","scoring_system":"epss","scoring_elements":"0.0027","published_at":"2026-04-24T12:55:00Z"},{"value":"5e-05","scoring_system":"epss","scoring_elements":"0.00268","published_at":"2026-04-26T12:55:00Z"},{"value":"5e-05","scoring_system":"epss","scoring_elements":"0.00265","published_at":"2026-05-05T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00332","published_at":"2026-04-04T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00334","published_at":"2026-04-02T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00322","published_at":"2026-04-09T12:55:00Z"},{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00324","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31648"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1127837","reference_id":"1127837","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1127837"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2438510","reference_id":"2438510","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2438510"},{"reference_url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01396.html","reference_id":"intel-sa-01396.html","reference_type":"","scores":[{"value":"3.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N"},{"value":"1.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-11T04:56:25Z/"}],"url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01396.html"},{"reference_url":"https://usn.ubuntu.com/8068-1/","reference_id":"USN-8068-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8068-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925559?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260210.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260210.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2025-31648"],"risk_score":1.1,"exploitability":"0.5","weighted_severity":"2.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-38q7-4ar3-sqcc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96005?format=json","vulnerability_id":"VCID-3dfb-1sgt-w3a8","summary":"Mirrored regions with different values in 3rd Generation Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable denial of service via local access.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-25939","reference_id":"","reference_type":"","scores":[{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18793","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.1889","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18873","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18831","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18708","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19217","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19269","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18984","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19064","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19117","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19123","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19077","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19024","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.1898","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18992","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18998","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-25939"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25939","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25939"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078742","reference_id":"1078742","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078742"},{"reference_url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01118.html","reference_id":"intel-sa-01118.html","reference_type":"","scores":[{"value":"6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"},{"value":"6.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T16:17:26Z/"}],"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01118.html"},{"reference_url":"https://usn.ubuntu.com/6967-1/","reference_id":"USN-6967-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6967-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925541?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925542?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2024-25939"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3dfb-1sgt-w3a8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71856?format=json","vulnerability_id":"VCID-3y3x-qqep-43ec","summary":"microcode_ctl: Improper initialization in UEFI firmware OutOfBandXML module","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31157.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31157.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-31157","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01596","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.016","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01597","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01612","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01499","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01502","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01509","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01513","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01516","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01508","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.015","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01501","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01487","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01503","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01591","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-31157"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31157","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31157"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805","reference_id":"1095805","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345421","reference_id":"2345421","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345421"},{"reference_url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html","reference_id":"intel-sa-01139.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N"},{"value":"6.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T15:13:26Z/"}],"url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7043","reference_id":"RHSA-2025:7043","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7043"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925539?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925538?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925540?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250211.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2024-31157"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3y3x-qqep-43ec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4320?format=json","vulnerability_id":"VCID-4429-qf2w-jqg3","summary":"x86: MMIO Stale Data vulnerabilities","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21166.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21166.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21166","reference_id":"","reference_type":"","scores":[{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40284","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.39858","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.39792","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40296","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40231","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.3992","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40001","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40015","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40309","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.4019","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40266","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40298","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40251","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.4027","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40308","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/06/16/1","reference_id":"1","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/"}],"url":"http://www.openwall.com/lists/oss-security/2022/06/16/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2090241","reference_id":"2090241","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2090241"},{"reference_url":"https://www.debian.org/security/2022/dsa-5173","reference_id":"dsa-5173","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/"}],"url":"https://www.debian.org/security/2022/dsa-5173"},{"reference_url":"https://www.debian.org/security/2022/dsa-5178","reference_id":"dsa-5178","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/"}],"url":"https://www.debian.org/security/2022/dsa-5178"},{"reference_url":"https://www.debian.org/security/2022/dsa-5184","reference_id":"dsa-5184","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/"}],"url":"https://www.debian.org/security/2022/dsa-5184"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV/","reference_id":"FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV/"},{"reference_url":"https://security.gentoo.org/glsa/202208-23","reference_id":"GLSA-202208-23","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/"}],"url":"https://security.gentoo.org/glsa/202208-23"},{"reference_url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html","reference_id":"intel-sa-00615.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/"}],"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS/","reference_id":"MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220624-0008/","reference_id":"ntap-20220624-0008","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220624-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5937","reference_id":"RHSA-2022:5937","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5937"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5939","reference_id":"RHSA-2022:5939","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5939"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6437","reference_id":"RHSA-2022:6437","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6437"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6460","reference_id":"RHSA-2022:6460","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6460"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6872","reference_id":"RHSA-2022:6872","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6872"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6983","reference_id":"RHSA-2022:6983","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6983"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6991","reference_id":"RHSA-2022:6991","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6991"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7279","reference_id":"RHSA-2022:7279","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7279"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7280","reference_id":"RHSA-2022:7280","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7280"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7933","reference_id":"RHSA-2022:7933","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7933"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8267","reference_id":"RHSA-2022:8267","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8267"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8973","reference_id":"RHSA-2022:8973","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8973"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8974","reference_id":"RHSA-2022:8974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8974"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/","reference_id":"RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA/","reference_id":"T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA/"},{"reference_url":"https://usn.ubuntu.com/5484-1/","reference_id":"USN-5484-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5484-1/"},{"reference_url":"https://usn.ubuntu.com/5485-1/","reference_id":"USN-5485-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5485-1/"},{"reference_url":"https://usn.ubuntu.com/5485-2/","reference_id":"USN-5485-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5485-2/"},{"reference_url":"https://usn.ubuntu.com/5486-1/","reference_id":"USN-5486-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5486-1/"},{"reference_url":"https://usn.ubuntu.com/5505-1/","reference_id":"USN-5505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5505-1/"},{"reference_url":"https://usn.ubuntu.com/5513-1/","reference_id":"USN-5513-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5513-1/"},{"reference_url":"https://usn.ubuntu.com/5529-1/","reference_id":"USN-5529-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5529-1/"},{"reference_url":"https://usn.ubuntu.com/5535-1/","reference_id":"USN-5535-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5535-1/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-404.html","reference_id":"XSA-404","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-404.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925525?format=json","purl":"pkg:deb/debian/intel-microcode@3.20220510.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20220510.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925524?format=json","purl":"pkg:deb/debian/intel-microcode@3.20220510.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20220510.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2022-21166","XSA-404"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4429-qf2w-jqg3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76371?format=json","vulnerability_id":"VCID-4bw3-w5hz-ekd1","summary":"intel-microcode: Unexpected behavior in Intel(R) Core(TM) Ultra Processors","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-46103.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-46103.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-46103","reference_id":"","reference_type":"","scores":[{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01254","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01329","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01334","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.0134","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01344","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01259","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01268","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01274","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01278","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01256","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01248","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01261","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-46103"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46103","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46103"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2292300","reference_id":"2292300","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2292300"},{"reference_url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01052.html","reference_id":"intel-sa-01052.html","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-21T15:00:27Z/"}],"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01052.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9401","reference_id":"RHSA-2024:9401","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9401"},{"reference_url":"https://usn.ubuntu.com/6797-1/","reference_id":"USN-6797-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6797-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925544?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240514.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240514.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925543?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240514.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240514.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925545?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240514.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240514.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2023-46103"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4bw3-w5hz-ekd1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96515?format=json","vulnerability_id":"VCID-4uuw-pm94-1kak","summary":"Missing reference to active allocated resource for some Intel(R) Xeon(R) processors may allow an authenticated user to potentially enable denial of service via local access.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21090","reference_id":"","reference_type":"","scores":[{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.09017","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.09068","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08992","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.09072","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.09103","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.09104","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.09071","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.09058","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08952","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09304","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09116","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.093","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09349","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09206","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09289","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09145","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-21090"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21090","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21090"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983","reference_id":"1110983","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983"},{"reference_url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01313.html","reference_id":"intel-sa-01313.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"4.1","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:P/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-12T19:09:39Z/"}],"url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01313.html"},{"reference_url":"https://usn.ubuntu.com/7866-1/","reference_id":"USN-7866-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7866-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925556?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250812.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250812.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925555?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250812.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250812.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925558?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250812.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250812.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925557?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250812.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250812.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2025-21090"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4uuw-pm94-1kak"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79091?format=json","vulnerability_id":"VCID-51f1-g2fa-1bbp","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11139.json","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11139.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-11139","reference_id":"","reference_type":"","scores":[{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31027","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31153","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.312","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31019","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31075","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31104","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31111","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31067","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31022","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31054","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31035","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31003","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.30846","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.30728","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.30645","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.30501","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.30569","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-11139"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11135","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11135"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11139","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11139"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1765481","reference_id":"1765481","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1765481"},{"reference_url":"https://security.archlinux.org/ASA-201911-14","reference_id":"ASA-201911-14","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201911-14"},{"reference_url":"https://security.archlinux.org/AVG-1068","reference_id":"AVG-1068","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1068"},{"reference_url":"https://usn.ubuntu.com/4182-1/","reference_id":"USN-4182-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4182-1/"},{"reference_url":"https://usn.ubuntu.com/4182-2/","reference_id":"USN-4182-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4182-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925517?format=json","purl":"pkg:deb/debian/intel-microcode@3.20191112.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20191112.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2019-11139"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-51f1-g2fa-1bbp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69674?format=json","vulnerability_id":"VCID-51nr-8avm-qued","summary":"microcode_ctl: From CVEorg collector","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-20012.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-20012.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-20012","reference_id":"","reference_type":"","scores":[{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21497","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21133","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21189","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21187","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21164","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21066","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21553","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21309","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21387","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21448","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21459","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21421","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21365","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21361","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21369","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21337","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-20012"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20012"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172","reference_id":"1105172","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366114","reference_id":"2366114","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366114"},{"reference_url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01322.html","reference_id":"intel-sa-01322.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"},{"value":"4.1","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-14T20:19:54Z/"}],"url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01322.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10101","reference_id":"RHSA-2025:10101","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10101"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10102","reference_id":"RHSA-2025:10102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10103","reference_id":"RHSA-2025:10103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10107","reference_id":"RHSA-2025:10107","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10108","reference_id":"RHSA-2025:10108","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10109","reference_id":"RHSA-2025:10109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10111","reference_id":"RHSA-2025:10111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10126","reference_id":"RHSA-2025:10126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10162","reference_id":"RHSA-2025:10162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10162"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10991","reference_id":"RHSA-2025:10991","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10991"},{"reference_url":"https://usn.ubuntu.com/7535-1/","reference_id":"USN-7535-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7535-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925553?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250512.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250512.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925552?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250512.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250512.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925554?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250512.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250512.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2025-20012"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-51nr-8avm-qued"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69665?format=json","vulnerability_id":"VCID-5cgx-1n9u-gqbh","summary":"microcode_ctl: Exposure of sensitive information","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-45332.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-45332.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-45332","reference_id":"","reference_type":"","scores":[{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.27878","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28167","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28055","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.27978","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.27815","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28474","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28516","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28307","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28372","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28416","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28419","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28376","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28318","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.2833","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28309","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28263","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-45332"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45332","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45332"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172","reference_id":"1105172","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366162","reference_id":"2366162","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366162"},{"reference_url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01247.html","reference_id":"intel-sa-01247.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"5.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-14T13:56:46Z/"}],"url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01247.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10101","reference_id":"RHSA-2025:10101","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10101"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10102","reference_id":"RHSA-2025:10102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10103","reference_id":"RHSA-2025:10103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10107","reference_id":"RHSA-2025:10107","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10108","reference_id":"RHSA-2025:10108","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10109","reference_id":"RHSA-2025:10109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10111","reference_id":"RHSA-2025:10111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10126","reference_id":"RHSA-2025:10126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10162","reference_id":"RHSA-2025:10162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10162"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10991","reference_id":"RHSA-2025:10991","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10991"},{"reference_url":"https://usn.ubuntu.com/7535-1/","reference_id":"USN-7535-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7535-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925553?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250512.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250512.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925552?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250512.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250512.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925554?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250512.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250512.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2024-45332"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5cgx-1n9u-gqbh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77731?format=json","vulnerability_id":"VCID-5dq7-wfyt-2uhz","summary":"kernel: Possible Denial of Service on Intel(R) Processors","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39368.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39368.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-39368","reference_id":"","reference_type":"","scores":[{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42555","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.4231","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42599","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42585","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.4252","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42457","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42458","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42375","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42235","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42583","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42522","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42574","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42605","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42568","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.4254","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-39368"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39368","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39368"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066108","reference_id":"1066108","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066108"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270703","reference_id":"2270703","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270703"},{"reference_url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00972.html","reference_id":"intel-sa-00972.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-15T15:31:40Z/"}],"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00972.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html","reference_id":"msg00003.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-15T15:31:40Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240405-0007/","reference_id":"ntap-20240405-0007","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-15T15:31:40Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240405-0007/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9401","reference_id":"RHSA-2024:9401","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9401"},{"reference_url":"https://usn.ubuntu.com/6797-1/","reference_id":"USN-6797-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6797-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925533?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240312.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240312.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925532?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240312.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240312.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925534?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240312.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240312.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2023-39368"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5dq7-wfyt-2uhz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69668?format=json","vulnerability_id":"VCID-5vkn-4rqc-qkbk","summary":"microcode_ctl: From CVEorg collector","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24495.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24495.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24495","reference_id":"","reference_type":"","scores":[{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22271","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21916","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21965","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21952","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21939","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21843","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22314","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22099","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22182","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22236","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22255","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22214","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22154","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22149","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22104","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24495"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24495","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24495"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172","reference_id":"1105172","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366089","reference_id":"2366089","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366089"},{"reference_url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01322.html","reference_id":"intel-sa-01322.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"6.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-14T17:16:37Z/"}],"url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01322.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10101","reference_id":"RHSA-2025:10101","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10101"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10102","reference_id":"RHSA-2025:10102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10103","reference_id":"RHSA-2025:10103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10107","reference_id":"RHSA-2025:10107","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10108","reference_id":"RHSA-2025:10108","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10109","reference_id":"RHSA-2025:10109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10111","reference_id":"RHSA-2025:10111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10126","reference_id":"RHSA-2025:10126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10162","reference_id":"RHSA-2025:10162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10162"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10991","reference_id":"RHSA-2025:10991","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10991"},{"reference_url":"https://usn.ubuntu.com/7535-1/","reference_id":"USN-7535-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7535-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925553?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250512.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250512.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925552?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250512.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250512.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925554?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250512.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250512.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2025-24495"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5vkn-4rqc-qkbk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95942?format=json","vulnerability_id":"VCID-6ake-v15c-k7aq","summary":"Incorrect default permissions in some Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX may allow a privileged user to potentially enable escalation of privilege via local access.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21820","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01762","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02778","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02747","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02734","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02789","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02761","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02669","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02677","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02679","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02699","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02672","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02658","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02656","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02638","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02646","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02756","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21820"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21820","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21820"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087532","reference_id":"1087532","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087532"},{"reference_url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01079.html","reference_id":"intel-sa-01079.html","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N"},{"value":"8.5","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-14T15:11:33Z/"}],"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01079.html"},{"reference_url":"https://usn.ubuntu.com/7149-1/","reference_id":"USN-7149-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7149-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925547?format=json","purl":"pkg:deb/debian/intel-microcode@3.20241112.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20241112.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925546?format=json","purl":"pkg:deb/debian/intel-microcode@3.20241112.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20241112.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925548?format=json","purl":"pkg:deb/debian/intel-microcode@3.20241112.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20241112.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2024-21820"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6ake-v15c-k7aq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4160?format=json","vulnerability_id":"VCID-6jsn-7538-a7ha","summary":"L1 Terminal Fault speculative side channel","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3646.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3646.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-3646","reference_id":"","reference_type":"","scores":[{"value":"0.03877","scoring_system":"epss","scoring_elements":"0.88182","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03877","scoring_system":"epss","scoring_elements":"0.88307","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03877","scoring_system":"epss","scoring_elements":"0.88241","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03877","scoring_system":"epss","scoring_elements":"0.88255","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03877","scoring_system":"epss","scoring_elements":"0.88254","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03877","scoring_system":"epss","scoring_elements":"0.88276","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03877","scoring_system":"epss","scoring_elements":"0.88279","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03877","scoring_system":"epss","scoring_elements":"0.8829","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03877","scoring_system":"epss","scoring_elements":"0.8819","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03877","scoring_system":"epss","scoring_elements":"0.88206","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03877","scoring_system":"epss","scoring_elements":"0.88212","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03877","scoring_system":"epss","scoring_elements":"0.88231","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03877","scoring_system":"epss","scoring_elements":"0.88237","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03877","scoring_system":"epss","scoring_elements":"0.88249","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03877","scoring_system":"epss","scoring_elements":"0.88242","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0398","scoring_system":"epss","scoring_elements":"0.88411","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0398","scoring_system":"epss","scoring_elements":"0.88427","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-3646"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1585005","reference_id":"1585005","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1585005"},{"reference_url":"https://security.archlinux.org/AVG-756","reference_id":"AVG-756","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-756"},{"reference_url":"https://security.archlinux.org/AVG-757","reference_id":"AVG-757","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-757"},{"reference_url":"https://security.archlinux.org/AVG-758","reference_id":"AVG-758","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-758"},{"reference_url":"https://security.gentoo.org/glsa/201810-06","reference_id":"GLSA-201810-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201810-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2384","reference_id":"RHSA-2018:2384","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2384"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2387","reference_id":"RHSA-2018:2387","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2387"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2388","reference_id":"RHSA-2018:2388","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2388"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2389","reference_id":"RHSA-2018:2389","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2389"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2390","reference_id":"RHSA-2018:2390","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2390"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2391","reference_id":"RHSA-2018:2391","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2391"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2392","reference_id":"RHSA-2018:2392","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2392"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2393","reference_id":"RHSA-2018:2393","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2393"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2394","reference_id":"RHSA-2018:2394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2394"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2395","reference_id":"RHSA-2018:2395","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2395"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2396","reference_id":"RHSA-2018:2396","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2396"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2402","reference_id":"RHSA-2018:2402","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2402"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2403","reference_id":"RHSA-2018:2403","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2403"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2404","reference_id":"RHSA-2018:2404","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2404"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2602","reference_id":"RHSA-2018:2602","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2602"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2603","reference_id":"RHSA-2018:2603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2603"},{"reference_url":"https://usn.ubuntu.com/3740-1/","reference_id":"USN-3740-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3740-1/"},{"reference_url":"https://usn.ubuntu.com/3740-2/","reference_id":"USN-3740-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3740-2/"},{"reference_url":"https://usn.ubuntu.com/3741-1/","reference_id":"USN-3741-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3741-1/"},{"reference_url":"https://usn.ubuntu.com/3741-2/","reference_id":"USN-3741-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3741-2/"},{"reference_url":"https://usn.ubuntu.com/3742-1/","reference_id":"USN-3742-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3742-1/"},{"reference_url":"https://usn.ubuntu.com/3742-2/","reference_id":"USN-3742-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3742-2/"},{"reference_url":"https://usn.ubuntu.com/3756-1/","reference_id":"USN-3756-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3756-1/"},{"reference_url":"https://usn.ubuntu.com/3823-1/","reference_id":"USN-3823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3823-1/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-273.html","reference_id":"XSA-273","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-273.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925516?format=json","purl":"pkg:deb/debian/intel-microcode@3.20180703.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20180703.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2018-3646","XSA-273"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6jsn-7538-a7ha"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78656?format=json","vulnerability_id":"VCID-6mzy-wsz1-cyhf","summary":"kernel: Intel firmware update for incorrect calculation in microcode keying mechanism","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-33972.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-33972.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-33972","reference_id":"","reference_type":"","scores":[{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10309","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10369","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10331","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10274","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10223","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10375","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10276","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10349","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10416","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10444","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10404","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10382","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10254","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10225","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10356","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10339","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-33972"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33972","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33972"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031334","reference_id":"1031334","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031334"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2171243","reference_id":"2171243","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2171243"},{"reference_url":"http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00730.html","reference_id":"intel-sa-00730.html","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-27T17:28:30Z/"}],"url":"http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00730.html"},{"reference_url":"https://usn.ubuntu.com/5886-1/","reference_id":"USN-5886-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5886-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925527?format=json","purl":"pkg:deb/debian/intel-microcode@3.20230214.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20230214.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925526?format=json","purl":"pkg:deb/debian/intel-microcode@3.20230214.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20230214.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2022-33972"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6mzy-wsz1-cyhf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71857?format=json","vulnerability_id":"VCID-6thk-vf9t-gygs","summary":"microcode_ctl: Insufficient granularity of access control in UEFI firmware","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-39279.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-39279.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-39279","reference_id":"","reference_type":"","scores":[{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06798","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.0665","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06645","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.0667","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06438","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06474","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06462","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06512","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06553","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06548","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06541","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06532","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06467","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06475","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06624","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06636","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-39279"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39279","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39279"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805","reference_id":"1095805","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345381","reference_id":"2345381","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345381"},{"reference_url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html","reference_id":"intel-sa-01139.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"6.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T15:14:06Z/"}],"url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7043","reference_id":"RHSA-2025:7043","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7043"},{"reference_url":"https://usn.ubuntu.com/7269-1/","reference_id":"USN-7269-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7269-1/"},{"reference_url":"https://usn.ubuntu.com/7269-2/","reference_id":"USN-7269-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7269-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925539?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925538?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925540?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250211.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2024-39279"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6thk-vf9t-gygs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76372?format=json","vulnerability_id":"VCID-6vn3-vpg9-gfbk","summary":"intel-microcode: Improper input validation in some Intel® TDX module software","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-47855.json","reference_id":"","reference_type":"","scores":[{"value":"6.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-47855.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-47855","reference_id":"","reference_type":"","scores":[{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22426","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22081","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22275","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22127","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22114","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22104","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22002","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22472","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22259","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22342","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22397","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22418","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22376","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22319","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22333","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22326","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-47855"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47855","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47855"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2292302","reference_id":"2292302","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2292302"},{"reference_url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01036.html","reference_id":"intel-sa-01036.html","reference_type":"","scores":[{"value":"6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-21T15:16:15Z/"}],"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01036.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240621-0003/","reference_id":"ntap-20240621-0003","reference_type":"","scores":[{"value":"6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-21T15:16:15Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240621-0003/"},{"reference_url":"https://usn.ubuntu.com/6797-1/","reference_id":"USN-6797-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6797-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925544?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240514.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240514.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925543?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240514.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240514.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925545?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240514.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240514.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2023-47855"],"risk_score":2.7,"exploitability":"0.5","weighted_severity":"5.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6vn3-vpg9-gfbk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96530?format=json","vulnerability_id":"VCID-75cx-avm7-tfcb","summary":"Improper handling of overlap between protected memory ranges for some Intel(R) Xeon(R) 6 processor with Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-22889","reference_id":"","reference_type":"","scores":[{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03407","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03482","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.0353","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03485","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03457","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03432","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03493","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03505","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03507","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04272","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04253","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04242","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04119","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06509","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06374","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06392","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-22889"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22889","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22889"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983","reference_id":"1110983","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983"},{"reference_url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01311.html","reference_id":"intel-sa-01311.html","reference_type":"","scores":[{"value":"7.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N"},{"value":"7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-13T18:04:29Z/"}],"url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01311.html"},{"reference_url":"https://usn.ubuntu.com/7866-1/","reference_id":"USN-7866-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7866-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925556?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250812.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250812.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925555?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250812.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250812.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925558?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250812.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250812.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925557?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250812.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250812.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2025-22889"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-75cx-avm7-tfcb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4149?format=json","vulnerability_id":"VCID-75hg-p8uc-p7ex","summary":"Speculative Store Bypass","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3639.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3639.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-3639","reference_id":"","reference_type":"","scores":[{"value":"0.39422","scoring_system":"epss","scoring_elements":"0.97282","published_at":"2026-04-04T12:55:00Z"},{"value":"0.39422","scoring_system":"epss","scoring_elements":"0.97272","published_at":"2026-04-01T12:55:00Z"},{"value":"0.39422","scoring_system":"epss","scoring_elements":"0.97277","published_at":"2026-04-02T12:55:00Z"},{"value":"0.46015","scoring_system":"epss","scoring_elements":"0.97629","published_at":"2026-04-11T12:55:00Z"},{"value":"0.46015","scoring_system":"epss","scoring_elements":"0.97631","published_at":"2026-04-12T12:55:00Z"},{"value":"0.46015","scoring_system":"epss","scoring_elements":"0.97632","published_at":"2026-04-13T12:55:00Z"},{"value":"0.46015","scoring_system":"epss","scoring_elements":"0.97639","published_at":"2026-04-16T12:55:00Z"},{"value":"0.46015","scoring_system":"epss","scoring_elements":"0.97642","published_at":"2026-04-26T12:55:00Z"},{"value":"0.46015","scoring_system":"epss","scoring_elements":"0.97641","published_at":"2026-04-24T12:55:00Z"},{"value":"0.46015","scoring_system":"epss","scoring_elements":"0.97647","published_at":"2026-04-29T12:55:00Z"},{"value":"0.46015","scoring_system":"epss","scoring_elements":"0.97652","published_at":"2026-05-05T12:55:00Z"},{"value":"0.46015","scoring_system":"epss","scoring_elements":"0.97654","published_at":"2026-05-07T12:55:00Z"},{"value":"0.46015","scoring_system":"epss","scoring_elements":"0.97619","published_at":"2026-04-07T12:55:00Z"},{"value":"0.46015","scoring_system":"epss","scoring_elements":"0.97624","published_at":"2026-04-08T12:55:00Z"},{"value":"0.46015","scoring_system":"epss","scoring_elements":"0.97627","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-3639"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3640"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1566890","reference_id":"1566890","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1566890"},{"reference_url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=1528","reference_id":"CVE-2018-3639","reference_type":"exploit","scores":[],"url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/hardware/dos/44695.c","reference_id":"CVE-2018-3639","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/hardware/dos/44695.c"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1629","reference_id":"RHSA-2018:1629","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1630","reference_id":"RHSA-2018:1630","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1630"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1632","reference_id":"RHSA-2018:1632","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1632"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1633","reference_id":"RHSA-2018:1633","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1633"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1635","reference_id":"RHSA-2018:1635","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1635"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1636","reference_id":"RHSA-2018:1636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1637","reference_id":"RHSA-2018:1637","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1637"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1638","reference_id":"RHSA-2018:1638","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1638"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1639","reference_id":"RHSA-2018:1639","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1639"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1640","reference_id":"RHSA-2018:1640","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1640"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1641","reference_id":"RHSA-2018:1641","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1641"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1642","reference_id":"RHSA-2018:1642","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1642"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1643","reference_id":"RHSA-2018:1643","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1643"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1644","reference_id":"RHSA-2018:1644","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1644"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1645","reference_id":"RHSA-2018:1645","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1645"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1646","reference_id":"RHSA-2018:1646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1647","reference_id":"RHSA-2018:1647","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1647"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1648","reference_id":"RHSA-2018:1648","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1648"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1649","reference_id":"RHSA-2018:1649","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1649"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1650","reference_id":"RHSA-2018:1650","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1650"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1651","reference_id":"RHSA-2018:1651","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1651"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1652","reference_id":"RHSA-2018:1652","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1652"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1653","reference_id":"RHSA-2018:1653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1654","reference_id":"RHSA-2018:1654","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1654"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1655","reference_id":"RHSA-2018:1655","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1655"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1656","reference_id":"RHSA-2018:1656","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1656"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1657","reference_id":"RHSA-2018:1657","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1657"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1658","reference_id":"RHSA-2018:1658","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1658"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1659","reference_id":"RHSA-2018:1659","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1659"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1660","reference_id":"RHSA-2018:1660","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1660"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1661","reference_id":"RHSA-2018:1661","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1661"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1662","reference_id":"RHSA-2018:1662","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1662"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1663","reference_id":"RHSA-2018:1663","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1663"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1664","reference_id":"RHSA-2018:1664","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1664"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1665","reference_id":"RHSA-2018:1665","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1665"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1666","reference_id":"RHSA-2018:1666","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1666"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1667","reference_id":"RHSA-2018:1667","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1667"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1668","reference_id":"RHSA-2018:1668","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1668"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1669","reference_id":"RHSA-2018:1669","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1669"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1674","reference_id":"RHSA-2018:1674","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1674"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1675","reference_id":"RHSA-2018:1675","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1675"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1676","reference_id":"RHSA-2018:1676","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1676"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1686","reference_id":"RHSA-2018:1686","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1686"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1688","reference_id":"RHSA-2018:1688","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1688"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1689","reference_id":"RHSA-2018:1689","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1689"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1690","reference_id":"RHSA-2018:1690","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1690"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1696","reference_id":"RHSA-2018:1696","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1696"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1710","reference_id":"RHSA-2018:1710","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1710"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1711","reference_id":"RHSA-2018:1711","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1711"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1737","reference_id":"RHSA-2018:1737","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1737"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1738","reference_id":"RHSA-2018:1738","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1738"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1826","reference_id":"RHSA-2018:1826","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1826"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1854","reference_id":"RHSA-2018:1854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1854"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1965","reference_id":"RHSA-2018:1965","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1965"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1967","reference_id":"RHSA-2018:1967","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1967"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1997","reference_id":"RHSA-2018:1997","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1997"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2001","reference_id":"RHSA-2018:2001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2003","reference_id":"RHSA-2018:2003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2006","reference_id":"RHSA-2018:2006","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2006"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2060","reference_id":"RHSA-2018:2060","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2060"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2161","reference_id":"RHSA-2018:2161","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2161"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2162","reference_id":"RHSA-2018:2162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2162"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2164","reference_id":"RHSA-2018:2164","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2164"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2171","reference_id":"RHSA-2018:2171","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2171"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2172","reference_id":"RHSA-2018:2172","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2172"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2216","reference_id":"RHSA-2018:2216","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2216"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2228","reference_id":"RHSA-2018:2228","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2228"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2246","reference_id":"RHSA-2018:2246","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2246"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2250","reference_id":"RHSA-2018:2250","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2250"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2258","reference_id":"RHSA-2018:2258","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2258"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2289","reference_id":"RHSA-2018:2289","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2289"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2309","reference_id":"RHSA-2018:2309","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2309"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2328","reference_id":"RHSA-2018:2328","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2328"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2363","reference_id":"RHSA-2018:2363","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2363"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2364","reference_id":"RHSA-2018:2364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2387","reference_id":"RHSA-2018:2387","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2387"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2394","reference_id":"RHSA-2018:2394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2394"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2396","reference_id":"RHSA-2018:2396","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2396"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2948","reference_id":"RHSA-2018:2948","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2948"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3396","reference_id":"RHSA-2018:3396","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3396"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3397","reference_id":"RHSA-2018:3397","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3397"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3398","reference_id":"RHSA-2018:3398","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3398"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3399","reference_id":"RHSA-2018:3399","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3399"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3400","reference_id":"RHSA-2018:3400","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3400"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3401","reference_id":"RHSA-2018:3401","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3401"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3402","reference_id":"RHSA-2018:3402","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3402"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3407","reference_id":"RHSA-2018:3407","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3407"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3423","reference_id":"RHSA-2018:3423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3424","reference_id":"RHSA-2018:3424","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3424"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3425","reference_id":"RHSA-2018:3425","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3425"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0148","reference_id":"RHSA-2019:0148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1046","reference_id":"RHSA-2019:1046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1046"},{"reference_url":"https://usn.ubuntu.com/3651-1/","reference_id":"USN-3651-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3651-1/"},{"reference_url":"https://usn.ubuntu.com/3652-1/","reference_id":"USN-3652-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3652-1/"},{"reference_url":"https://usn.ubuntu.com/3653-1/","reference_id":"USN-3653-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3653-1/"},{"reference_url":"https://usn.ubuntu.com/3653-2/","reference_id":"USN-3653-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3653-2/"},{"reference_url":"https://usn.ubuntu.com/3654-1/","reference_id":"USN-3654-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3654-1/"},{"reference_url":"https://usn.ubuntu.com/3654-2/","reference_id":"USN-3654-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3654-2/"},{"reference_url":"https://usn.ubuntu.com/3655-1/","reference_id":"USN-3655-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3655-1/"},{"reference_url":"https://usn.ubuntu.com/3655-2/","reference_id":"USN-3655-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3655-2/"},{"reference_url":"https://usn.ubuntu.com/3679-1/","reference_id":"USN-3679-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3679-1/"},{"reference_url":"https://usn.ubuntu.com/3680-1/","reference_id":"USN-3680-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3680-1/"},{"reference_url":"https://usn.ubuntu.com/3756-1/","reference_id":"USN-3756-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3756-1/"},{"reference_url":"https://usn.ubuntu.com/3777-3/","reference_id":"USN-3777-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3777-3/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-263.html","reference_id":"XSA-263","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-263.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925516?format=json","purl":"pkg:deb/debian/intel-microcode@3.20180703.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20180703.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2018-3639","XSA-263"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-75hg-p8uc-p7ex"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77202?format=json","vulnerability_id":"VCID-7gm7-fjkv-z3e9","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3640.json","reference_id":"","reference_type":"","scores":[{"value":"2.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3640.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-3640","reference_id":"","reference_type":"","scores":[{"value":"0.00902","scoring_system":"epss","scoring_elements":"0.75631","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00902","scoring_system":"epss","scoring_elements":"0.75633","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00902","scoring_system":"epss","scoring_elements":"0.75664","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00902","scoring_system":"epss","scoring_elements":"0.75644","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00902","scoring_system":"epss","scoring_elements":"0.75678","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00902","scoring_system":"epss","scoring_elements":"0.75689","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00902","scoring_system":"epss","scoring_elements":"0.75713","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00902","scoring_system":"epss","scoring_elements":"0.75694","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00902","scoring_system":"epss","scoring_elements":"0.75688","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00902","scoring_system":"epss","scoring_elements":"0.75726","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00902","scoring_system":"epss","scoring_elements":"0.75729","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01343","scoring_system":"epss","scoring_elements":"0.80064","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01375","scoring_system":"epss","scoring_elements":"0.80343","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01375","scoring_system":"epss","scoring_elements":"0.80328","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01375","scoring_system":"epss","scoring_elements":"0.80365","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01556","scoring_system":"epss","scoring_elements":"0.81518","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01556","scoring_system":"epss","scoring_elements":"0.8151","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-3640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3640"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1580340","reference_id":"1580340","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1580340"},{"reference_url":"https://usn.ubuntu.com/3756-1/","reference_id":"USN-3756-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3756-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925516?format=json","purl":"pkg:deb/debian/intel-microcode@3.20180703.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20180703.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2018-3640"],"risk_score":1.2,"exploitability":"0.5","weighted_severity":"2.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7gm7-fjkv-z3e9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4159?format=json","vulnerability_id":"VCID-7vn6-5h93-27hn","summary":"L1 Terminal Fault speculative side channel","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3620.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3620.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-3620","reference_id":"","reference_type":"","scores":[{"value":"0.02259","scoring_system":"epss","scoring_elements":"0.84713","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02259","scoring_system":"epss","scoring_elements":"0.84661","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02259","scoring_system":"epss","scoring_elements":"0.8467","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02259","scoring_system":"epss","scoring_elements":"0.84673","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02259","scoring_system":"epss","scoring_elements":"0.84686","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0232","scoring_system":"epss","scoring_elements":"0.84817","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03037","scoring_system":"epss","scoring_elements":"0.86638","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03037","scoring_system":"epss","scoring_elements":"0.86637","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03037","scoring_system":"epss","scoring_elements":"0.86656","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03037","scoring_system":"epss","scoring_elements":"0.86665","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03037","scoring_system":"epss","scoring_elements":"0.86679","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03037","scoring_system":"epss","scoring_elements":"0.86677","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03037","scoring_system":"epss","scoring_elements":"0.8667","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03037","scoring_system":"epss","scoring_elements":"0.86683","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03037","scoring_system":"epss","scoring_elements":"0.86689","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03037","scoring_system":"epss","scoring_elements":"0.86607","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03037","scoring_system":"epss","scoring_elements":"0.86618","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-3620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1585005","reference_id":"1585005","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1585005"},{"reference_url":"https://security.archlinux.org/AVG-756","reference_id":"AVG-756","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-756"},{"reference_url":"https://security.archlinux.org/AVG-757","reference_id":"AVG-757","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-757"},{"reference_url":"https://security.archlinux.org/AVG-758","reference_id":"AVG-758","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-758"},{"reference_url":"https://security.gentoo.org/glsa/201810-06","reference_id":"GLSA-201810-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201810-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2384","reference_id":"RHSA-2018:2384","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2384"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2387","reference_id":"RHSA-2018:2387","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2387"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2388","reference_id":"RHSA-2018:2388","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2388"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2389","reference_id":"RHSA-2018:2389","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2389"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2390","reference_id":"RHSA-2018:2390","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2390"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2391","reference_id":"RHSA-2018:2391","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2391"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2392","reference_id":"RHSA-2018:2392","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2392"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2393","reference_id":"RHSA-2018:2393","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2393"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2394","reference_id":"RHSA-2018:2394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2394"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2395","reference_id":"RHSA-2018:2395","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2395"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2396","reference_id":"RHSA-2018:2396","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2396"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2402","reference_id":"RHSA-2018:2402","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2402"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2403","reference_id":"RHSA-2018:2403","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2403"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2404","reference_id":"RHSA-2018:2404","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2404"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2602","reference_id":"RHSA-2018:2602","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2602"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2603","reference_id":"RHSA-2018:2603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2603"},{"reference_url":"https://usn.ubuntu.com/3740-1/","reference_id":"USN-3740-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3740-1/"},{"reference_url":"https://usn.ubuntu.com/3740-2/","reference_id":"USN-3740-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3740-2/"},{"reference_url":"https://usn.ubuntu.com/3741-1/","reference_id":"USN-3741-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3741-1/"},{"reference_url":"https://usn.ubuntu.com/3741-2/","reference_id":"USN-3741-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3741-2/"},{"reference_url":"https://usn.ubuntu.com/3742-1/","reference_id":"USN-3742-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3742-1/"},{"reference_url":"https://usn.ubuntu.com/3742-2/","reference_id":"USN-3742-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3742-2/"},{"reference_url":"https://usn.ubuntu.com/3823-1/","reference_id":"USN-3823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3823-1/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-273.html","reference_id":"XSA-273","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-273.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925516?format=json","purl":"pkg:deb/debian/intel-microcode@3.20180703.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20180703.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2018-3620"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7vn6-5h93-27hn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96512?format=json","vulnerability_id":"VCID-7wcy-5hnc-tfh4","summary":"Improper Isolation or Compartmentalization in the stream cache mechanism for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege via local access.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-20109","reference_id":"","reference_type":"","scores":[{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03426","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03362","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.0356","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03554","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03546","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03375","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03391","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03395","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03416","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03347","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03324","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.033","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.0537","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05328","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05326","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-20109"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20109","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20109"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983","reference_id":"1110983","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983"},{"reference_url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01249.html","reference_id":"intel-sa-01249.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"value":"7.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-12T19:16:39Z/"}],"url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01249.html"},{"reference_url":"https://usn.ubuntu.com/7866-1/","reference_id":"USN-7866-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7866-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925556?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250812.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250812.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925555?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250812.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250812.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925558?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250812.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250812.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925557?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250812.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250812.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2025-20109"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7wcy-5hnc-tfh4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96558?format=json","vulnerability_id":"VCID-8nyc-r2e4-17gr","summary":"Insufficient control flow management in the Alias Checking Trusted Module (ACTM) firmware for some Intel(R) Xeon(R) processors may allow a privileged user to potentially enable escalation of privilege via local access.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24305","reference_id":"","reference_type":"","scores":[{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01261","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01256","published_at":"2026-05-07T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00589","published_at":"2026-04-12T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00601","published_at":"2026-04-07T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00599","published_at":"2026-04-08T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00593","published_at":"2026-04-11T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00606","published_at":"2026-04-02T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.0059","published_at":"2026-04-13T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00585","published_at":"2026-04-16T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.006","published_at":"2026-04-04T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00694","published_at":"2026-04-18T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00735","published_at":"2026-04-21T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00738","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24305"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983","reference_id":"1110983","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983"},{"reference_url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01313.html","reference_id":"intel-sa-01313.html","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N"},{"value":"7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-13T18:04:22Z/"}],"url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01313.html"},{"reference_url":"https://usn.ubuntu.com/7866-1/","reference_id":"USN-7866-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7866-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925556?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250812.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250812.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925555?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250812.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250812.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925558?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250812.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250812.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925557?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250812.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250812.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2025-24305"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8nyc-r2e4-17gr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78655?format=json","vulnerability_id":"VCID-8vx6-ctvp-8qeq","summary":"kernel: Intel firmware update for insufficient granularity of access control in out-of-band management in some Intel Atom and Intel Xeon Scalable Processors","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21216.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21216.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21216","reference_id":"","reference_type":"","scores":[{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.1593","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15749","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15785","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15805","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15802","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15759","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.1563","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15992","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15791","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15877","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15939","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15915","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15809","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15732","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15741","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21216"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21216","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21216"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031334","reference_id":"1031334","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031334"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2171227","reference_id":"2171227","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2171227"},{"reference_url":"http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00700.html","reference_id":"intel-sa-00700.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-27T17:29:15Z/"}],"url":"http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00700.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230601-0005/","reference_id":"ntap-20230601-0005","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-27T17:29:15Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230601-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5209","reference_id":"RHSA-2023:5209","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5209"},{"reference_url":"https://usn.ubuntu.com/5886-1/","reference_id":"USN-5886-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5886-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925527?format=json","purl":"pkg:deb/debian/intel-microcode@3.20230214.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20230214.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925526?format=json","purl":"pkg:deb/debian/intel-microcode@3.20230214.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20230214.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2022-21216"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8vx6-ctvp-8qeq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77732?format=json","vulnerability_id":"VCID-9en3-y22n-wydw","summary":"kernel: Local information disclosure on Intel(R) Xeon(R) D processors with Intel(R) SGX due to incorrect calculation in microcode","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43490.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43490.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-43490","reference_id":"","reference_type":"","scores":[{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05469","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05798","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05468","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05478","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05641","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05674","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.0571","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05716","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05722","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05503","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05504","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.0554","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05561","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05536","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05524","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05517","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-43490"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43490","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43490"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066108","reference_id":"1066108","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066108"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270704","reference_id":"2270704","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270704"},{"reference_url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01045.html","reference_id":"intel-sa-01045.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:34:04Z/"}],"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01045.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html","reference_id":"msg00003.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:34:04Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240405-0009/","reference_id":"ntap-20240405-0009","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:34:04Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240405-0009/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9401","reference_id":"RHSA-2024:9401","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9401"},{"reference_url":"https://usn.ubuntu.com/6797-1/","reference_id":"USN-6797-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6797-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925533?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240312.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240312.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925532?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240312.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240312.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925534?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240312.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240312.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2023-43490"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9en3-y22n-wydw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4184?format=json","vulnerability_id":"VCID-9yut-bdsw-gkfy","summary":"Microarchitectural Data Sampling speculative side channel","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12127.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12127.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-12127","reference_id":"","reference_type":"","scores":[{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.65634","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.65683","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.65713","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.65678","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.6573","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.65742","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.65763","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.65748","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.65719","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.65754","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.65767","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.65753","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.65766","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.65777","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.65776","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.6575","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.65799","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-12127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1667782","reference_id":"1667782","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1667782"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929129","reference_id":"929129","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929129"},{"reference_url":"https://security.gentoo.org/glsa/202003-56","reference_id":"GLSA-202003-56","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-56"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1155","reference_id":"RHSA-2019:1155","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1155"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1167","reference_id":"RHSA-2019:1167","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1167"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1168","reference_id":"RHSA-2019:1168","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1168"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1169","reference_id":"RHSA-2019:1169","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1169"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1170","reference_id":"RHSA-2019:1170","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1170"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1171","reference_id":"RHSA-2019:1171","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1171"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1172","reference_id":"RHSA-2019:1172","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1172"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1174","reference_id":"RHSA-2019:1174","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1174"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1175","reference_id":"RHSA-2019:1175","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1175"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1176","reference_id":"RHSA-2019:1176","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1176"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1177","reference_id":"RHSA-2019:1177","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1177"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1178","reference_id":"RHSA-2019:1178","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1178"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1179","reference_id":"RHSA-2019:1179","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1179"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1180","reference_id":"RHSA-2019:1180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1181","reference_id":"RHSA-2019:1181","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1181"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1182","reference_id":"RHSA-2019:1182","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1182"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1183","reference_id":"RHSA-2019:1183","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1183"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1184","reference_id":"RHSA-2019:1184","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1184"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1185","reference_id":"RHSA-2019:1185","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1185"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1186","reference_id":"RHSA-2019:1186","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1186"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1187","reference_id":"RHSA-2019:1187","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1187"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1188","reference_id":"RHSA-2019:1188","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1188"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1189","reference_id":"RHSA-2019:1189","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1189"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1190","reference_id":"RHSA-2019:1190","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1190"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1193","reference_id":"RHSA-2019:1193","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1193"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1194","reference_id":"RHSA-2019:1194","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1194"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1195","reference_id":"RHSA-2019:1195","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1195"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1196","reference_id":"RHSA-2019:1196","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1196"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1197","reference_id":"RHSA-2019:1197","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1197"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1198","reference_id":"RHSA-2019:1198","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1198"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1199","reference_id":"RHSA-2019:1199","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1199"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1200","reference_id":"RHSA-2019:1200","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1200"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1201","reference_id":"RHSA-2019:1201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1202","reference_id":"RHSA-2019:1202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1203","reference_id":"RHSA-2019:1203","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1203"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1204","reference_id":"RHSA-2019:1204","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1204"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1205","reference_id":"RHSA-2019:1205","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1205"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1206","reference_id":"RHSA-2019:1206","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1206"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1207","reference_id":"RHSA-2019:1207","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1207"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1208","reference_id":"RHSA-2019:1208","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1208"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1209","reference_id":"RHSA-2019:1209","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1209"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1455","reference_id":"RHSA-2019:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1455"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2553","reference_id":"RHSA-2019:2553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2553"},{"reference_url":"https://usn.ubuntu.com/3977-1/","reference_id":"USN-3977-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3977-1/"},{"reference_url":"https://usn.ubuntu.com/3977-2/","reference_id":"USN-3977-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3977-2/"},{"reference_url":"https://usn.ubuntu.com/3977-3/","reference_id":"USN-3977-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3977-3/"},{"reference_url":"https://usn.ubuntu.com/3978-1/","reference_id":"USN-3978-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3978-1/"},{"reference_url":"https://usn.ubuntu.com/3979-1/","reference_id":"USN-3979-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3979-1/"},{"reference_url":"https://usn.ubuntu.com/3980-1/","reference_id":"USN-3980-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3980-1/"},{"reference_url":"https://usn.ubuntu.com/3980-2/","reference_id":"USN-3980-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3980-2/"},{"reference_url":"https://usn.ubuntu.com/3981-1/","reference_id":"USN-3981-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3981-1/"},{"reference_url":"https://usn.ubuntu.com/3981-2/","reference_id":"USN-3981-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3981-2/"},{"reference_url":"https://usn.ubuntu.com/3982-1/","reference_id":"USN-3982-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3982-1/"},{"reference_url":"https://usn.ubuntu.com/3982-2/","reference_id":"USN-3982-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3982-2/"},{"reference_url":"https://usn.ubuntu.com/3983-1/","reference_id":"USN-3983-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3983-1/"},{"reference_url":"https://usn.ubuntu.com/3983-2/","reference_id":"USN-3983-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3983-2/"},{"reference_url":"https://usn.ubuntu.com/3984-1/","reference_id":"USN-3984-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3984-1/"},{"reference_url":"https://usn.ubuntu.com/3985-1/","reference_id":"USN-3985-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3985-1/"},{"reference_url":"https://usn.ubuntu.com/3985-2/","reference_id":"USN-3985-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3985-2/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-297.html","reference_id":"XSA-297","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-297.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925515?format=json","purl":"pkg:deb/debian/intel-microcode@3.20190514.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20190514.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2018-12127"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9yut-bdsw-gkfy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4210?format=json","vulnerability_id":"VCID-b3gf-ec3p-xyfx","summary":"Special Register Buffer speculative side channel","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-0543.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-0543.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-0543","reference_id":"","reference_type":"","scores":[{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65034","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65147","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65156","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65165","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65149","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65164","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65177","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65084","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65111","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65075","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65124","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65138","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65157","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65119","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.66986","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.67028","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.67014","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-0543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3016","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3016"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0548","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0549","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0549"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12768","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12768"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1827165","reference_id":"1827165","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1827165"},{"reference_url":"https://security.archlinux.org/ASA-202006-10","reference_id":"ASA-202006-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202006-10"},{"reference_url":"https://security.archlinux.org/AVG-1187","reference_id":"AVG-1187","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1187"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2431","reference_id":"RHSA-2020:2431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2432","reference_id":"RHSA-2020:2432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2433","reference_id":"RHSA-2020:2433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2677","reference_id":"RHSA-2020:2677","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2677"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2679","reference_id":"RHSA-2020:2679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2680","reference_id":"RHSA-2020:2680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2706","reference_id":"RHSA-2020:2706","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2706"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2707","reference_id":"RHSA-2020:2707","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2707"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2757","reference_id":"RHSA-2020:2757","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2757"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2758","reference_id":"RHSA-2020:2758","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2758"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2771","reference_id":"RHSA-2020:2771","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2771"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2842","reference_id":"RHSA-2020:2842","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2842"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3027","reference_id":"RHSA-2021:3027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3028","reference_id":"RHSA-2021:3028","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3028"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3029","reference_id":"RHSA-2021:3029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3176","reference_id":"RHSA-2021:3176","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3176"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3255","reference_id":"RHSA-2021:3255","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3255"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3317","reference_id":"RHSA-2021:3317","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3317"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3322","reference_id":"RHSA-2021:3322","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3322"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3323","reference_id":"RHSA-2021:3323","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3323"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3364","reference_id":"RHSA-2021:3364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3364"},{"reference_url":"https://usn.ubuntu.com/4385-1/","reference_id":"USN-4385-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4385-1/"},{"reference_url":"https://usn.ubuntu.com/4387-1/","reference_id":"USN-4387-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4387-1/"},{"reference_url":"https://usn.ubuntu.com/4388-1/","reference_id":"USN-4388-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4388-1/"},{"reference_url":"https://usn.ubuntu.com/4389-1/","reference_id":"USN-4389-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4389-1/"},{"reference_url":"https://usn.ubuntu.com/4390-1/","reference_id":"USN-4390-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4390-1/"},{"reference_url":"https://usn.ubuntu.com/4391-1/","reference_id":"USN-4391-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4391-1/"},{"reference_url":"https://usn.ubuntu.com/4392-1/","reference_id":"USN-4392-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4392-1/"},{"reference_url":"https://usn.ubuntu.com/4393-1/","reference_id":"USN-4393-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4393-1/"},{"reference_url":"https://usn.ubuntu.com/5617-1/","reference_id":"USN-5617-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5617-1/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-320.html","reference_id":"XSA-320","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-320.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925519?format=json","purl":"pkg:deb/debian/intel-microcode@3.20200609.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20200609.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2020-0543","XSA-320"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b3gf-ec3p-xyfx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69673?format=json","vulnerability_id":"VCID-b55f-n1ed-g7eq","summary":"microcode_ctl: Uncaught exception in the core management mechanism","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-20054.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-20054.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-20054","reference_id":"","reference_type":"","scores":[{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11757","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11737","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11736","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11852","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11821","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11776","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11706","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11622","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14628","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14591","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.1453","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14638","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14522","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14611","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14669","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.1471","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-20054"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20054","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20054"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172","reference_id":"1105172","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366113","reference_id":"2366113","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366113"},{"reference_url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01244.html","reference_id":"intel-sa-01244.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"6.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-14T15:48:16Z/"}],"url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01244.html"},{"reference_url":"https://usn.ubuntu.com/7535-1/","reference_id":"USN-7535-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7535-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925553?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250512.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250512.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925552?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250512.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250512.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925554?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250512.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250512.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2025-20054"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b55f-n1ed-g7eq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95980?format=json","vulnerability_id":"VCID-bzwc-9ueu-gka1","summary":"Incorrect behavior order in transition between executive monitor and SMI transfer monitor (STM) in some Intel(R) Processor may allow a privileged user to potentially enable escalation of privilege via local access.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-24853","reference_id":"","reference_type":"","scores":[{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03709","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03733","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.0355","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03687","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03538","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03683","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03688","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03922","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05099","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05126","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.0514","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05115","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05083","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05236","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05294","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05268","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-24853"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24853","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24853"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078742","reference_id":"1078742","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078742"},{"reference_url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01083.html","reference_id":"intel-sa-01083.html","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H"},{"value":"7.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-14T19:14:11Z/"}],"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01083.html"},{"reference_url":"https://usn.ubuntu.com/6967-1/","reference_id":"USN-6967-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6967-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925541?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925542?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2024-24853"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bzwc-9ueu-gka1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4318?format=json","vulnerability_id":"VCID-csy7-esn4-u3gq","summary":"x86: MMIO Stale Data vulnerabilities","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21123.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21123.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21123","reference_id":"","reference_type":"","scores":[{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63685","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63711","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63769","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63755","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63739","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63751","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63741","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63706","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63754","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.6374","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63723","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63671","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.64414","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.64369","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.64395","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21123"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/06/16/1","reference_id":"1","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/"}],"url":"http://www.openwall.com/lists/oss-security/2022/06/16/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2090237","reference_id":"2090237","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2090237"},{"reference_url":"https://www.debian.org/security/2022/dsa-5173","reference_id":"dsa-5173","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/"}],"url":"https://www.debian.org/security/2022/dsa-5173"},{"reference_url":"https://www.debian.org/security/2022/dsa-5178","reference_id":"dsa-5178","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/"}],"url":"https://www.debian.org/security/2022/dsa-5178"},{"reference_url":"https://www.debian.org/security/2022/dsa-5184","reference_id":"dsa-5184","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/"}],"url":"https://www.debian.org/security/2022/dsa-5184"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV/","reference_id":"FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV/"},{"reference_url":"https://security.gentoo.org/glsa/202208-23","reference_id":"GLSA-202208-23","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/"}],"url":"https://security.gentoo.org/glsa/202208-23"},{"reference_url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html","reference_id":"intel-sa-00615.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/"}],"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS/","reference_id":"MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220624-0008/","reference_id":"ntap-20220624-0008","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220624-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5937","reference_id":"RHSA-2022:5937","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5937"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5939","reference_id":"RHSA-2022:5939","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5939"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6437","reference_id":"RHSA-2022:6437","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6437"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6460","reference_id":"RHSA-2022:6460","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6460"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6872","reference_id":"RHSA-2022:6872","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6872"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6983","reference_id":"RHSA-2022:6983","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6983"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6991","reference_id":"RHSA-2022:6991","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6991"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7279","reference_id":"RHSA-2022:7279","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7279"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7280","reference_id":"RHSA-2022:7280","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7280"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7933","reference_id":"RHSA-2022:7933","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7933"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8267","reference_id":"RHSA-2022:8267","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8267"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8973","reference_id":"RHSA-2022:8973","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8973"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8974","reference_id":"RHSA-2022:8974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8974"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/","reference_id":"RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA/","reference_id":"T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA/"},{"reference_url":"https://usn.ubuntu.com/5484-1/","reference_id":"USN-5484-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5484-1/"},{"reference_url":"https://usn.ubuntu.com/5485-1/","reference_id":"USN-5485-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5485-1/"},{"reference_url":"https://usn.ubuntu.com/5485-2/","reference_id":"USN-5485-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5485-2/"},{"reference_url":"https://usn.ubuntu.com/5486-1/","reference_id":"USN-5486-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5486-1/"},{"reference_url":"https://usn.ubuntu.com/5505-1/","reference_id":"USN-5505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5505-1/"},{"reference_url":"https://usn.ubuntu.com/5513-1/","reference_id":"USN-5513-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5513-1/"},{"reference_url":"https://usn.ubuntu.com/5529-1/","reference_id":"USN-5529-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5529-1/"},{"reference_url":"https://usn.ubuntu.com/5535-1/","reference_id":"USN-5535-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5535-1/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-404.html","reference_id":"XSA-404","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-404.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925525?format=json","purl":"pkg:deb/debian/intel-microcode@3.20220510.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20220510.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925524?format=json","purl":"pkg:deb/debian/intel-microcode@3.20220510.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20220510.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2022-21123"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-csy7-esn4-u3gq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77730?format=json","vulnerability_id":"VCID-dzdf-drjk-m3cj","summary":"kernel: Local information disclosure in some Intel(R) processors","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38575.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38575.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38575","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07655","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07807","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07638","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07626","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07775","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07732","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0771","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07687","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07666","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07698","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07667","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07727","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07745","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07743","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0773","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07714","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38575"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38575","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38575"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066108","reference_id":"1066108","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066108"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270701","reference_id":"2270701","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270701"},{"reference_url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00982.html","reference_id":"intel-sa-00982.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-27T19:25:29Z/"}],"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00982.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html","reference_id":"msg00003.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-27T19:25:29Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240405-0008/","reference_id":"ntap-20240405-0008","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-27T19:25:29Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240405-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9401","reference_id":"RHSA-2024:9401","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9401"},{"reference_url":"https://usn.ubuntu.com/6797-1/","reference_id":"USN-6797-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6797-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925533?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240312.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240312.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925532?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240312.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240312.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925534?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240312.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240312.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2023-38575"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dzdf-drjk-m3cj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79697?format=json","vulnerability_id":"VCID-efqu-9zy2-xyh5","summary":"microcode: Fast store forward predictor - Cross Domain Training","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0145.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0145.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-0145","reference_id":"","reference_type":"","scores":[{"value":"0.00232","scoring_system":"epss","scoring_elements":"0.45918","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00232","scoring_system":"epss","scoring_elements":"0.45964","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00232","scoring_system":"epss","scoring_elements":"0.45851","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00232","scoring_system":"epss","scoring_elements":"0.45983","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00232","scoring_system":"epss","scoring_elements":"0.45935","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00232","scoring_system":"epss","scoring_elements":"0.45945","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00232","scoring_system":"epss","scoring_elements":"0.45888","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00232","scoring_system":"epss","scoring_elements":"0.45788","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00232","scoring_system":"epss","scoring_elements":"0.45985","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00232","scoring_system":"epss","scoring_elements":"0.45933","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00232","scoring_system":"epss","scoring_elements":"0.45988","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00232","scoring_system":"epss","scoring_elements":"0.46009","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00232","scoring_system":"epss","scoring_elements":"0.45981","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00232","scoring_system":"epss","scoring_elements":"0.46043","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00232","scoring_system":"epss","scoring_elements":"0.4604","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-0145"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0145","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0145"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2049531","reference_id":"2049531","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2049531"},{"reference_url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00561.html","reference_id":"intel-sa-00561.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:21:56Z/"}],"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00561.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220210-0009/","reference_id":"ntap-20220210-0009","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:21:56Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220210-0009/"},{"reference_url":"https://usn.ubuntu.com/5486-1/","reference_id":"USN-5486-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5486-1/"},{"reference_url":"https://usn.ubuntu.com/5535-1/","reference_id":"USN-5535-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5535-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925523?format=json","purl":"pkg:deb/debian/intel-microcode@3.20220207.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20220207.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925522?format=json","purl":"pkg:deb/debian/intel-microcode@3.20220207.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20220207.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2021-0145"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-efqu-9zy2-xyh5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96158?format=json","vulnerability_id":"VCID-eh71-uhnv-fqeb","summary":"Improper handling of physical or environmental conditions in some Intel(R) Processors may allow an authenticated user to enable denial of service via local access.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-39355","reference_id":"","reference_type":"","scores":[{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08648","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08597","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.0861","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.0856","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08503","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08539","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08593","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.0851","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08583","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08604","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.086","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.0858","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08563","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08455","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08442","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-39355"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39355","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39355"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805","reference_id":"1095805","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805"},{"reference_url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01228.html","reference_id":"intel-sa-01228.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"5.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T15:12:11Z/"}],"url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01228.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925539?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925538?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925540?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250211.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2024-39355"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-eh71-uhnv-fqeb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4395?format=json","vulnerability_id":"VCID-ejhc-6yqt-gkgv","summary":"x86: Indirect Target Selection","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28956.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28956.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-28956","reference_id":"","reference_type":"","scores":[{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25706","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25764","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25806","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25577","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.2565","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25696","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45428","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45264","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45328","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45554","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45504","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45419","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45368","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45505","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.4551","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45557","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-28956"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28956","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28956"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172","reference_id":"1105172","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105193","reference_id":"1105193","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105193"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366125","reference_id":"2366125","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366125"},{"reference_url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01153.html","reference_id":"intel-sa-01153.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"5.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-14T14:42:03Z/"}],"url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01153.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10101","reference_id":"RHSA-2025:10101","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10101"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10102","reference_id":"RHSA-2025:10102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10103","reference_id":"RHSA-2025:10103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10107","reference_id":"RHSA-2025:10107","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10108","reference_id":"RHSA-2025:10108","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10109","reference_id":"RHSA-2025:10109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10111","reference_id":"RHSA-2025:10111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10126","reference_id":"RHSA-2025:10126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10162","reference_id":"RHSA-2025:10162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10162"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10991","reference_id":"RHSA-2025:10991","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10991"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13962","reference_id":"RHSA-2025:13962","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13962"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19962","reference_id":"RHSA-2025:19962","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19962"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:20095","reference_id":"RHSA-2025:20095","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:20095"},{"reference_url":"https://usn.ubuntu.com/7535-1/","reference_id":"USN-7535-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7535-1/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-469.html","reference_id":"XSA-469","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-469.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925553?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250512.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250512.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925552?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250512.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250512.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925554?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250512.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250512.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2024-28956","XSA-469"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ejhc-6yqt-gkgv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95973?format=json","vulnerability_id":"VCID-ejsj-eyej-huc6","summary":"Improper conditions check in some Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX may allow a privileged user to potentially enable escalation of privilege via local access.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-23918","reference_id":"","reference_type":"","scores":[{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18896","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21133","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.2119","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21188","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21165","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21067","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21554","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.2131","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21388","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21449","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.2146","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21421","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21366","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21362","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.2137","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21337","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-23918"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23918","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23918"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087532","reference_id":"1087532","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087532"},{"reference_url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01079.html","reference_id":"intel-sa-01079.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"value":"8.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-14T15:11:34Z/"}],"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01079.html"},{"reference_url":"https://usn.ubuntu.com/7149-1/","reference_id":"USN-7149-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7149-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925547?format=json","purl":"pkg:deb/debian/intel-microcode@3.20241112.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20241112.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925546?format=json","purl":"pkg:deb/debian/intel-microcode@3.20241112.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20241112.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925548?format=json","purl":"pkg:deb/debian/intel-microcode@3.20241112.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20241112.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2024-23918"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ejsj-eyej-huc6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79441?format=json","vulnerability_id":"VCID-et7e-7pq2-eubr","summary":"hw: cpu: information disclosure in Intel® Xeon® Scalable Processors","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33117.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33117.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-33117","reference_id":"","reference_type":"","scores":[{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33276","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33411","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.32983","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33277","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33125","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33108","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33031","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.32913","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33442","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33281","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33324","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33358","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33361","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33319","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33296","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33336","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33312","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-33117"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33117","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33117"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2086729","reference_id":"2086729","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2086729"},{"reference_url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00586.html","reference_id":"intel-sa-00586.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:51Z/"}],"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00586.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220818-0001/","reference_id":"ntap-20220818-0001","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:51Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220818-0001/"},{"reference_url":"https://usn.ubuntu.com/5486-1/","reference_id":"USN-5486-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5486-1/"},{"reference_url":"https://usn.ubuntu.com/5535-1/","reference_id":"USN-5535-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5535-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925523?format=json","purl":"pkg:deb/debian/intel-microcode@3.20220207.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20220207.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925522?format=json","purl":"pkg:deb/debian/intel-microcode@3.20220207.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20220207.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2021-33117"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-et7e-7pq2-eubr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96574?format=json","vulnerability_id":"VCID-f859-13vd-7uef","summary":"Out-of-bounds write in the memory subsystem for some Intel(R) Xeon(R) 6 processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-26403","reference_id":"","reference_type":"","scores":[{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02053","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02101","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02122","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02098","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02084","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02079","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02108","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02103","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02104","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02656","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02666","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02678","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02568","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05188","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.0515","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05139","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-26403"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26403","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26403"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983","reference_id":"1110983","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983"},{"reference_url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01367.html","reference_id":"intel-sa-01367.html","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N"},{"value":"4.5","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-13T15:04:08Z/"}],"url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01367.html"},{"reference_url":"https://usn.ubuntu.com/7866-1/","reference_id":"USN-7866-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7866-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925556?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250812.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250812.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925555?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250812.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250812.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925558?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250812.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250812.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925557?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250812.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250812.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2025-26403"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f859-13vd-7uef"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79698?format=json","vulnerability_id":"VCID-f85r-c2em-vkhg","summary":"microcode: Out of bounds read for some Intel Atom processors","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33120.json","reference_id":"","reference_type":"","scores":[{"value":"3.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33120.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-33120","reference_id":"","reference_type":"","scores":[{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71644","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71651","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71789","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71766","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71772","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71756","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71669","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71642","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71682","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71692","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71716","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71699","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71681","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71724","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.7173","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71712","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71761","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-33120"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33120","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33120"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2049558","reference_id":"2049558","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2049558"},{"reference_url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00589.html","reference_id":"intel-sa-00589.html","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:21:22Z/"}],"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00589.html"},{"reference_url":"https://usn.ubuntu.com/5486-1/","reference_id":"USN-5486-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5486-1/"},{"reference_url":"https://usn.ubuntu.com/5535-1/","reference_id":"USN-5535-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5535-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925523?format=json","purl":"pkg:deb/debian/intel-microcode@3.20220207.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20220207.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925522?format=json","purl":"pkg:deb/debian/intel-microcode@3.20220207.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20220207.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2021-33120"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f85r-c2em-vkhg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79152?format=json","vulnerability_id":"VCID-f91c-4ty9-h7a2","summary":"hw: cpu: Intel: Stale Data Read from legacy xAPIC vulnerability","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21233.json","reference_id":"","reference_type":"","scores":[{"value":"6.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21233.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21233","reference_id":"","reference_type":"","scores":[{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22519","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23199","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23336","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23125","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23249","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23271","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23233","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23175","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30218","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30172","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30236","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34734","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34644","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34514","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34586","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34753","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21233"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21233","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21233"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115640","reference_id":"2115640","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115640"},{"reference_url":"https://security.archlinux.org/AVG-2795","reference_id":"AVG-2795","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2795"},{"reference_url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00657.html","reference_id":"intel-sa-00657.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:24Z/"}],"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00657.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/04/msg00000.html","reference_id":"msg00000.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:24Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/04/msg00000.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220923-0002/","reference_id":"ntap-20220923-0002","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:24Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220923-0002/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5937","reference_id":"RHSA-2022:5937","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5937"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5939","reference_id":"RHSA-2022:5939","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5939"},{"reference_url":"https://usn.ubuntu.com/5612-1/","reference_id":"USN-5612-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5612-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925528?format=json","purl":"pkg:deb/debian/intel-microcode@3.20220809.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20220809.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925527?format=json","purl":"pkg:deb/debian/intel-microcode@3.20230214.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20230214.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2022-21233"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f91c-4ty9-h7a2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78204?format=json","vulnerability_id":"VCID-fe46-8fs3-p3fd","summary":"hw: Intel: Unauthorized error injection in Intel SGX or Intel TDX","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41804.json","reference_id":"","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41804.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-41804","reference_id":"","reference_type":"","scores":[{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03982","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0413","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04011","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04017","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04035","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04006","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0399","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03961","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03941","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03953","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04075","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0409","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04108","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04141","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04102","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03998","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-41804"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40982","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40982"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41804","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41804"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23908","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23908"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043305","reference_id":"1043305","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043305"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2230685","reference_id":"2230685","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2230685"},{"reference_url":"https://www.debian.org/security/2023/dsa-5474","reference_id":"dsa-5474","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T13:34:03Z/"}],"url":"https://www.debian.org/security/2023/dsa-5474"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/","reference_id":"HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T13:34:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/"},{"reference_url":"http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00837.html","reference_id":"intel-sa-00837.html","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T13:34:03Z/"}],"url":"http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00837.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html","reference_id":"msg00026.html","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T13:34:03Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230915-0003/","reference_id":"ntap-20230915-0003","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T13:34:03Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230915-0003/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/","reference_id":"OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T13:34:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/"},{"reference_url":"https://usn.ubuntu.com/6286-1/","reference_id":"USN-6286-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6286-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925530?format=json","purl":"pkg:deb/debian/intel-microcode@3.20230808.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20230808.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925529?format=json","purl":"pkg:deb/debian/intel-microcode@3.20230808.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20230808.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925531?format=json","purl":"pkg:deb/debian/intel-microcode@3.20230808.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20230808.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2022-41804"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fe46-8fs3-p3fd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80232?format=json","vulnerability_id":"VCID-g5ab-2m1x-yqat","summary":"hw: improper isolation of shared resources in some Intel Processors","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-24511.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-24511.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-24511","reference_id":"","reference_type":"","scores":[{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19504","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19494","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19396","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19404","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19418","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19316","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19306","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19639","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19687","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19408","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19486","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19538","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19541","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19436","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19731","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.1981","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19826","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-24511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24489","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24489"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24513"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1962702","reference_id":"1962702","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1962702"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989615","reference_id":"989615","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989615"},{"reference_url":"https://security.archlinux.org/ASA-202106-34","reference_id":"ASA-202106-34","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-34"},{"reference_url":"https://security.archlinux.org/AVG-2051","reference_id":"AVG-2051","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2051"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2299","reference_id":"RHSA-2021:2299","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2299"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2300","reference_id":"RHSA-2021:2300","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2300"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2301","reference_id":"RHSA-2021:2301","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2301"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2302","reference_id":"RHSA-2021:2302","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2302"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2303","reference_id":"RHSA-2021:2303","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2303"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2304","reference_id":"RHSA-2021:2304","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2304"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2305","reference_id":"RHSA-2021:2305","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2306","reference_id":"RHSA-2021:2306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2307","reference_id":"RHSA-2021:2307","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2307"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2308","reference_id":"RHSA-2021:2308","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2308"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3027","reference_id":"RHSA-2021:3027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3028","reference_id":"RHSA-2021:3028","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3028"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3029","reference_id":"RHSA-2021:3029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3176","reference_id":"RHSA-2021:3176","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3176"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3255","reference_id":"RHSA-2021:3255","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3255"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3317","reference_id":"RHSA-2021:3317","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3317"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3322","reference_id":"RHSA-2021:3322","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3322"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3323","reference_id":"RHSA-2021:3323","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3323"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3364","reference_id":"RHSA-2021:3364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3364"},{"reference_url":"https://usn.ubuntu.com/4985-1/","reference_id":"USN-4985-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4985-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925520?format=json","purl":"pkg:deb/debian/intel-microcode@3.20210608.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20210608.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2020-24511"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g5ab-2m1x-yqat"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79736?format=json","vulnerability_id":"VCID-gfba-7dea-myhj","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-0549.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-0549.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-0549","reference_id":"","reference_type":"","scores":[{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.2479","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24766","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24725","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24717","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24695","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24634","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24623","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24866","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24905","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24679","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24747","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24794","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24807","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24709","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25783","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.2584","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.2589","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-0549"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0548","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0549","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0549"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1788788","reference_id":"1788788","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1788788"},{"reference_url":"https://security.archlinux.org/ASA-202006-10","reference_id":"ASA-202006-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202006-10"},{"reference_url":"https://security.archlinux.org/AVG-1187","reference_id":"AVG-1187","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1187"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2431","reference_id":"RHSA-2020:2431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2432","reference_id":"RHSA-2020:2432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2433","reference_id":"RHSA-2020:2433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2677","reference_id":"RHSA-2020:2677","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2677"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2679","reference_id":"RHSA-2020:2679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2680","reference_id":"RHSA-2020:2680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2706","reference_id":"RHSA-2020:2706","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2706"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2707","reference_id":"RHSA-2020:2707","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2707"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2757","reference_id":"RHSA-2020:2757","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2757"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2758","reference_id":"RHSA-2020:2758","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2758"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2771","reference_id":"RHSA-2020:2771","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2771"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2842","reference_id":"RHSA-2020:2842","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2842"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3027","reference_id":"RHSA-2021:3027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3028","reference_id":"RHSA-2021:3028","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3028"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3029","reference_id":"RHSA-2021:3029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3176","reference_id":"RHSA-2021:3176","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3176"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3255","reference_id":"RHSA-2021:3255","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3255"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3317","reference_id":"RHSA-2021:3317","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3317"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3322","reference_id":"RHSA-2021:3322","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3322"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3323","reference_id":"RHSA-2021:3323","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3323"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3364","reference_id":"RHSA-2021:3364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3364"},{"reference_url":"https://usn.ubuntu.com/4385-1/","reference_id":"USN-4385-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4385-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925519?format=json","purl":"pkg:deb/debian/intel-microcode@3.20200609.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20200609.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2020-0549"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gfba-7dea-myhj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96528?format=json","vulnerability_id":"VCID-gmr7-umz8-9fhm","summary":"Insufficient granularity of access control in the OOB-MSM for some Intel(R) Xeon(R) 6 Scalable processors may allow a privileged user to potentially enable escalation of privilege via adjacent access.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-22839","reference_id":"","reference_type":"","scores":[{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05742","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05666","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05686","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.0573","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05735","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05706","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05699","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05738","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05765","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06586","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06337","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06364","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06436","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06459","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06168","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.0632","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-22839"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22839","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22839"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983","reference_id":"1110983","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983"},{"reference_url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01310.html","reference_id":"intel-sa-01310.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:L"},{"value":"7.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:A/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-12T19:09:05Z/"}],"url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01310.html"},{"reference_url":"https://usn.ubuntu.com/7866-1/","reference_id":"USN-7866-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7866-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925556?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250812.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250812.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925555?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250812.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250812.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925558?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250812.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250812.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925557?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250812.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250812.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2025-22839"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gmr7-umz8-9fhm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47200?format=json","vulnerability_id":"VCID-grm7-9n9w-ffc2","summary":"Multiple vulnerabilities have been discovered in intel-microcode, the worst of which can lead to privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0127.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0127.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-0127","reference_id":"","reference_type":"","scores":[{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22155","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22313","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21958","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22146","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22006","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21993","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21978","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21885","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22357","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22141","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22224","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22278","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22299","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22257","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22197","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22199","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22192","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-0127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0127","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0127"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2049528","reference_id":"2049528","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2049528"},{"reference_url":"https://security.gentoo.org/glsa/202402-22","reference_id":"GLSA-202402-22","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-22"},{"reference_url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html","reference_id":"intel-sa-00532.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:21:55Z/"}],"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220210-0008/","reference_id":"ntap-20220210-0008","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:21:55Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220210-0008/"},{"reference_url":"https://usn.ubuntu.com/5486-1/","reference_id":"USN-5486-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5486-1/"},{"reference_url":"https://usn.ubuntu.com/5535-1/","reference_id":"USN-5535-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5535-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925523?format=json","purl":"pkg:deb/debian/intel-microcode@3.20220207.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20220207.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925522?format=json","purl":"pkg:deb/debian/intel-microcode@3.20220207.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20220207.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2021-0127"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-grm7-9n9w-ffc2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69671?format=json","vulnerability_id":"VCID-j4ak-hjn5-guat","summary":"microcode_ctl: Exposure of sensitive information","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-20623.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-20623.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-20623","reference_id":"","reference_type":"","scores":[{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26425","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26569","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26561","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26489","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26355","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26838","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26879","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26665","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26734","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26784","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26788","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26743","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26686","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26695","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26666","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26626","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-20623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20623"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172","reference_id":"1105172","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366133","reference_id":"2366133","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366133"},{"reference_url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01247.html","reference_id":"intel-sa-01247.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"5.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-14T15:10:08Z/"}],"url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01247.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10101","reference_id":"RHSA-2025:10101","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10101"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10102","reference_id":"RHSA-2025:10102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10103","reference_id":"RHSA-2025:10103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10107","reference_id":"RHSA-2025:10107","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10108","reference_id":"RHSA-2025:10108","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10109","reference_id":"RHSA-2025:10109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10111","reference_id":"RHSA-2025:10111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10126","reference_id":"RHSA-2025:10126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10162","reference_id":"RHSA-2025:10162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10162"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10991","reference_id":"RHSA-2025:10991","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10991"},{"reference_url":"https://usn.ubuntu.com/7535-1/","reference_id":"USN-7535-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7535-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925553?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250512.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250512.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925552?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250512.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250512.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925554?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250512.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250512.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2025-20623"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j4ak-hjn5-guat"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96511?format=json","vulnerability_id":"VCID-j6j9-vj4t-bfa6","summary":"Improper buffer restrictions for some Intel(R) Xeon(R) Processor firmware with SGX enabled may allow a privileged user to potentially enable escalation of privilege via local access.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-20053","reference_id":"","reference_type":"","scores":[{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02053","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02101","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02122","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02098","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02084","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02079","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02108","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02103","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02104","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02656","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02666","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02678","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02568","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05188","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.0515","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05139","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-20053"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20053","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20053"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983","reference_id":"1110983","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983"},{"reference_url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01313.html","reference_id":"intel-sa-01313.html","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N"},{"value":"7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-12T18:24:39Z/"}],"url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01313.html"},{"reference_url":"https://usn.ubuntu.com/7866-1/","reference_id":"USN-7866-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7866-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925556?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250812.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250812.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925555?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250812.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250812.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925558?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250812.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250812.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925557?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250812.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250812.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2025-20053"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j6j9-vj4t-bfa6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80802?format=json","vulnerability_id":"VCID-jezv-tu74-b3ae","summary":"hw: Information disclosure issue in Intel SGX via RAPL interface","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8695.json","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8695.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-8695","reference_id":"","reference_type":"","scores":[{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35081","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35282","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.3531","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35191","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35236","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35262","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35265","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35229","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35205","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35244","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.3523","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35181","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34946","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34928","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34838","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.3471","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34783","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-8695"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8695","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8695"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1828583","reference_id":"1828583","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1828583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5083","reference_id":"RHSA-2020:5083","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5083"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5085","reference_id":"RHSA-2020:5085","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5085"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5181","reference_id":"RHSA-2020:5181","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5181"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5182","reference_id":"RHSA-2020:5182","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5182"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5183","reference_id":"RHSA-2020:5183","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5183"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5185","reference_id":"RHSA-2020:5185","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5185"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5186","reference_id":"RHSA-2020:5186","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5186"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5188","reference_id":"RHSA-2020:5188","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5188"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5190","reference_id":"RHSA-2020:5190","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5190"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5369","reference_id":"RHSA-2020:5369","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5369"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3027","reference_id":"RHSA-2021:3027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3028","reference_id":"RHSA-2021:3028","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3028"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3029","reference_id":"RHSA-2021:3029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3176","reference_id":"RHSA-2021:3176","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3176"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3255","reference_id":"RHSA-2021:3255","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3255"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3317","reference_id":"RHSA-2021:3317","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3317"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3322","reference_id":"RHSA-2021:3322","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3322"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3323","reference_id":"RHSA-2021:3323","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3323"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3364","reference_id":"RHSA-2021:3364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3364"},{"reference_url":"https://usn.ubuntu.com/4628-1/","reference_id":"USN-4628-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4628-1/"},{"reference_url":"https://usn.ubuntu.com/4628-3/","reference_id":"USN-4628-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4628-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925521?format=json","purl":"pkg:deb/debian/intel-microcode@3.20201110.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20201110.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2020-8695"],"risk_score":2.3,"exploitability":"0.5","weighted_severity":"4.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jezv-tu74-b3ae"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76369?format=json","vulnerability_id":"VCID-jqnr-61tn-kben","summary":"intel-microcode: Race conditions in some Intel(R) Processors","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-45733.json","reference_id":"","reference_type":"","scores":[{"value":"2.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-45733.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-45733","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03292","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03359","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03342","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03387","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03339","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03302","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03311","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03315","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03336","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03294","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03266","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03245","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03221","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03231","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03352","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03343","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-45733"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45733","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45733"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2292296","reference_id":"2292296","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2292296"},{"reference_url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01051.html","reference_id":"intel-sa-01051.html","reference_type":"","scores":[{"value":"2.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-24T16:02:23Z/"}],"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01051.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9401","reference_id":"RHSA-2024:9401","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9401"},{"reference_url":"https://usn.ubuntu.com/6797-1/","reference_id":"USN-6797-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6797-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925544?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240514.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240514.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925543?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240514.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240514.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925545?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240514.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240514.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2023-45733"],"risk_score":1.2,"exploitability":"0.5","weighted_severity":"2.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jqnr-61tn-kben"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80798?format=json","vulnerability_id":"VCID-juy7-j265-cfax","summary":"hw: Vector Register Leakage-Active","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8696.json","reference_id":"","reference_type":"","scores":[{"value":"2.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8696.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-8696","reference_id":"","reference_type":"","scores":[{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47512","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.475","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.4752","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47435","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47541","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47561","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.4751","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47565","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47585","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.4757","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47628","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.4762","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47572","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47564","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-8696"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8696","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8696"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890355","reference_id":"1890355","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890355"},{"reference_url":"https://security.archlinux.org/ASA-202102-34","reference_id":"ASA-202102-34","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202102-34"},{"reference_url":"https://security.archlinux.org/AVG-1588","reference_id":"AVG-1588","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1588"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5083","reference_id":"RHSA-2020:5083","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5083"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5084","reference_id":"RHSA-2020:5084","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5084"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5085","reference_id":"RHSA-2020:5085","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5085"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5181","reference_id":"RHSA-2020:5181","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5181"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5182","reference_id":"RHSA-2020:5182","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5182"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5183","reference_id":"RHSA-2020:5183","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5183"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5184","reference_id":"RHSA-2020:5184","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5184"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5185","reference_id":"RHSA-2020:5185","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5185"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5186","reference_id":"RHSA-2020:5186","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5186"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5188","reference_id":"RHSA-2020:5188","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5188"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5189","reference_id":"RHSA-2020:5189","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5189"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5190","reference_id":"RHSA-2020:5190","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5190"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5369","reference_id":"RHSA-2020:5369","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5369"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3027","reference_id":"RHSA-2021:3027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3028","reference_id":"RHSA-2021:3028","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3028"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3029","reference_id":"RHSA-2021:3029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3176","reference_id":"RHSA-2021:3176","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3176"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3255","reference_id":"RHSA-2021:3255","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3255"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3317","reference_id":"RHSA-2021:3317","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3317"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3322","reference_id":"RHSA-2021:3322","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3322"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3323","reference_id":"RHSA-2021:3323","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3323"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3364","reference_id":"RHSA-2021:3364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3364"},{"reference_url":"https://usn.ubuntu.com/4628-1/","reference_id":"USN-4628-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4628-1/"},{"reference_url":"https://usn.ubuntu.com/4628-3/","reference_id":"USN-4628-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4628-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925521?format=json","purl":"pkg:deb/debian/intel-microcode@3.20201110.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20201110.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2020-8696"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-juy7-j265-cfax"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79341?format=json","vulnerability_id":"VCID-jwaz-e1v9-uyep","summary":"hw: cpu: Incomplete cleanup in specific special register read operations (aka SRBDS update)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21127.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21127.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21127","reference_id":"","reference_type":"","scores":[{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.5116","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51197","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51185","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51142","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51193","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51238","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51216","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51201","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00466","scoring_system":"epss","scoring_elements":"0.6442","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00466","scoring_system":"epss","scoring_elements":"0.64476","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00466","scoring_system":"epss","scoring_elements":"0.64431","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00466","scoring_system":"epss","scoring_elements":"0.64424","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00466","scoring_system":"epss","scoring_elements":"0.64444","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00466","scoring_system":"epss","scoring_elements":"0.64457","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00466","scoring_system":"epss","scoring_elements":"0.64456","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00466","scoring_system":"epss","scoring_elements":"0.64429","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/06/16/1","reference_id":"1","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:38Z/"}],"url":"http://www.openwall.com/lists/oss-security/2022/06/16/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2090243","reference_id":"2090243","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2090243"},{"reference_url":"https://www.debian.org/security/2022/dsa-5178","reference_id":"dsa-5178","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:38Z/"}],"url":"https://www.debian.org/security/2022/dsa-5178"},{"reference_url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html","reference_id":"intel-sa-00615.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:38Z/"}],"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220624-0008/","reference_id":"ntap-20220624-0008","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:38Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220624-0008/"},{"reference_url":"https://usn.ubuntu.com/5486-1/","reference_id":"USN-5486-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5486-1/"},{"reference_url":"https://usn.ubuntu.com/5535-1/","reference_id":"USN-5535-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5535-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925525?format=json","purl":"pkg:deb/debian/intel-microcode@3.20220510.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20220510.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925524?format=json","purl":"pkg:deb/debian/intel-microcode@3.20220510.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20220510.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2022-21127"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jwaz-e1v9-uyep"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4186?format=json","vulnerability_id":"VCID-k45n-139y-pyeq","summary":"Microarchitectural Data Sampling speculative side channel","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11091.json","reference_id":"","reference_type":"","scores":[{"value":"3.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11091.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-11091","reference_id":"","reference_type":"","scores":[{"value":"0.01697","scoring_system":"epss","scoring_elements":"0.82207","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01697","scoring_system":"epss","scoring_elements":"0.8222","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01697","scoring_system":"epss","scoring_elements":"0.8224","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01697","scoring_system":"epss","scoring_elements":"0.82236","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01697","scoring_system":"epss","scoring_elements":"0.82262","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01697","scoring_system":"epss","scoring_elements":"0.8227","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01697","scoring_system":"epss","scoring_elements":"0.82289","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01697","scoring_system":"epss","scoring_elements":"0.82282","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01697","scoring_system":"epss","scoring_elements":"0.82276","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01697","scoring_system":"epss","scoring_elements":"0.82312","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01697","scoring_system":"epss","scoring_elements":"0.82314","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01697","scoring_system":"epss","scoring_elements":"0.82335","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01697","scoring_system":"epss","scoring_elements":"0.82346","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01697","scoring_system":"epss","scoring_elements":"0.8235","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01697","scoring_system":"epss","scoring_elements":"0.82368","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01697","scoring_system":"epss","scoring_elements":"0.82389","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-11091"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1705312","reference_id":"1705312","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1705312"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929129","reference_id":"929129","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929129"},{"reference_url":"https://security.gentoo.org/glsa/202003-56","reference_id":"GLSA-202003-56","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-56"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1155","reference_id":"RHSA-2019:1155","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1155"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1167","reference_id":"RHSA-2019:1167","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1167"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1168","reference_id":"RHSA-2019:1168","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1168"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1169","reference_id":"RHSA-2019:1169","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1169"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1170","reference_id":"RHSA-2019:1170","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1170"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1171","reference_id":"RHSA-2019:1171","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1171"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1172","reference_id":"RHSA-2019:1172","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1172"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1174","reference_id":"RHSA-2019:1174","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1174"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1175","reference_id":"RHSA-2019:1175","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1175"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1176","reference_id":"RHSA-2019:1176","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1176"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1177","reference_id":"RHSA-2019:1177","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1177"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1178","reference_id":"RHSA-2019:1178","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1178"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1179","reference_id":"RHSA-2019:1179","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1179"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1180","reference_id":"RHSA-2019:1180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1181","reference_id":"RHSA-2019:1181","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1181"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1182","reference_id":"RHSA-2019:1182","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1182"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1183","reference_id":"RHSA-2019:1183","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1183"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1184","reference_id":"RHSA-2019:1184","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1184"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1185","reference_id":"RHSA-2019:1185","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1185"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1186","reference_id":"RHSA-2019:1186","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1186"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1187","reference_id":"RHSA-2019:1187","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1187"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1188","reference_id":"RHSA-2019:1188","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1188"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1189","reference_id":"RHSA-2019:1189","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1189"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1190","reference_id":"RHSA-2019:1190","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1190"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1193","reference_id":"RHSA-2019:1193","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1193"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1194","reference_id":"RHSA-2019:1194","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1194"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1195","reference_id":"RHSA-2019:1195","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1195"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1196","reference_id":"RHSA-2019:1196","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1196"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1197","reference_id":"RHSA-2019:1197","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1197"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1198","reference_id":"RHSA-2019:1198","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1198"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1199","reference_id":"RHSA-2019:1199","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1199"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1200","reference_id":"RHSA-2019:1200","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1200"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1201","reference_id":"RHSA-2019:1201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1202","reference_id":"RHSA-2019:1202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1203","reference_id":"RHSA-2019:1203","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1203"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1204","reference_id":"RHSA-2019:1204","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1204"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1205","reference_id":"RHSA-2019:1205","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1205"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1206","reference_id":"RHSA-2019:1206","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1206"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1207","reference_id":"RHSA-2019:1207","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1207"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1208","reference_id":"RHSA-2019:1208","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1208"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1209","reference_id":"RHSA-2019:1209","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1209"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1455","reference_id":"RHSA-2019:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1455"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2553","reference_id":"RHSA-2019:2553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2553"},{"reference_url":"https://usn.ubuntu.com/3977-1/","reference_id":"USN-3977-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3977-1/"},{"reference_url":"https://usn.ubuntu.com/3977-2/","reference_id":"USN-3977-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3977-2/"},{"reference_url":"https://usn.ubuntu.com/3977-3/","reference_id":"USN-3977-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3977-3/"},{"reference_url":"https://usn.ubuntu.com/3978-1/","reference_id":"USN-3978-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3978-1/"},{"reference_url":"https://usn.ubuntu.com/3979-1/","reference_id":"USN-3979-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3979-1/"},{"reference_url":"https://usn.ubuntu.com/3980-1/","reference_id":"USN-3980-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3980-1/"},{"reference_url":"https://usn.ubuntu.com/3980-2/","reference_id":"USN-3980-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3980-2/"},{"reference_url":"https://usn.ubuntu.com/3981-1/","reference_id":"USN-3981-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3981-1/"},{"reference_url":"https://usn.ubuntu.com/3981-2/","reference_id":"USN-3981-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3981-2/"},{"reference_url":"https://usn.ubuntu.com/3982-1/","reference_id":"USN-3982-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3982-1/"},{"reference_url":"https://usn.ubuntu.com/3982-2/","reference_id":"USN-3982-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3982-2/"},{"reference_url":"https://usn.ubuntu.com/3983-1/","reference_id":"USN-3983-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3983-1/"},{"reference_url":"https://usn.ubuntu.com/3983-2/","reference_id":"USN-3983-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3983-2/"},{"reference_url":"https://usn.ubuntu.com/3984-1/","reference_id":"USN-3984-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3984-1/"},{"reference_url":"https://usn.ubuntu.com/3985-1/","reference_id":"USN-3985-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3985-1/"},{"reference_url":"https://usn.ubuntu.com/3985-2/","reference_id":"USN-3985-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3985-2/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-297.html","reference_id":"XSA-297","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-297.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925515?format=json","purl":"pkg:deb/debian/intel-microcode@3.20190514.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20190514.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2019-11091"],"risk_score":1.7,"exploitability":"0.5","weighted_severity":"3.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k45n-139y-pyeq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80228?format=json","vulnerability_id":"VCID-k9bk-q1ds-6ke5","summary":"hw: vt-d related privilege escalation","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-24489.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-24489.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-24489","reference_id":"","reference_type":"","scores":[{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21075","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21142","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21071","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20944","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20947","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20914","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21228","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21281","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21032","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21114","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21175","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21185","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21091","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21082","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21093","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21914","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21841","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-24489"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24489","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24489"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24513"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1962650","reference_id":"1962650","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1962650"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989615","reference_id":"989615","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989615"},{"reference_url":"https://security.archlinux.org/ASA-202106-34","reference_id":"ASA-202106-34","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-34"},{"reference_url":"https://security.archlinux.org/AVG-2051","reference_id":"AVG-2051","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2051"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2299","reference_id":"RHSA-2021:2299","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2299"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2300","reference_id":"RHSA-2021:2300","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2300"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2301","reference_id":"RHSA-2021:2301","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2301"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2302","reference_id":"RHSA-2021:2302","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2302"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2303","reference_id":"RHSA-2021:2303","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2303"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2304","reference_id":"RHSA-2021:2304","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2304"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2305","reference_id":"RHSA-2021:2305","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2306","reference_id":"RHSA-2021:2306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2307","reference_id":"RHSA-2021:2307","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2307"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2308","reference_id":"RHSA-2021:2308","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2308"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2519","reference_id":"RHSA-2021:2519","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2519"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2522","reference_id":"RHSA-2021:2522","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2522"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3027","reference_id":"RHSA-2021:3027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3028","reference_id":"RHSA-2021:3028","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3028"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3029","reference_id":"RHSA-2021:3029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3176","reference_id":"RHSA-2021:3176","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3176"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3255","reference_id":"RHSA-2021:3255","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3255"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3317","reference_id":"RHSA-2021:3317","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3317"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3322","reference_id":"RHSA-2021:3322","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3322"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3323","reference_id":"RHSA-2021:3323","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3323"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3364","reference_id":"RHSA-2021:3364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3364"},{"reference_url":"https://usn.ubuntu.com/4985-1/","reference_id":"USN-4985-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4985-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925520?format=json","purl":"pkg:deb/debian/intel-microcode@3.20210608.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20210608.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2020-24489"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k9bk-q1ds-6ke5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96529?format=json","vulnerability_id":"VCID-kha2-8ez1-gfhr","summary":"Sequence of processor instructions leads to unexpected behavior for some Intel(R) Xeon(R) 6 Scalable processors may allow an authenticated user to potentially enable escalation of privilege via local access","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-22840","reference_id":"","reference_type":"","scores":[{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.014","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01407","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01417","published_at":"2026-04-29T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00775","published_at":"2026-04-09T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00769","published_at":"2026-04-11T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00762","published_at":"2026-04-12T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.0078","published_at":"2026-04-08T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00781","published_at":"2026-04-07T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00763","published_at":"2026-04-16T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00941","published_at":"2026-04-26T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00883","published_at":"2026-04-18T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00933","published_at":"2026-04-21T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00937","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-22840"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22840","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22840"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983","reference_id":"1110983","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110983"},{"reference_url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01308.html","reference_id":"intel-sa-01308.html","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L"},{"value":"5.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-14T03:55:09Z/"}],"url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01308.html"},{"reference_url":"https://usn.ubuntu.com/7866-1/","reference_id":"USN-7866-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7866-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925556?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250812.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250812.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925555?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250812.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250812.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925558?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250812.1~deb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250812.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925557?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250812.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250812.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2025-22840"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kha2-8ez1-gfhr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95974?format=json","vulnerability_id":"VCID-mekt-8gm1-33ej","summary":"Observable discrepancy in RAPL interface for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-23984","reference_id":"","reference_type":"","scores":[{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11085","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.1112","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11075","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11011","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10947","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11217","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11279","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11093","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11172","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11228","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11238","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11206","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.1118","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11045","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11054","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11185","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-23984"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23984","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23984"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1081363","reference_id":"1081363","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1081363"},{"reference_url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01103.html","reference_id":"intel-sa-01103.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N"},{"value":"6.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T17:27:46Z/"}],"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01103.html"},{"reference_url":"https://usn.ubuntu.com/7033-1/","reference_id":"USN-7033-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7033-1/"},{"reference_url":"https://usn.ubuntu.com/7149-1/","reference_id":"USN-7149-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7149-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925550?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240910.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240910.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925549?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240910.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240910.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925551?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240910.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240910.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2024-23984"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mekt-8gm1-33ej"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95985?format=json","vulnerability_id":"VCID-mu4u-d5mc-kbgk","summary":"Protection mechanism failure in some 3rd, 4th, and 5th Generation Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-24980","reference_id":"","reference_type":"","scores":[{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17153","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.1729","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17266","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17205","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17065","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17508","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17555","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17335","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17427","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17488","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.175","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17453","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.174","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17342","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.1735","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17382","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-24980"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24980","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24980"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078742","reference_id":"1078742","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078742"},{"reference_url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01100.html","reference_id":"intel-sa-01100.html","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N"},{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:L/VI:H/VA:N/SC:L/SI:H/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-14T13:59:03Z/"}],"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01100.html"},{"reference_url":"https://usn.ubuntu.com/6967-1/","reference_id":"USN-6967-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6967-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925541?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925542?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2024-24980"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mu4u-d5mc-kbgk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71862?format=json","vulnerability_id":"VCID-npgb-p786-d3fe","summary":"microcode_ctl: Improper input validation in UEFI firmware","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43758.json","reference_id":"","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43758.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-43758","reference_id":"","reference_type":"","scores":[{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05807","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06186","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06064","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06068","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06088","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05843","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05838","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05877","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05903","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05884","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05874","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05867","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05832","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05997","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06028","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-43758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43758"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805","reference_id":"1095805","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345416","reference_id":"2345416","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345416"},{"reference_url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html","reference_id":"intel-sa-01139.html","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-13T20:21:25Z/"}],"url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925539?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925538?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925540?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250211.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2023-43758"],"risk_score":3.7,"exploitability":"0.5","weighted_severity":"7.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-npgb-p786-d3fe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4194?format=json","vulnerability_id":"VCID-ns7u-fmmr-5ba4","summary":"TSX Asynchronous Abort speculative side channel","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11135.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11135.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-11135","reference_id":"","reference_type":"","scores":[{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54573","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54558","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54938","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54908","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54958","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54957","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54969","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54951","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54928","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54966","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54947","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54907","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54842","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54912","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54917","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54865","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-11135"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0154","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0154"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0155","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0155"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11135","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11135"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11139","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11139"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17349","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17349"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17350","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17350"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18420","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18421"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18422","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18422"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18423","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18423"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18424","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18424"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18425","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18425"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19577","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19577"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19578","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19578"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19579","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19579"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19580","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19580"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19581","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19583","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19583"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1753062","reference_id":"1753062","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1753062"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947944","reference_id":"947944","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947944"},{"reference_url":"https://security.archlinux.org/ASA-201911-14","reference_id":"ASA-201911-14","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201911-14"},{"reference_url":"https://security.archlinux.org/AVG-1068","reference_id":"AVG-1068","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1068"},{"reference_url":"https://security.gentoo.org/glsa/202003-56","reference_id":"GLSA-202003-56","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-56"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3832","reference_id":"RHSA-2019:3832","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3832"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3833","reference_id":"RHSA-2019:3833","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3833"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3834","reference_id":"RHSA-2019:3834","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3834"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3835","reference_id":"RHSA-2019:3835","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3835"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3836","reference_id":"RHSA-2019:3836","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3836"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3837","reference_id":"RHSA-2019:3837","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3837"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3838","reference_id":"RHSA-2019:3838","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3838"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3839","reference_id":"RHSA-2019:3839","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3839"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3840","reference_id":"RHSA-2019:3840","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3840"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3841","reference_id":"RHSA-2019:3841","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3841"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3842","reference_id":"RHSA-2019:3842","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3842"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3843","reference_id":"RHSA-2019:3843","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3843"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3844","reference_id":"RHSA-2019:3844","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3844"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3860","reference_id":"RHSA-2019:3860","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3860"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3936","reference_id":"RHSA-2019:3936","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3936"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0026","reference_id":"RHSA-2020:0026","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0026"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0028","reference_id":"RHSA-2020:0028","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0028"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0204","reference_id":"RHSA-2020:0204","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0204"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0279","reference_id":"RHSA-2020:0279","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0279"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0366","reference_id":"RHSA-2020:0366","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0366"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0555","reference_id":"RHSA-2020:0555","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0555"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0666","reference_id":"RHSA-2020:0666","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0666"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0730","reference_id":"RHSA-2020:0730","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0730"},{"reference_url":"https://usn.ubuntu.com/4182-1/","reference_id":"USN-4182-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4182-1/"},{"reference_url":"https://usn.ubuntu.com/4182-2/","reference_id":"USN-4182-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4182-2/"},{"reference_url":"https://usn.ubuntu.com/4183-1/","reference_id":"USN-4183-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4183-1/"},{"reference_url":"https://usn.ubuntu.com/4184-1/","reference_id":"USN-4184-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4184-1/"},{"reference_url":"https://usn.ubuntu.com/4185-1/","reference_id":"USN-4185-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4185-1/"},{"reference_url":"https://usn.ubuntu.com/4185-2/","reference_id":"USN-4185-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4185-2/"},{"reference_url":"https://usn.ubuntu.com/4186-1/","reference_id":"USN-4186-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4186-1/"},{"reference_url":"https://usn.ubuntu.com/4186-2/","reference_id":"USN-4186-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4186-2/"},{"reference_url":"https://usn.ubuntu.com/4187-1/","reference_id":"USN-4187-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4187-1/"},{"reference_url":"https://usn.ubuntu.com/4188-1/","reference_id":"USN-4188-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4188-1/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-305.html","reference_id":"XSA-305","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-305.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925517?format=json","purl":"pkg:deb/debian/intel-microcode@3.20191112.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20191112.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2019-11135","XSA-305"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ns7u-fmmr-5ba4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4376?format=json","vulnerability_id":"VCID-p2fk-8snj-x7dy","summary":"x86: Register File Data Sampling","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28746.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28746.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28746","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14976","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15014","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15012","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15414","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15419","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15292","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15683","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15947","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15746","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15831","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15893","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15868","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.1583","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15761","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15885","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15693","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28746"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28746","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28746"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47233","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47233"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52429","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52429"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52435","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52435"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52447","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52447"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52458","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52458"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52482","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52482"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52486","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52486"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52488","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52488"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52489","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52489"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52491","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52491"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52492","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52492"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52493","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52493"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52497","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52497"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52498","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52498"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52583","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52583"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52587","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52587"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52598","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52598"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52603","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52603"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52604","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52604"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52606","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52606"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52607","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52607"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52614","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52614"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52617","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52617"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52622","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52622"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52627","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52627"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52635","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52635"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52637","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52637"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52642","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52642"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52644","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52644"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52650","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52650"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6270","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6270"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7042","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7042"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0340","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0340"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0565","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0565"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0607","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0607"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0841","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0841"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1151","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1151"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22099","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22099"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23849","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23849"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23850","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23850"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24857","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26581","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26593","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26606","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26606"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26610","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26610"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26614","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26614"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26622","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26622"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26625","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26625"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26627","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26627"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26635","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26635"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26636","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26636"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26640","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26640"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26642","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26642"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26643","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26643"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26644","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26644"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26645","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26645"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26651","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26651"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26654","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26654"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26659","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26659"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26673","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26673"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26675","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26675"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26679","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26679"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26684","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26684"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26685","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26685"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26687","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26687"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26688","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26688"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26689","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26689"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26695","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26695"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26696","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26696"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26697","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26697"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26698","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26698"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26702","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26702"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26704","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26704"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26707","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26707"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26712","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26712"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26722","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26722"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26727","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26727"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26733","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26733"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26735","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26735"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26736","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26736"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26747","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26747"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26748","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26751","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26751"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26752","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26752"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26753","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26753"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26754","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26754"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26763","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26763"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26764","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26764"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26766","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26766"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26771","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26771"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26772","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26772"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26773","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26773"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26777","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26777"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26778","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26778"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26787","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26787"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26788","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26788"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26790","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26790"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26791","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26791"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26793","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26793"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26801","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26801"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26804","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26804"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26808","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26808"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26809","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26809"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26810","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26810"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26812","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26812"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26813","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26813"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26814","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26814"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26817","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26817"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26820","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26820"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26825","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26825"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26833","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26833"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26835","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26835"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26839","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26839"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26840","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26840"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26845","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26845"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26846","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26846"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26852","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26852"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26855","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26855"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26857","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26859","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26859"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26870","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26870"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26872","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26872"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26874","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26874"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26875","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26875"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26877","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26877"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26878","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26878"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26880","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26880"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26882","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26882"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26883","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26883"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26884","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26884"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26885","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26885"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26889","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26889"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26891","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26891"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26894","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26894"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26895","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26895"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26897","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26897"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26901","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26901"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26903","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26903"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26906","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26906"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26907","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26907"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26910","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26910"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26917","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26917"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26922","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26922"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26923","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26923"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26925","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26925"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26926","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26926"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26931","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26931"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26934","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26935","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26935"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26937","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26937"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26950","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26950"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26951","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26951"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26955","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26955"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26956","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26956"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26957","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26957"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26958","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26958"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26960","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26960"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26961","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26961"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26965","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26965"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26966","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26966"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26969","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26969"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26970","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26970"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26973","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26973"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26974","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26974"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26976","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26976"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26978","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26978"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26981"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26984","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26984"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26988","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26988"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26993","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26993"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26994","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26994"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26997","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26997"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26999","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26999"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27000"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27001","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27001"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27004","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27004"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27008","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27008"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27013","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27013"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27020","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27020"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27024","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27024"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27025","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27025"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27028","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27028"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27030","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27030"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27038","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27038"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27043","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27043"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27044","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27044"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27045","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27045"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27046","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27046"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27047","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27047"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27051","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27051"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27052","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27052"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27053","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27053"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27059","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27059"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27065","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27065"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27073","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27073"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27074"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27075","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27075"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27076","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27076"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27077","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27077"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27078","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27078"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27388","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27388"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27437","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27437"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066108","reference_id":"1066108","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066108"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/03/12/13","reference_id":"13","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/03/12/13"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270700","reference_id":"2270700","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270700"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK/","reference_id":"EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK/"},{"reference_url":"https://security.gentoo.org/glsa/202409-10","reference_id":"GLSA-202409-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-10"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H63LGAQXPEVJOES73U4XK65I6DASOAAG/","reference_id":"H63LGAQXPEVJOES73U4XK65I6DASOAAG","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H63LGAQXPEVJOES73U4XK65I6DASOAAG/"},{"reference_url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00898.html","reference_id":"intel-sa-00898.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/"}],"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00898.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html","reference_id":"msg00003.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html","reference_id":"msg00017.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5101","reference_id":"RHSA-2024:5101","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5101"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8157","reference_id":"RHSA-2024:8157","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8158","reference_id":"RHSA-2024:8158","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8158"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8162","reference_id":"RHSA-2024:8162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8162"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9401","reference_id":"RHSA-2024:9401","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9401"},{"reference_url":"https://usn.ubuntu.com/6797-1/","reference_id":"USN-6797-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6797-1/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-452.html","reference_id":"XSA-452","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-452.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/","reference_id":"ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925533?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240312.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240312.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925532?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240312.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240312.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925534?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240312.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240312.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2023-28746","XSA-452"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p2fk-8snj-x7dy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78657?format=json","vulnerability_id":"VCID-pgps-58ra-1ugy","summary":"kernel: Intel firmware update for Incorrect default permissions in some memory controller configurations","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-33196.json","reference_id":"","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-33196.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-33196","reference_id":"","reference_type":"","scores":[{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10313","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10372","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10334","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10277","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10226","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10378","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10279","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10353","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10419","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10448","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10408","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10386","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10257","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10228","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10359","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10341","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-33196"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33196","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33196"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031334","reference_id":"1031334","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031334"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2171252","reference_id":"2171252","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2171252"},{"reference_url":"http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00738.html","reference_id":"intel-sa-00738.html","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-27T17:29:22Z/"}],"url":"http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00738.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5209","reference_id":"RHSA-2023:5209","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5209"},{"reference_url":"https://usn.ubuntu.com/5886-1/","reference_id":"USN-5886-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5886-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925527?format=json","purl":"pkg:deb/debian/intel-microcode@3.20230214.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20230214.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925526?format=json","purl":"pkg:deb/debian/intel-microcode@3.20230214.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20230214.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2022-33196"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pgps-58ra-1ugy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80233?format=json","vulnerability_id":"VCID-pxy4-1vew-vffs","summary":"hw: observable timing discrepancy in some Intel Processors","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-24512.json","reference_id":"","reference_type":"","scores":[{"value":"2.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-24512.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-24512","reference_id":"","reference_type":"","scores":[{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20018","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20062","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19985","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19874","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19869","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19839","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20166","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20225","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19951","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20031","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.2009","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20108","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20004","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19986","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19989","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00193","scoring_system":"epss","scoring_elements":"0.40941","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00193","scoring_system":"epss","scoring_elements":"0.40867","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-24512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24489","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24489"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24513"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1962722","reference_id":"1962722","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1962722"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989615","reference_id":"989615","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989615"},{"reference_url":"https://security.archlinux.org/ASA-202106-34","reference_id":"ASA-202106-34","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-34"},{"reference_url":"https://security.archlinux.org/AVG-2051","reference_id":"AVG-2051","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2051"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2299","reference_id":"RHSA-2021:2299","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2299"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2300","reference_id":"RHSA-2021:2300","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2300"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2301","reference_id":"RHSA-2021:2301","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2301"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2302","reference_id":"RHSA-2021:2302","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2302"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2303","reference_id":"RHSA-2021:2303","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2303"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2304","reference_id":"RHSA-2021:2304","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2304"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2305","reference_id":"RHSA-2021:2305","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2306","reference_id":"RHSA-2021:2306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2307","reference_id":"RHSA-2021:2307","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2307"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2308","reference_id":"RHSA-2021:2308","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2308"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3027","reference_id":"RHSA-2021:3027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3028","reference_id":"RHSA-2021:3028","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3028"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3029","reference_id":"RHSA-2021:3029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3176","reference_id":"RHSA-2021:3176","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3176"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3255","reference_id":"RHSA-2021:3255","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3255"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3317","reference_id":"RHSA-2021:3317","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3317"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3322","reference_id":"RHSA-2021:3322","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3322"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3323","reference_id":"RHSA-2021:3323","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3323"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3364","reference_id":"RHSA-2021:3364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3364"},{"reference_url":"https://usn.ubuntu.com/4985-1/","reference_id":"USN-4985-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4985-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925520?format=json","purl":"pkg:deb/debian/intel-microcode@3.20210608.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20210608.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2020-24512"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pxy4-1vew-vffs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71859?format=json","vulnerability_id":"VCID-qtg5-1dxw-sfdc","summary":"microcode_ctl: Improper input validation in UEFI firmware CseVariableStorageSmm","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-29214.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-29214.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-29214","reference_id":"","reference_type":"","scores":[{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06186","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06064","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06068","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06088","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05807","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05843","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05838","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05877","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05903","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05884","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05874","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05867","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05832","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05997","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06028","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-29214"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29214","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29214"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805","reference_id":"1095805","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345365","reference_id":"2345365","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345365"},{"reference_url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html","reference_id":"intel-sa-01139.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-13T15:17:24Z/"}],"url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925539?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925538?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925540?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250211.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2024-29214"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qtg5-1dxw-sfdc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71858?format=json","vulnerability_id":"VCID-qzcy-2xsr-vqeh","summary":"microcode_ctl: Improper input validation in UEFI firmware","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28127.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28127.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-28127","reference_id":"","reference_type":"","scores":[{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06186","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06064","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06068","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06088","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05807","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05843","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05838","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05877","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05903","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05884","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05874","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05867","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05832","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05997","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06028","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-28127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28127","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28127"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805","reference_id":"1095805","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345370","reference_id":"2345370","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345370"},{"reference_url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html","reference_id":"intel-sa-01139.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-13T15:16:50Z/"}],"url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925539?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925538?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925540?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250211.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2024-28127"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qzcy-2xsr-vqeh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73929?format=json","vulnerability_id":"VCID-r46f-12hj-7ybb","summary":"microcode_ctl: Denial of Service","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-24968.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-24968.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-24968","reference_id":"","reference_type":"","scores":[{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12819","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12901","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12866","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12761","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12671","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.13015","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.13067","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12867","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12945","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12996","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12957","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12921","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12877","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12778","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12781","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12879","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-24968"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24968","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24968"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1081363","reference_id":"1081363","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1081363"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2312594","reference_id":"2312594","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2312594"},{"reference_url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01097.html","reference_id":"intel-sa-01097.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H"},{"value":"5.6","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T17:28:45Z/"}],"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01097.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10528","reference_id":"RHSA-2024:10528","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10528"},{"reference_url":"https://usn.ubuntu.com/7033-1/","reference_id":"USN-7033-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7033-1/"},{"reference_url":"https://usn.ubuntu.com/7149-1/","reference_id":"USN-7149-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7149-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925550?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240910.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240910.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925549?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240910.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240910.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925551?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240910.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240910.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2024-24968"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r46f-12hj-7ybb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78203?format=json","vulnerability_id":"VCID-t56a-46c7-fybe","summary":"hw: Intel: 3rd Generation processors may allow information disclosure","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23908.json","reference_id":"","reference_type":"","scores":[{"value":"6.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23908.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-23908","reference_id":"","reference_type":"","scores":[{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02059","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02046","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02061","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02063","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0208","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02056","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02041","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02036","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02014","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02028","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02113","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02084","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02077","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02104","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02054","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02065","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-23908"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40982","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40982"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41804","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41804"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23908","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23908"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043305","reference_id":"1043305","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043305"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2230675","reference_id":"2230675","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2230675"},{"reference_url":"https://www.debian.org/security/2023/dsa-5474","reference_id":"dsa-5474","reference_type":"","scores":[{"value":"6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T13:35:03Z/"}],"url":"https://www.debian.org/security/2023/dsa-5474"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/","reference_id":"HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE","reference_type":"","scores":[{"value":"6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T13:35:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/"},{"reference_url":"http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00836.html","reference_id":"intel-sa-00836.html","reference_type":"","scores":[{"value":"6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T13:35:03Z/"}],"url":"http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00836.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html","reference_id":"msg00026.html","reference_type":"","scores":[{"value":"6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T13:35:03Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230824-0003/","reference_id":"ntap-20230824-0003","reference_type":"","scores":[{"value":"6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T13:35:03Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230824-0003/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/","reference_id":"OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J","reference_type":"","scores":[{"value":"6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T13:35:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/"},{"reference_url":"https://usn.ubuntu.com/6286-1/","reference_id":"USN-6286-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6286-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925530?format=json","purl":"pkg:deb/debian/intel-microcode@3.20230808.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20230808.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925529?format=json","purl":"pkg:deb/debian/intel-microcode@3.20230808.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20230808.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925531?format=json","purl":"pkg:deb/debian/intel-microcode@3.20230808.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20230808.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2023-23908"],"risk_score":2.7,"exploitability":"0.5","weighted_severity":"5.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t56a-46c7-fybe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71855?format=json","vulnerability_id":"VCID-t7rc-zadf-cybq","summary":"microcode_ctl: Improper input validation in UEFI firmware","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28047.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28047.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-28047","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01612","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01591","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.016","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01597","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01499","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01502","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01624","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01625","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01632","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01618","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01609","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01607","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01596","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0161","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-28047"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28047","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28047"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805","reference_id":"1095805","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345363","reference_id":"2345363","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345363"},{"reference_url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html","reference_id":"intel-sa-01139.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N"},{"value":"6.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T15:04:18Z/"}],"url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7043","reference_id":"RHSA-2025:7043","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7043"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925539?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925538?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925540?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250211.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2024-28047"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t7rc-zadf-cybq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71860?format=json","vulnerability_id":"VCID-t85u-116v-7uan","summary":"microcode_ctl: Improper input validation in XmlCli feature for UEFI firmware","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-24582.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-24582.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-24582","reference_id":"","reference_type":"","scores":[{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03519","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03483","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03535","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.035","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03435","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03449","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03462","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03465","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03488","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03445","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03416","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03392","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03369","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.0338","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03496","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-24582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24582"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805","reference_id":"1095805","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345376","reference_id":"2345376","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345376"},{"reference_url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html","reference_id":"intel-sa-01139.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-13T19:49:18Z/"}],"url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925539?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925538?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925540?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250211.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2024-24582"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t85u-116v-7uan"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4319?format=json","vulnerability_id":"VCID-td6e-x2qb-syg3","summary":"x86: MMIO Stale Data vulnerabilities","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21125.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21125.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21125","reference_id":"","reference_type":"","scores":[{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47421","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47391","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47441","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47447","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47466","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47443","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47446","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67518","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67499","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67488","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67511","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67537","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67493","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67507","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.6752","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21125"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/06/16/1","reference_id":"1","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/"}],"url":"http://www.openwall.com/lists/oss-security/2022/06/16/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2090240","reference_id":"2090240","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2090240"},{"reference_url":"http://xenbits.xen.org/xsa/advisory-404.html","reference_id":"advisory-404.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/"}],"url":"http://xenbits.xen.org/xsa/advisory-404.html"},{"reference_url":"https://www.debian.org/security/2022/dsa-5173","reference_id":"dsa-5173","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/"}],"url":"https://www.debian.org/security/2022/dsa-5173"},{"reference_url":"https://www.debian.org/security/2022/dsa-5178","reference_id":"dsa-5178","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/"}],"url":"https://www.debian.org/security/2022/dsa-5178"},{"reference_url":"https://www.debian.org/security/2022/dsa-5184","reference_id":"dsa-5184","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/"}],"url":"https://www.debian.org/security/2022/dsa-5184"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV/","reference_id":"FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV/"},{"reference_url":"https://security.gentoo.org/glsa/202208-23","reference_id":"GLSA-202208-23","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/"}],"url":"https://security.gentoo.org/glsa/202208-23"},{"reference_url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html","reference_id":"intel-sa-00615.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/"}],"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS/","reference_id":"MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220624-0008/","reference_id":"ntap-20220624-0008","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220624-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5937","reference_id":"RHSA-2022:5937","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5937"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5939","reference_id":"RHSA-2022:5939","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5939"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6437","reference_id":"RHSA-2022:6437","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6437"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6460","reference_id":"RHSA-2022:6460","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6460"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6872","reference_id":"RHSA-2022:6872","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6872"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6983","reference_id":"RHSA-2022:6983","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6983"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6991","reference_id":"RHSA-2022:6991","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6991"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7279","reference_id":"RHSA-2022:7279","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7279"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7280","reference_id":"RHSA-2022:7280","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7280"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7933","reference_id":"RHSA-2022:7933","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7933"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8267","reference_id":"RHSA-2022:8267","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8267"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8973","reference_id":"RHSA-2022:8973","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8973"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8974","reference_id":"RHSA-2022:8974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8974"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/","reference_id":"RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA/","reference_id":"T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA/"},{"reference_url":"https://usn.ubuntu.com/5484-1/","reference_id":"USN-5484-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5484-1/"},{"reference_url":"https://usn.ubuntu.com/5485-1/","reference_id":"USN-5485-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5485-1/"},{"reference_url":"https://usn.ubuntu.com/5485-2/","reference_id":"USN-5485-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5485-2/"},{"reference_url":"https://usn.ubuntu.com/5505-1/","reference_id":"USN-5505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5505-1/"},{"reference_url":"https://usn.ubuntu.com/5513-1/","reference_id":"USN-5513-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5513-1/"},{"reference_url":"https://usn.ubuntu.com/5529-1/","reference_id":"USN-5529-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5529-1/"},{"reference_url":"https://usn.ubuntu.com/5535-1/","reference_id":"USN-5535-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5535-1/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-404.html","reference_id":"XSA-404","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-404.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925525?format=json","purl":"pkg:deb/debian/intel-microcode@3.20220510.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20220510.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925524?format=json","purl":"pkg:deb/debian/intel-microcode@3.20220510.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20220510.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2022-21125"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-td6e-x2qb-syg3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4357?format=json","vulnerability_id":"VCID-trxm-8mg3-4bbr","summary":"x86/Intel: Gather Data Sampling","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-40982.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-40982.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-40982","reference_id":"","reference_type":"","scores":[{"value":"0.00733","scoring_system":"epss","scoring_elements":"0.72829","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00733","scoring_system":"epss","scoring_elements":"0.72799","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74964","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.7488","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74909","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74883","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74916","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74929","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74952","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.7493","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74921","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74957","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74993","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74999","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.75003","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-40982"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40982","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40982"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41804","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41804"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20569","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20569"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23908","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23908"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043305","reference_id":"1043305","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043305"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2223949","reference_id":"2223949","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2223949"},{"reference_url":"https://access.redhat.com/solutions/7027704","reference_id":"7027704","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"}],"url":"https://access.redhat.com/solutions/7027704"},{"reference_url":"https://aws.amazon.com/security/security-bulletins/AWS-2023-007/","reference_id":"AWS-2023-007","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"}],"url":"https://aws.amazon.com/security/security-bulletins/AWS-2023-007/"},{"reference_url":"https://downfall.page","reference_id":"downfall.page","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"}],"url":"https://downfall.page"},{"reference_url":"https://www.debian.org/security/2023/dsa-5474","reference_id":"dsa-5474","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"}],"url":"https://www.debian.org/security/2023/dsa-5474"},{"reference_url":"https://www.debian.org/security/2023/dsa-5475","reference_id":"dsa-5475","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"}],"url":"https://www.debian.org/security/2023/dsa-5475"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/","reference_id":"HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/","reference_id":"HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/"},{"reference_url":"http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00828.html","reference_id":"intel-sa-00828.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"}],"url":"http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00828.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html","reference_id":"msg00013.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html","reference_id":"msg00026.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230811-0001/","reference_id":"ntap-20230811-0001","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230811-0001/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/","reference_id":"OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6583","reference_id":"RHSA-2023:6583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6901","reference_id":"RHSA-2023:6901","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6901"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7077","reference_id":"RHSA-2023:7077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7370","reference_id":"RHSA-2023:7370","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7370"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7379","reference_id":"RHSA-2023:7379","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7379"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7423","reference_id":"RHSA-2023:7423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7424","reference_id":"RHSA-2023:7424","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7424"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7539","reference_id":"RHSA-2023:7539","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7539"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0412","reference_id":"RHSA-2024:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0562","reference_id":"RHSA-2024:0562","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0562"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0563","reference_id":"RHSA-2024:0563","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0563"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1250","reference_id":"RHSA-2024:1250","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1250"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1268","reference_id":"RHSA-2024:1268","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1268"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1269","reference_id":"RHSA-2024:1269","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1269"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1306","reference_id":"RHSA-2024:1306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3319","reference_id":"RHSA-2024:3319","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3319"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/","reference_id":"T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/"},{"reference_url":"https://usn.ubuntu.com/6286-1/","reference_id":"USN-6286-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6286-1/"},{"reference_url":"https://usn.ubuntu.com/6315-1/","reference_id":"USN-6315-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6315-1/"},{"reference_url":"https://usn.ubuntu.com/6316-1/","reference_id":"USN-6316-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6316-1/"},{"reference_url":"https://usn.ubuntu.com/6317-1/","reference_id":"USN-6317-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6317-1/"},{"reference_url":"https://usn.ubuntu.com/6318-1/","reference_id":"USN-6318-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6318-1/"},{"reference_url":"https://usn.ubuntu.com/6321-1/","reference_id":"USN-6321-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6321-1/"},{"reference_url":"https://usn.ubuntu.com/6324-1/","reference_id":"USN-6324-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6324-1/"},{"reference_url":"https://usn.ubuntu.com/6325-1/","reference_id":"USN-6325-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6325-1/"},{"reference_url":"https://usn.ubuntu.com/6328-1/","reference_id":"USN-6328-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6328-1/"},{"reference_url":"https://usn.ubuntu.com/6329-1/","reference_id":"USN-6329-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6329-1/"},{"reference_url":"https://usn.ubuntu.com/6330-1/","reference_id":"USN-6330-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6330-1/"},{"reference_url":"https://usn.ubuntu.com/6331-1/","reference_id":"USN-6331-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6331-1/"},{"reference_url":"https://usn.ubuntu.com/6332-1/","reference_id":"USN-6332-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6332-1/"},{"reference_url":"https://usn.ubuntu.com/6346-1/","reference_id":"USN-6346-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6346-1/"},{"reference_url":"https://usn.ubuntu.com/6348-1/","reference_id":"USN-6348-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6348-1/"},{"reference_url":"https://usn.ubuntu.com/6357-1/","reference_id":"USN-6357-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6357-1/"},{"reference_url":"https://usn.ubuntu.com/6388-1/","reference_id":"USN-6388-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6388-1/"},{"reference_url":"https://usn.ubuntu.com/6396-1/","reference_id":"USN-6396-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6396-1/"},{"reference_url":"https://usn.ubuntu.com/6396-2/","reference_id":"USN-6396-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6396-2/"},{"reference_url":"https://usn.ubuntu.com/6396-3/","reference_id":"USN-6396-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6396-3/"},{"reference_url":"https://usn.ubuntu.com/6397-1/","reference_id":"USN-6397-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6397-1/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-435.html","reference_id":"XSA-435","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:33:43Z/"}],"url":"https://xenbits.xen.org/xsa/advisory-435.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925530?format=json","purl":"pkg:deb/debian/intel-microcode@3.20230808.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20230808.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925529?format=json","purl":"pkg:deb/debian/intel-microcode@3.20230808.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20230808.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925531?format=json","purl":"pkg:deb/debian/intel-microcode@3.20230808.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20230808.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2022-40982","XSA-435"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-trxm-8mg3-4bbr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79735?format=json","vulnerability_id":"VCID-ufpa-pg91-w3ek","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-0548.json","reference_id":"","reference_type":"","scores":[{"value":"2.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-0548.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-0548","reference_id":"","reference_type":"","scores":[{"value":"0.00405","scoring_system":"epss","scoring_elements":"0.60895","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00405","scoring_system":"epss","scoring_elements":"0.61038","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00405","scoring_system":"epss","scoring_elements":"0.61039","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00405","scoring_system":"epss","scoring_elements":"0.60988","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00405","scoring_system":"epss","scoring_elements":"0.60967","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00405","scoring_system":"epss","scoring_elements":"0.60997","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00405","scoring_system":"epss","scoring_elements":"0.60962","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00405","scoring_system":"epss","scoring_elements":"0.6101","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00405","scoring_system":"epss","scoring_elements":"0.61026","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00405","scoring_system":"epss","scoring_elements":"0.61047","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00405","scoring_system":"epss","scoring_elements":"0.61033","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00405","scoring_system":"epss","scoring_elements":"0.61013","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00405","scoring_system":"epss","scoring_elements":"0.61054","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00405","scoring_system":"epss","scoring_elements":"0.6106","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00405","scoring_system":"epss","scoring_elements":"0.61045","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00405","scoring_system":"epss","scoring_elements":"0.61035","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00405","scoring_system":"epss","scoring_elements":"0.61046","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-0548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0548","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0549","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0549"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1788786","reference_id":"1788786","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1788786"},{"reference_url":"https://security.archlinux.org/ASA-202006-10","reference_id":"ASA-202006-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202006-10"},{"reference_url":"https://security.archlinux.org/AVG-1187","reference_id":"AVG-1187","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1187"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2431","reference_id":"RHSA-2020:2431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2432","reference_id":"RHSA-2020:2432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2433","reference_id":"RHSA-2020:2433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2677","reference_id":"RHSA-2020:2677","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2677"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2679","reference_id":"RHSA-2020:2679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2680","reference_id":"RHSA-2020:2680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2706","reference_id":"RHSA-2020:2706","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2706"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2707","reference_id":"RHSA-2020:2707","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2707"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2757","reference_id":"RHSA-2020:2757","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2757"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2758","reference_id":"RHSA-2020:2758","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2758"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2771","reference_id":"RHSA-2020:2771","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2771"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2842","reference_id":"RHSA-2020:2842","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2842"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3027","reference_id":"RHSA-2021:3027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3028","reference_id":"RHSA-2021:3028","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3028"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3029","reference_id":"RHSA-2021:3029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3176","reference_id":"RHSA-2021:3176","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3176"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3255","reference_id":"RHSA-2021:3255","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3255"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3317","reference_id":"RHSA-2021:3317","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3317"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3322","reference_id":"RHSA-2021:3322","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3322"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3323","reference_id":"RHSA-2021:3323","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3323"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3364","reference_id":"RHSA-2021:3364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3364"},{"reference_url":"https://usn.ubuntu.com/4385-1/","reference_id":"USN-4385-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4385-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925519?format=json","purl":"pkg:deb/debian/intel-microcode@3.20200609.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20200609.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2020-0548"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ufpa-pg91-w3ek"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77270?format=json","vulnerability_id":"VCID-uj7d-tpax-fqhd","summary":"kernel: local privilege escalation on Intel microcode on Intel(R) Xeon(R)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22655.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22655.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22655","reference_id":"","reference_type":"","scores":[{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09099","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09205","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09032","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09012","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09169","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09159","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09129","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09041","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09152","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09072","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09183","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09185","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09138","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22655"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22655","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22655"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066108","reference_id":"1066108","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066108"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270698","reference_id":"2270698","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270698"},{"reference_url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00960.html","reference_id":"intel-sa-00960.html","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-14T18:28:48Z/"}],"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00960.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html","reference_id":"msg00003.html","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-14T18:28:48Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240405-0006/","reference_id":"ntap-20240405-0006","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-14T18:28:48Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240405-0006/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9401","reference_id":"RHSA-2024:9401","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9401"},{"reference_url":"https://usn.ubuntu.com/6797-1/","reference_id":"USN-6797-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6797-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925533?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240312.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240312.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925532?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240312.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240312.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925534?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240312.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240312.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2023-22655"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uj7d-tpax-fqhd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80799?format=json","vulnerability_id":"VCID-upx5-38qt-3kg9","summary":"hw: Fast forward store predictor","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8698.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8698.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-8698","reference_id":"","reference_type":"","scores":[{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50043","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50026","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.49971","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50077","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50105","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50055","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50109","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50103","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.5012","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50094","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50091","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50135","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50136","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50108","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50099","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-8698"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8698","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8698"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890356","reference_id":"1890356","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890356"},{"reference_url":"https://security.archlinux.org/ASA-202102-34","reference_id":"ASA-202102-34","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202102-34"},{"reference_url":"https://security.archlinux.org/AVG-1588","reference_id":"AVG-1588","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1588"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5083","reference_id":"RHSA-2020:5083","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5083"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5084","reference_id":"RHSA-2020:5084","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5084"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5085","reference_id":"RHSA-2020:5085","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5085"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5181","reference_id":"RHSA-2020:5181","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5181"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5182","reference_id":"RHSA-2020:5182","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5182"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5183","reference_id":"RHSA-2020:5183","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5183"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5184","reference_id":"RHSA-2020:5184","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5184"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5185","reference_id":"RHSA-2020:5185","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5185"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5186","reference_id":"RHSA-2020:5186","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5186"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5188","reference_id":"RHSA-2020:5188","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5188"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5189","reference_id":"RHSA-2020:5189","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5189"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5190","reference_id":"RHSA-2020:5190","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5190"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5369","reference_id":"RHSA-2020:5369","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5369"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3027","reference_id":"RHSA-2021:3027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3028","reference_id":"RHSA-2021:3028","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3028"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3029","reference_id":"RHSA-2021:3029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3176","reference_id":"RHSA-2021:3176","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3176"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3255","reference_id":"RHSA-2021:3255","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3255"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3317","reference_id":"RHSA-2021:3317","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3317"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3322","reference_id":"RHSA-2021:3322","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3322"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3323","reference_id":"RHSA-2021:3323","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3323"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3364","reference_id":"RHSA-2021:3364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3364"},{"reference_url":"https://usn.ubuntu.com/4628-1/","reference_id":"USN-4628-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4628-1/"},{"reference_url":"https://usn.ubuntu.com/4628-3/","reference_id":"USN-4628-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4628-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925521?format=json","purl":"pkg:deb/debian/intel-microcode@3.20201110.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20201110.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2020-8698"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-upx5-38qt-3kg9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4140?format=json","vulnerability_id":"VCID-v8fp-rzfq-e3bs","summary":"Information leak via side effects of speculative execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5715.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5715.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5715","reference_id":"","reference_type":"","scores":[{"value":"0.88597","scoring_system":"epss","scoring_elements":"0.995","published_at":"2026-04-02T12:55:00Z"},{"value":"0.88597","scoring_system":"epss","scoring_elements":"0.99501","published_at":"2026-04-04T12:55:00Z"},{"value":"0.89042","scoring_system":"epss","scoring_elements":"0.99534","published_at":"2026-04-26T12:55:00Z"},{"value":"0.89094","scoring_system":"epss","scoring_elements":"0.99529","published_at":"2026-04-09T12:55:00Z"},{"value":"0.89094","scoring_system":"epss","scoring_elements":"0.9953","published_at":"2026-04-13T12:55:00Z"},{"value":"0.89094","scoring_system":"epss","scoring_elements":"0.99533","published_at":"2026-04-16T12:55:00Z"},{"value":"0.89094","scoring_system":"epss","scoring_elements":"0.99534","published_at":"2026-04-18T12:55:00Z"},{"value":"0.89147","scoring_system":"epss","scoring_elements":"0.99538","published_at":"2026-04-24T12:55:00Z"},{"value":"0.89198","scoring_system":"epss","scoring_elements":"0.99534","published_at":"2026-04-08T12:55:00Z"},{"value":"0.89198","scoring_system":"epss","scoring_elements":"0.99539","published_at":"2026-04-21T12:55:00Z"},{"value":"0.89198","scoring_system":"epss","scoring_elements":"0.99543","published_at":"2026-05-05T12:55:00Z"},{"value":"0.89198","scoring_system":"epss","scoring_elements":"0.99544","published_at":"2026-05-07T12:55:00Z"},{"value":"0.89198","scoring_system":"epss","scoring_elements":"0.99533","published_at":"2026-04-07T12:55:00Z"},{"value":"0.89198","scoring_system":"epss","scoring_elements":"0.99542","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5715"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:C/I:N/A:N"},{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securityfocus.com/bid/102376","reference_id":"102376","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://www.securityfocus.com/bid/102376"},{"reference_url":"http://www.securitytracker.com/id/1040071","reference_id":"1040071","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://www.securitytracker.com/id/1040071"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1519780","reference_id":"1519780","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1519780"},{"reference_url":"https://www.kb.cert.org/vuls/id/180049","reference_id":"180049","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://www.kb.cert.org/vuls/id/180049"},{"reference_url":"https://seclists.org/bugtraq/2019/Jun/36","reference_id":"36","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://seclists.org/bugtraq/2019/Jun/36"},{"reference_url":"https://www.exploit-db.com/exploits/43427/","reference_id":"43427","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://www.exploit-db.com/exploits/43427/"},{"reference_url":"http://nvidia.custhelp.com/app/answers/detail/a_id/4609","reference_id":"4609","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://nvidia.custhelp.com/app/answers/detail/a_id/4609"},{"reference_url":"http://nvidia.custhelp.com/app/answers/detail/a_id/4611","reference_id":"4611","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://nvidia.custhelp.com/app/answers/detail/a_id/4611"},{"reference_url":"http://nvidia.custhelp.com/app/answers/detail/a_id/4613","reference_id":"4613","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://nvidia.custhelp.com/app/answers/detail/a_id/4613"},{"reference_url":"http://nvidia.custhelp.com/app/answers/detail/a_id/4614","reference_id":"4614","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://nvidia.custhelp.com/app/answers/detail/a_id/4614"},{"reference_url":"http://www.kb.cert.org/vuls/id/584653","reference_id":"584653","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://www.kb.cert.org/vuls/id/584653"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886532","reference_id":"886532","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886532"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886852","reference_id":"886852","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886852"},{"reference_url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002","reference_id":"ADV180002","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002"},{"reference_url":"http://xenbits.xen.org/xsa/advisory-254.html","reference_id":"advisory-254.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://xenbits.xen.org/xsa/advisory-254.html"},{"reference_url":"https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr","reference_id":"advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr"},{"reference_url":"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt","reference_id":"ARUBA-PSA-2018-001.txt","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt"},{"reference_url":"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt","reference_id":"ARUBA-PSA-2019-003.txt","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt"},{"reference_url":"https://security.archlinux.org/ASA-201801-10","reference_id":"ASA-201801-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201801-10"},{"reference_url":"https://security.archlinux.org/AVG-557","reference_id":"AVG-557","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-557"},{"reference_url":"https://security.archlinux.org/AVG-558","reference_id":"AVG-558","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-558"},{"reference_url":"https://security.archlinux.org/AVG-559","reference_id":"AVG-559","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-559"},{"reference_url":"https://security.archlinux.org/AVG-582","reference_id":"AVG-582","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-582"},{"reference_url":"https://security.archlinux.org/AVG-583","reference_id":"AVG-583","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-583"},{"reference_url":"https://security.archlinux.org/AVG-987","reference_id":"AVG-987","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-987"},{"reference_url":"https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/","reference_id":"AWS-2018-013","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/"},{"reference_url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel","reference_id":"cisco-sa-20180104-cpusidechannel","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel"},{"reference_url":"https://support.citrix.com/article/CTX231399","reference_id":"CTX231399","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://support.citrix.com/article/CTX231399"},{"reference_url":"https://security.paloaltonetworks.com/CVE-2017-5715","reference_id":"CVE-2017-5715","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://security.paloaltonetworks.com/CVE-2017-5715"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/43427.c","reference_id":"CVE-2017-5753;CVE-2017-5715","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/43427.c"},{"reference_url":"https://spectreattack.com/spectre.pdf","reference_id":"CVE-2017-5753;CVE-2017-5715","reference_type":"exploit","scores":[],"url":"https://spectreattack.com/spectre.pdf"},{"reference_url":"https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us","reference_id":"display?docId=emr_na-hpesbhf03805en_us","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us"},{"reference_url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us","reference_id":"display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us"},{"reference_url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc","reference_id":"FreeBSD-SA-18:03.speculative_execution.asc","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc"},{"reference_url":"https://security.gentoo.org/glsa/201804-08","reference_id":"GLSA-201804-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201804-08"},{"reference_url":"https://security.gentoo.org/glsa/201810-06","reference_id":"GLSA-201810-06","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://security.gentoo.org/glsa/201810-06"},{"reference_url":"https://support.f5.com/csp/article/K91229003","reference_id":"K91229003","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://support.f5.com/csp/article/K91229003"},{"reference_url":"https://support.lenovo.com/us/en/solutions/LEN-18282","reference_id":"LEN-18282","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://support.lenovo.com/us/en/solutions/LEN-18282"},{"reference_url":"https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001","reference_id":"mitel-product-security-advisory-18-0001","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001"},{"reference_url":"https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/","reference_id":"mitigations-landing-new-class-timing-attack","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html","reference_id":"msg00002.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html","reference_id":"msg00003.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html","reference_id":"msg00004.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html","reference_id":"msg00005.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html","reference_id":"msg00009.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html","reference_id":"msg00012.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html","reference_id":"msg00013.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html","reference_id":"msg00017.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html","reference_id":"msg00019.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html","reference_id":"msg00025.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180104-0001/","reference_id":"ntap-20180104-0001","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://security.netapp.com/advisory/ntap-20180104-0001/"},{"reference_url":"https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html","reference_id":"reading-privileged-memory-with-side.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0016","reference_id":"RHSA-2018:0016","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0016"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0017","reference_id":"RHSA-2018:0017","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0017"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0018","reference_id":"RHSA-2018:0018","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0018"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0020","reference_id":"RHSA-2018:0020","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0020"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0021","reference_id":"RHSA-2018:0021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0022","reference_id":"RHSA-2018:0022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0022"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0023","reference_id":"RHSA-2018:0023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0027","reference_id":"RHSA-2018:0027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0028","reference_id":"RHSA-2018:0028","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0028"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0292","reference_id":"RHSA-2018:0292","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0292"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1062","reference_id":"RHSA-2018:1062","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1062"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1129","reference_id":"RHSA-2018:1129","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1129"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1130","reference_id":"RHSA-2018:1130","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1130"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1196","reference_id":"RHSA-2018:1196","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1196"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1216","reference_id":"RHSA-2018:1216","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1216"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1252","reference_id":"RHSA-2018:1252","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1252"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1319","reference_id":"RHSA-2018:1319","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1319"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1346","reference_id":"RHSA-2018:1346","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1346"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1967","reference_id":"RHSA-2018:1967","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1967"},{"reference_url":"https://spectreattack.com/","reference_id":"spectreattack.com","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://spectreattack.com/"},{"reference_url":"http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html","reference_id":"Spectre-Information-Disclosure-Proof-Of-Concept.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html"},{"reference_url":"https://access.redhat.com/security/vulnerabilities/speculativeexecution","reference_id":"speculativeexecution","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://access.redhat.com/security/vulnerabilities/speculativeexecution"},{"reference_url":"https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability","reference_id":"speculative-processor-vulnerability","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability"},{"reference_url":"https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf","reference_id":"ssa-608355.pdf","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf"},{"reference_url":"https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/","reference_id":"suse-addresses-meltdown-spectre-vulnerabilities","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/"},{"reference_url":"https://www.synology.com/support/security/Synology_SA_18_01","reference_id":"Synology_SA_18_01","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://www.synology.com/support/security/Synology_SA_18_01"},{"reference_url":"https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html","reference_id":"todays-cpu-vulnerability-what-you-need.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html"},{"reference_url":"https://usn.ubuntu.com/usn/usn-3516-1/","reference_id":"usn-3516-1","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/usn/usn-3516-1/"},{"reference_url":"https://usn.ubuntu.com/3516-1/","reference_id":"USN-3516-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3516-1/"},{"reference_url":"https://usn.ubuntu.com/3530-1/","reference_id":"USN-3530-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3530-1/"},{"reference_url":"https://usn.ubuntu.com/3531-1/","reference_id":"USN-3531-1","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3531-1/"},{"reference_url":"https://usn.ubuntu.com/3531-3/","reference_id":"USN-3531-3","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3531-3/"},{"reference_url":"https://usn.ubuntu.com/3540-1/","reference_id":"USN-3540-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3540-1/"},{"reference_url":"https://usn.ubuntu.com/3540-2/","reference_id":"USN-3540-2","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3540-2/"},{"reference_url":"https://usn.ubuntu.com/3541-1/","reference_id":"USN-3541-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3541-1/"},{"reference_url":"https://usn.ubuntu.com/3541-2/","reference_id":"USN-3541-2","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3541-2/"},{"reference_url":"https://usn.ubuntu.com/3542-1/","reference_id":"USN-3542-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3542-1/"},{"reference_url":"https://usn.ubuntu.com/3542-2/","reference_id":"USN-3542-2","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3542-2/"},{"reference_url":"https://usn.ubuntu.com/3549-1/","reference_id":"USN-3549-1","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3549-1/"},{"reference_url":"https://usn.ubuntu.com/3560-1/","reference_id":"USN-3560-1","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3560-1/"},{"reference_url":"https://usn.ubuntu.com/3561-1/","reference_id":"USN-3561-1","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3561-1/"},{"reference_url":"https://usn.ubuntu.com/3580-1/","reference_id":"USN-3580-1","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3580-1/"},{"reference_url":"https://usn.ubuntu.com/3581-1/","reference_id":"USN-3581-1","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3581-1/"},{"reference_url":"https://usn.ubuntu.com/3581-2/","reference_id":"USN-3581-2","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3581-2/"},{"reference_url":"https://usn.ubuntu.com/3582-1/","reference_id":"USN-3582-1","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3582-1/"},{"reference_url":"https://usn.ubuntu.com/3582-2/","reference_id":"USN-3582-2","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3582-2/"},{"reference_url":"https://usn.ubuntu.com/3594-1/","reference_id":"USN-3594-1","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3594-1/"},{"reference_url":"https://usn.ubuntu.com/3597-1/","reference_id":"USN-3597-1","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3597-1/"},{"reference_url":"https://usn.ubuntu.com/3597-2/","reference_id":"USN-3597-2","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3597-2/"},{"reference_url":"https://usn.ubuntu.com/3620-2/","reference_id":"USN-3620-2","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3620-2/"},{"reference_url":"https://usn.ubuntu.com/3690-1/","reference_id":"USN-3690-1","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3690-1/"},{"reference_url":"https://usn.ubuntu.com/3777-3/","reference_id":"USN-3777-3","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3777-3/"},{"reference_url":"https://cert.vde.com/en-us/advisories/vde-2018-002","reference_id":"vde-2018-002","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://cert.vde.com/en-us/advisories/vde-2018-002"},{"reference_url":"https://cert.vde.com/en-us/advisories/vde-2018-003","reference_id":"vde-2018-003","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://cert.vde.com/en-us/advisories/vde-2018-003"},{"reference_url":"https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html","reference_id":"VMSA-2018-0002.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html"},{"reference_url":"https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html","reference_id":"VMSA-2018-0004.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html"},{"reference_url":"https://www.vmware.com/security/advisories/VMSA-2018-0007.html","reference_id":"VMSA-2018-0007.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://www.vmware.com/security/advisories/VMSA-2018-0007.html"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-254.html","reference_id":"XSA-254","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-254.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925511?format=json","purl":"pkg:deb/debian/intel-microcode@3.20180425.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20180425.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2017-5715"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v8fp-rzfq-e3bs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4183?format=json","vulnerability_id":"VCID-vh89-pyaz-xbdg","summary":"Microarchitectural Data Sampling speculative side channel","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12126.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12126.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-12126","reference_id":"","reference_type":"","scores":[{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.65634","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.65683","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.65713","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.65678","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.6573","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.65742","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.65763","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.65748","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.65719","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.65754","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.65767","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.65753","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.65766","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.65777","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.65776","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.6575","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.65799","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-12126"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1646781","reference_id":"1646781","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1646781"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929129","reference_id":"929129","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929129"},{"reference_url":"https://security.gentoo.org/glsa/202003-56","reference_id":"GLSA-202003-56","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-56"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1155","reference_id":"RHSA-2019:1155","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1155"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1167","reference_id":"RHSA-2019:1167","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1167"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1168","reference_id":"RHSA-2019:1168","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1168"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1169","reference_id":"RHSA-2019:1169","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1169"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1170","reference_id":"RHSA-2019:1170","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1170"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1171","reference_id":"RHSA-2019:1171","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1171"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1172","reference_id":"RHSA-2019:1172","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1172"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1174","reference_id":"RHSA-2019:1174","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1174"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1175","reference_id":"RHSA-2019:1175","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1175"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1176","reference_id":"RHSA-2019:1176","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1176"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1177","reference_id":"RHSA-2019:1177","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1177"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1178","reference_id":"RHSA-2019:1178","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1178"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1179","reference_id":"RHSA-2019:1179","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1179"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1180","reference_id":"RHSA-2019:1180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1181","reference_id":"RHSA-2019:1181","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1181"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1182","reference_id":"RHSA-2019:1182","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1182"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1183","reference_id":"RHSA-2019:1183","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1183"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1184","reference_id":"RHSA-2019:1184","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1184"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1185","reference_id":"RHSA-2019:1185","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1185"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1186","reference_id":"RHSA-2019:1186","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1186"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1187","reference_id":"RHSA-2019:1187","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1187"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1188","reference_id":"RHSA-2019:1188","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1188"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1189","reference_id":"RHSA-2019:1189","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1189"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1190","reference_id":"RHSA-2019:1190","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1190"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1193","reference_id":"RHSA-2019:1193","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1193"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1194","reference_id":"RHSA-2019:1194","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1194"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1195","reference_id":"RHSA-2019:1195","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1195"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1196","reference_id":"RHSA-2019:1196","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1196"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1197","reference_id":"RHSA-2019:1197","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1197"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1198","reference_id":"RHSA-2019:1198","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1198"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1199","reference_id":"RHSA-2019:1199","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1199"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1200","reference_id":"RHSA-2019:1200","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1200"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1201","reference_id":"RHSA-2019:1201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1202","reference_id":"RHSA-2019:1202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1203","reference_id":"RHSA-2019:1203","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1203"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1204","reference_id":"RHSA-2019:1204","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1204"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1205","reference_id":"RHSA-2019:1205","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1205"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1206","reference_id":"RHSA-2019:1206","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1206"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1207","reference_id":"RHSA-2019:1207","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1207"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1208","reference_id":"RHSA-2019:1208","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1208"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1209","reference_id":"RHSA-2019:1209","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1209"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1455","reference_id":"RHSA-2019:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1455"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2553","reference_id":"RHSA-2019:2553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2553"},{"reference_url":"https://usn.ubuntu.com/3977-1/","reference_id":"USN-3977-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3977-1/"},{"reference_url":"https://usn.ubuntu.com/3977-2/","reference_id":"USN-3977-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3977-2/"},{"reference_url":"https://usn.ubuntu.com/3977-3/","reference_id":"USN-3977-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3977-3/"},{"reference_url":"https://usn.ubuntu.com/3978-1/","reference_id":"USN-3978-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3978-1/"},{"reference_url":"https://usn.ubuntu.com/3979-1/","reference_id":"USN-3979-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3979-1/"},{"reference_url":"https://usn.ubuntu.com/3980-1/","reference_id":"USN-3980-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3980-1/"},{"reference_url":"https://usn.ubuntu.com/3980-2/","reference_id":"USN-3980-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3980-2/"},{"reference_url":"https://usn.ubuntu.com/3981-1/","reference_id":"USN-3981-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3981-1/"},{"reference_url":"https://usn.ubuntu.com/3981-2/","reference_id":"USN-3981-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3981-2/"},{"reference_url":"https://usn.ubuntu.com/3982-1/","reference_id":"USN-3982-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3982-1/"},{"reference_url":"https://usn.ubuntu.com/3982-2/","reference_id":"USN-3982-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3982-2/"},{"reference_url":"https://usn.ubuntu.com/3983-1/","reference_id":"USN-3983-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3983-1/"},{"reference_url":"https://usn.ubuntu.com/3983-2/","reference_id":"USN-3983-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3983-2/"},{"reference_url":"https://usn.ubuntu.com/3984-1/","reference_id":"USN-3984-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3984-1/"},{"reference_url":"https://usn.ubuntu.com/3985-1/","reference_id":"USN-3985-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3985-1/"},{"reference_url":"https://usn.ubuntu.com/3985-2/","reference_id":"USN-3985-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3985-2/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-297.html","reference_id":"XSA-297","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-297.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925515?format=json","purl":"pkg:deb/debian/intel-microcode@3.20190514.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20190514.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2018-12126","XSA-297"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vh89-pyaz-xbdg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71861?format=json","vulnerability_id":"VCID-vsda-kq13-73g1","summary":"microcode_ctl: Improper input validation in UEFI firmware","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34440.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34440.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-34440","reference_id":"","reference_type":"","scores":[{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06186","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06064","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06068","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06088","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05807","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05843","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05838","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05877","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05903","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05884","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05874","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05867","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05832","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.05997","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06028","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-34440"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34440","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34440"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805","reference_id":"1095805","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345401","reference_id":"2345401","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345401"},{"reference_url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html","reference_id":"intel-sa-01139.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-13T20:21:01Z/"}],"url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925539?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925538?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925540?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250211.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2023-34440"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vsda-kq13-73g1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/72801?format=json","vulnerability_id":"VCID-w7k1-y36j-3ye6","summary":"kernel: microcode_ctl: From CVEorg collector","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21853.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21853.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21853","reference_id":"","reference_type":"","scores":[{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09264","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09267","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09213","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09188","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.091","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09149","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09202","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09126","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09206","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09235","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09238","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09192","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09087","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09067","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09223","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21853"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21853","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21853"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087532","reference_id":"1087532","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087532"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2326074","reference_id":"2326074","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2326074"},{"reference_url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01101.html","reference_id":"intel-sa-01101.html","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"5.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-13T21:13:32Z/"}],"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01101.html"},{"reference_url":"https://usn.ubuntu.com/7149-1/","reference_id":"USN-7149-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7149-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925547?format=json","purl":"pkg:deb/debian/intel-microcode@3.20241112.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20241112.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925546?format=json","purl":"pkg:deb/debian/intel-microcode@3.20241112.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20241112.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925548?format=json","purl":"pkg:deb/debian/intel-microcode@3.20241112.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20241112.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2024-21853"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w7k1-y36j-3ye6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71853?format=json","vulnerability_id":"VCID-wgce-vves-guek","summary":"kernel: microcode_ctl: From CVEorg collector","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31068.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31068.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-31068","reference_id":"","reference_type":"","scores":[{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04003","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03978","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03982","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04028","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03986","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03877","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03886","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.039","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03905","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0393","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03899","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0388","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03854","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03833","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03843","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.03962","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-31068"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31068","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31068"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805","reference_id":"1095805","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345359","reference_id":"2345359","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345359"},{"reference_url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01166.html","reference_id":"intel-sa-01166.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H"},{"value":"5.6","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T15:07:29Z/"}],"url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01166.html"},{"reference_url":"https://usn.ubuntu.com/7269-1/","reference_id":"USN-7269-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7269-1/"},{"reference_url":"https://usn.ubuntu.com/7269-2/","reference_id":"USN-7269-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7269-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925539?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925538?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925540?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250211.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2024-31068"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wgce-vves-guek"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69666?format=json","vulnerability_id":"VCID-wqfe-hkrk-nbaj","summary":"microcode_ctl: Exposure of sensitive information","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-43420.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-43420.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-43420","reference_id":"","reference_type":"","scores":[{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26425","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26569","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26561","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26489","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26355","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26838","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26879","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26665","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26734","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26784","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26788","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26743","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26686","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26695","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26666","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26626","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-43420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43420","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43420"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172","reference_id":"1105172","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366159","reference_id":"2366159","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366159"},{"reference_url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01247.html","reference_id":"intel-sa-01247.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"5.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-14T13:59:10Z/"}],"url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01247.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10101","reference_id":"RHSA-2025:10101","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10101"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10102","reference_id":"RHSA-2025:10102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10103","reference_id":"RHSA-2025:10103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10107","reference_id":"RHSA-2025:10107","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10108","reference_id":"RHSA-2025:10108","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10109","reference_id":"RHSA-2025:10109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10111","reference_id":"RHSA-2025:10111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10126","reference_id":"RHSA-2025:10126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10162","reference_id":"RHSA-2025:10162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10162"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10991","reference_id":"RHSA-2025:10991","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10991"},{"reference_url":"https://usn.ubuntu.com/7535-1/","reference_id":"USN-7535-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7535-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925553?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250512.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250512.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925552?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250512.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250512.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925554?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250512.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250512.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2024-43420"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wqfe-hkrk-nbaj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71854?format=json","vulnerability_id":"VCID-wv5f-6x7x-7fdw","summary":"kernel: microcode_ctl: From CVEorg collector","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-36293.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-36293.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-36293","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0756","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07453","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07444","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07415","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07414","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07382","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07427","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07409","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07464","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07487","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07481","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07467","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07456","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07379","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07365","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07493","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-36293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36293"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805","reference_id":"1095805","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345367","reference_id":"2345367","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2345367"},{"reference_url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01213.html","reference_id":"intel-sa-01213.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"6.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T15:27:21Z/"}],"url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01213.html"},{"reference_url":"https://usn.ubuntu.com/7269-1/","reference_id":"USN-7269-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7269-1/"},{"reference_url":"https://usn.ubuntu.com/7269-2/","reference_id":"USN-7269-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7269-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925539?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925538?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925540?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250211.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2024-36293"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wv5f-6x7x-7fdw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96127?format=json","vulnerability_id":"VCID-wyf3-shyh-qyhc","summary":"Sequence of processor instructions leads to unexpected behavior in the Intel(R) DSA V1.0 for some Intel(R) Xeon(R) Processors may allow an authenticated user to potentially enable denial of service via local access.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-37020","reference_id":"","reference_type":"","scores":[{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01361","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01374","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.0138","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01378","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01369","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01281","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01285","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01296","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01301","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01305","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01289","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01283","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01286","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01278","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01291","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01365","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-37020"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37020","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37020"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805","reference_id":"1095805","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095805"},{"reference_url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01194.html","reference_id":"intel-sa-01194.html","reference_type":"","scores":[{"value":"3.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L"},{"value":"4.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-13T14:57:53Z/"}],"url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01194.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925539?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925538?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925540?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250211.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250211.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2024-37020"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wyf3-shyh-qyhc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80229?format=json","vulnerability_id":"VCID-x4zx-7h35-nuf6","summary":"hw: information disclosure on some Intel Atom processors","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-24513.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-24513.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-24513","reference_id":"","reference_type":"","scores":[{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05609","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.06004","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05899","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05916","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05643","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05683","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05675","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05715","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05741","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.0572","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05712","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05706","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05661","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05672","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05821","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05853","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.0589","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-24513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24489","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24489"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24513"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1962666","reference_id":"1962666","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1962666"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989615","reference_id":"989615","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989615"},{"reference_url":"https://security.archlinux.org/ASA-202106-34","reference_id":"ASA-202106-34","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-34"},{"reference_url":"https://security.archlinux.org/AVG-2051","reference_id":"AVG-2051","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2051"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2299","reference_id":"RHSA-2021:2299","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2299"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2300","reference_id":"RHSA-2021:2300","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2300"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2301","reference_id":"RHSA-2021:2301","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2301"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2302","reference_id":"RHSA-2021:2302","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2302"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2303","reference_id":"RHSA-2021:2303","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2303"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2304","reference_id":"RHSA-2021:2304","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2304"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2305","reference_id":"RHSA-2021:2305","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2306","reference_id":"RHSA-2021:2306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2307","reference_id":"RHSA-2021:2307","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2307"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2308","reference_id":"RHSA-2021:2308","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2308"},{"reference_url":"https://usn.ubuntu.com/4985-1/","reference_id":"USN-4985-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4985-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925520?format=json","purl":"pkg:deb/debian/intel-microcode@3.20210608.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20210608.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2020-24513"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x4zx-7h35-nuf6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95707?format=json","vulnerability_id":"VCID-xb28-un42-1uag","summary":"Improper isolation in the Intel(R) Core(TM) Ultra Processor stream cache mechanism may allow an authenticated user to potentially enable escalation of privilege via local access.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42667","reference_id":"","reference_type":"","scores":[{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13877","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.14067","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13933","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13907","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13839","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13722","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.14121","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13927","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.14011","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.14064","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.14019","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13982","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13932","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13836","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.1383","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13902","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42667"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42667","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42667"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078742","reference_id":"1078742","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078742"},{"reference_url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01038.html","reference_id":"intel-sa-01038.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"value":"7.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-14T15:09:41Z/"}],"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01038.html"},{"reference_url":"https://usn.ubuntu.com/6967-1/","reference_id":"USN-6967-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6967-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925541?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925542?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2023-42667"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xb28-un42-1uag"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/90664?format=json","vulnerability_id":"VCID-yzkk-a8az-hff5","summary":"","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3615.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3615.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-3615","reference_id":"","reference_type":"","scores":[{"value":"0.01369","scoring_system":"epss","scoring_elements":"0.8023","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01369","scoring_system":"epss","scoring_elements":"0.80216","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01369","scoring_system":"epss","scoring_elements":"0.80239","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01369","scoring_system":"epss","scoring_elements":"0.80211","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01369","scoring_system":"epss","scoring_elements":"0.8024","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01369","scoring_system":"epss","scoring_elements":"0.80186","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01369","scoring_system":"epss","scoring_elements":"0.80174","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01369","scoring_system":"epss","scoring_elements":"0.80202","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01369","scoring_system":"epss","scoring_elements":"0.8021","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01545","scoring_system":"epss","scoring_elements":"0.81329","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01545","scoring_system":"epss","scoring_elements":"0.81338","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01714","scoring_system":"epss","scoring_elements":"0.82395","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01714","scoring_system":"epss","scoring_elements":"0.82428","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01714","scoring_system":"epss","scoring_elements":"0.82418","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01761","scoring_system":"epss","scoring_elements":"0.82727","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01761","scoring_system":"epss","scoring_elements":"0.82688","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01761","scoring_system":"epss","scoring_elements":"0.82706","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-3615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3615"},{"reference_url":"https://security.archlinux.org/AVG-756","reference_id":"AVG-756","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-756"},{"reference_url":"https://security.archlinux.org/AVG-757","reference_id":"AVG-757","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-757"},{"reference_url":"https://security.archlinux.org/AVG-758","reference_id":"AVG-758","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-758"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925516?format=json","purl":"pkg:deb/debian/intel-microcode@3.20180703.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20180703.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2018-3615"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yzkk-a8az-hff5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95824?format=json","vulnerability_id":"VCID-z8gt-jznd-ryht","summary":"Improper isolation in some Intel(R) Processors stream cache mechanism may allow an authenticated user to potentially enable escalation of privilege via local access.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-49141","reference_id":"","reference_type":"","scores":[{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15924","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16212","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15976","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15973","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15931","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15813","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16273","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16068","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16153","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16217","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.162","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16161","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16093","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16026","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16041","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.16081","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-49141"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49141","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49141"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078742","reference_id":"1078742","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078742"},{"reference_url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01046.html","reference_id":"intel-sa-01046.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"value":"7.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-14T14:39:50Z/"}],"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01046.html"},{"reference_url":"https://usn.ubuntu.com/6967-1/","reference_id":"USN-6967-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6967-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925544?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240514.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240514.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925543?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240514.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240514.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925545?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240514.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240514.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2023-49141"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z8gt-jznd-ryht"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4185?format=json","vulnerability_id":"VCID-z9r8-s6v7-zkgd","summary":"Microarchitectural Data Sampling speculative side channel","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12130.json","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12130.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-12130","reference_id":"","reference_type":"","scores":[{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67464","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.675","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67521","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67551","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67565","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67588","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67574","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67541","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67576","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67589","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67568","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00642","scoring_system":"epss","scoring_elements":"0.70711","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00642","scoring_system":"epss","scoring_elements":"0.70683","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00642","scoring_system":"epss","scoring_elements":"0.70693","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00642","scoring_system":"epss","scoring_elements":"0.70692","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00642","scoring_system":"epss","scoring_elements":"0.7067","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-12130"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1646784","reference_id":"1646784","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1646784"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929129","reference_id":"929129","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929129"},{"reference_url":"https://security.gentoo.org/glsa/202003-56","reference_id":"GLSA-202003-56","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-56"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1155","reference_id":"RHSA-2019:1155","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1155"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1167","reference_id":"RHSA-2019:1167","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1167"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1168","reference_id":"RHSA-2019:1168","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1168"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1169","reference_id":"RHSA-2019:1169","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1169"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1170","reference_id":"RHSA-2019:1170","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1170"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1171","reference_id":"RHSA-2019:1171","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1171"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1172","reference_id":"RHSA-2019:1172","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1172"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1174","reference_id":"RHSA-2019:1174","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1174"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1175","reference_id":"RHSA-2019:1175","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1175"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1176","reference_id":"RHSA-2019:1176","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1176"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1177","reference_id":"RHSA-2019:1177","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1177"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1178","reference_id":"RHSA-2019:1178","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1178"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1179","reference_id":"RHSA-2019:1179","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1179"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1180","reference_id":"RHSA-2019:1180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1181","reference_id":"RHSA-2019:1181","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1181"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1182","reference_id":"RHSA-2019:1182","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1182"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1183","reference_id":"RHSA-2019:1183","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1183"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1184","reference_id":"RHSA-2019:1184","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1184"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1185","reference_id":"RHSA-2019:1185","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1185"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1186","reference_id":"RHSA-2019:1186","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1186"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1187","reference_id":"RHSA-2019:1187","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1187"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1188","reference_id":"RHSA-2019:1188","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1188"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1189","reference_id":"RHSA-2019:1189","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1189"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1190","reference_id":"RHSA-2019:1190","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1190"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1193","reference_id":"RHSA-2019:1193","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1193"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1194","reference_id":"RHSA-2019:1194","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1194"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1195","reference_id":"RHSA-2019:1195","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1195"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1196","reference_id":"RHSA-2019:1196","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1196"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1197","reference_id":"RHSA-2019:1197","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1197"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1198","reference_id":"RHSA-2019:1198","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1198"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1199","reference_id":"RHSA-2019:1199","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1199"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1200","reference_id":"RHSA-2019:1200","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1200"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1201","reference_id":"RHSA-2019:1201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1202","reference_id":"RHSA-2019:1202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1203","reference_id":"RHSA-2019:1203","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1203"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1204","reference_id":"RHSA-2019:1204","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1204"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1205","reference_id":"RHSA-2019:1205","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1205"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1206","reference_id":"RHSA-2019:1206","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1206"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1207","reference_id":"RHSA-2019:1207","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1207"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1208","reference_id":"RHSA-2019:1208","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1208"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1209","reference_id":"RHSA-2019:1209","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1209"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1455","reference_id":"RHSA-2019:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1455"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2553","reference_id":"RHSA-2019:2553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2553"},{"reference_url":"https://usn.ubuntu.com/3977-1/","reference_id":"USN-3977-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3977-1/"},{"reference_url":"https://usn.ubuntu.com/3977-2/","reference_id":"USN-3977-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3977-2/"},{"reference_url":"https://usn.ubuntu.com/3977-3/","reference_id":"USN-3977-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3977-3/"},{"reference_url":"https://usn.ubuntu.com/3978-1/","reference_id":"USN-3978-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3978-1/"},{"reference_url":"https://usn.ubuntu.com/3979-1/","reference_id":"USN-3979-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3979-1/"},{"reference_url":"https://usn.ubuntu.com/3980-1/","reference_id":"USN-3980-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3980-1/"},{"reference_url":"https://usn.ubuntu.com/3980-2/","reference_id":"USN-3980-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3980-2/"},{"reference_url":"https://usn.ubuntu.com/3981-1/","reference_id":"USN-3981-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3981-1/"},{"reference_url":"https://usn.ubuntu.com/3981-2/","reference_id":"USN-3981-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3981-2/"},{"reference_url":"https://usn.ubuntu.com/3982-1/","reference_id":"USN-3982-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3982-1/"},{"reference_url":"https://usn.ubuntu.com/3982-2/","reference_id":"USN-3982-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3982-2/"},{"reference_url":"https://usn.ubuntu.com/3983-1/","reference_id":"USN-3983-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3983-1/"},{"reference_url":"https://usn.ubuntu.com/3983-2/","reference_id":"USN-3983-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3983-2/"},{"reference_url":"https://usn.ubuntu.com/3984-1/","reference_id":"USN-3984-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3984-1/"},{"reference_url":"https://usn.ubuntu.com/3985-1/","reference_id":"USN-3985-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3985-1/"},{"reference_url":"https://usn.ubuntu.com/3985-2/","reference_id":"USN-3985-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3985-2/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-297.html","reference_id":"XSA-297","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-297.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925515?format=json","purl":"pkg:deb/debian/intel-microcode@3.20190514.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20190514.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2018-12130"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z9r8-s6v7-zkgd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69672?format=json","vulnerability_id":"VCID-zcxx-ra5c-hyh9","summary":"microcode_ctl: Insufficient resource pool in the core management mechanism","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-20103.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-20103.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-20103","reference_id":"","reference_type":"","scores":[{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25575","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25777","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.2576","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25731","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25676","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25668","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.2562","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25509","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29457","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29413","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.2936","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29479","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29348","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29412","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29453","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29527","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-20103"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20103","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20103"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172","reference_id":"1105172","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366091","reference_id":"2366091","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366091"},{"reference_url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01244.html","reference_id":"intel-sa-01244.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"5.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-14T13:49:36Z/"}],"url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01244.html"},{"reference_url":"https://usn.ubuntu.com/7535-1/","reference_id":"USN-7535-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7535-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925553?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250512.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250512.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925552?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250512.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250512.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925554?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250512.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250512.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2025-20103"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zcxx-ra5c-hyh9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77964?format=json","vulnerability_id":"VCID-ztyd-jwnm-m3gd","summary":"hw: Intel: execution of MOVSB instructions with redundant REX prefix leads to unintended system behavior","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23583.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23583.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-23583","reference_id":"","reference_type":"","scores":[{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10234","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10149","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10176","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10302","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10321","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10361","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10332","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.1027","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10299","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10196","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51398","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51436","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51443","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51404","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00281","scoring_system":"epss","scoring_elements":"0.51348","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52343","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-23583"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23583","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23583"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055962","reference_id":"1055962","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055962"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2239097","reference_id":"2239097","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2239097"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/11/14/4","reference_id":"4","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-16T13:58:46Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/11/14/4"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/11/14/5","reference_id":"5","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-16T13:58:46Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/11/14/5"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/11/14/6","reference_id":"6","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-16T13:58:46Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/11/14/6"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/11/14/7","reference_id":"7","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-16T13:58:46Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/11/14/7"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/11/14/8","reference_id":"8","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-16T13:58:46Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/11/14/8"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/11/14/9","reference_id":"9","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-16T13:58:46Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/11/14/9"},{"reference_url":"https://www.debian.org/security/2023/dsa-5563","reference_id":"dsa-5563","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-16T13:58:46Z/"}],"url":"https://www.debian.org/security/2023/dsa-5563"},{"reference_url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00950.html","reference_id":"intel-sa-00950.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-16T13:58:46Z/"}],"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00950.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00012.html","reference_id":"msg00012.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-16T13:58:46Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00012.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20231116-0015/","reference_id":"ntap-20231116-0015","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-16T13:58:46Z/"}],"url":"https://security.netapp.com/advisory/ntap-20231116-0015/"},{"reference_url":"https://usn.ubuntu.com/6485-1/","reference_id":"USN-6485-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6485-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925536?format=json","purl":"pkg:deb/debian/intel-microcode@3.20231114.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20231114.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925535?format=json","purl":"pkg:deb/debian/intel-microcode@3.20231114.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20231114.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925537?format=json","purl":"pkg:deb/debian/intel-microcode@3.20231114.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20231114.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2023-23583"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ztyd-jwnm-m3gd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78658?format=json","vulnerability_id":"VCID-zx9g-4trv-hfgc","summary":"kernel: Intel firmware update for improper isolation of shared resources","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38090.json","reference_id":"","reference_type":"","scores":[{"value":"6.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38090.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-38090","reference_id":"","reference_type":"","scores":[{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12557","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12359","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12421","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12311","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12222","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12599","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12407","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12488","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.1254","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.1251","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12472","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12432","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12336","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12338","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12452","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12454","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-38090"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38090","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38090"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031334","reference_id":"1031334","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031334"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2171281","reference_id":"2171281","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2171281"},{"reference_url":"http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00767.html","reference_id":"intel-sa-00767.html","reference_type":"","scores":[{"value":"6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T14:53:30Z/"}],"url":"http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00767.html"},{"reference_url":"https://usn.ubuntu.com/5886-1/","reference_id":"USN-5886-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5886-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925527?format=json","purl":"pkg:deb/debian/intel-microcode@3.20230214.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20230214.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925526?format=json","purl":"pkg:deb/debian/intel-microcode@3.20230214.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20230214.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2022-38090"],"risk_score":2.7,"exploitability":"0.5","weighted_severity":"5.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zx9g-4trv-hfgc"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}