Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/925515?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/925515?format=api", "purl": "pkg:deb/debian/intel-microcode@3.20190514.1?distro=trixie", "type": "deb", "namespace": "debian", "name": "intel-microcode", "version": "3.20190514.1", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "3.20191112.1", "latest_non_vulnerable_version": "3.20260227.1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4184?format=api", "vulnerability_id": "VCID-9yut-bdsw-gkfy", "summary": "Microarchitectural Data Sampling speculative side channel", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12127.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12127.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12127", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65634", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65683", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65713", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65678", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.6573", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65742", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65763", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65748", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65719", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65754", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65767", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65753", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65766", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65777", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65776", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.6575", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65799", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1667782", "reference_id": "1667782", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1667782" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929129", "reference_id": "929129", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929129" }, { "reference_url": "https://security.gentoo.org/glsa/202003-56", "reference_id": "GLSA-202003-56", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-56" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1155", "reference_id": "RHSA-2019:1155", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1155" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1167", "reference_id": "RHSA-2019:1167", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1167" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1168", "reference_id": "RHSA-2019:1168", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1168" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1169", "reference_id": "RHSA-2019:1169", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1169" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1170", "reference_id": "RHSA-2019:1170", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1170" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1171", "reference_id": "RHSA-2019:1171", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1171" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1172", "reference_id": "RHSA-2019:1172", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1172" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1174", "reference_id": "RHSA-2019:1174", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1174" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1175", "reference_id": "RHSA-2019:1175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1175" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1176", "reference_id": "RHSA-2019:1176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1176" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1177", "reference_id": "RHSA-2019:1177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1177" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1178", "reference_id": "RHSA-2019:1178", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1178" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1179", "reference_id": "RHSA-2019:1179", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1179" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1180", "reference_id": "RHSA-2019:1180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1180" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1181", "reference_id": "RHSA-2019:1181", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1181" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1182", "reference_id": "RHSA-2019:1182", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1182" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1183", "reference_id": "RHSA-2019:1183", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1183" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1184", "reference_id": "RHSA-2019:1184", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1184" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1185", "reference_id": "RHSA-2019:1185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1186", "reference_id": "RHSA-2019:1186", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1186" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1187", "reference_id": "RHSA-2019:1187", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1187" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1188", "reference_id": "RHSA-2019:1188", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1188" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1189", "reference_id": "RHSA-2019:1189", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1189" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1190", "reference_id": "RHSA-2019:1190", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1190" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1193", "reference_id": "RHSA-2019:1193", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1193" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1194", "reference_id": "RHSA-2019:1194", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1194" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1195", "reference_id": "RHSA-2019:1195", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1195" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1196", "reference_id": "RHSA-2019:1196", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1196" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1197", "reference_id": "RHSA-2019:1197", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1197" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1198", "reference_id": "RHSA-2019:1198", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1198" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1199", "reference_id": "RHSA-2019:1199", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1199" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1200", "reference_id": "RHSA-2019:1200", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1200" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1201", "reference_id": "RHSA-2019:1201", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1201" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1202", "reference_id": "RHSA-2019:1202", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1202" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1203", "reference_id": "RHSA-2019:1203", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1203" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1204", "reference_id": "RHSA-2019:1204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1205", "reference_id": "RHSA-2019:1205", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1205" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1206", "reference_id": "RHSA-2019:1206", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1206" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1207", "reference_id": "RHSA-2019:1207", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1207" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1208", "reference_id": "RHSA-2019:1208", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1208" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1209", "reference_id": "RHSA-2019:1209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1455", "reference_id": "RHSA-2019:1455", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1455" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2553", "reference_id": "RHSA-2019:2553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2553" }, { "reference_url": "https://usn.ubuntu.com/3977-1/", "reference_id": "USN-3977-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3977-1/" }, { "reference_url": "https://usn.ubuntu.com/3977-2/", "reference_id": "USN-3977-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3977-2/" }, { "reference_url": "https://usn.ubuntu.com/3977-3/", "reference_id": "USN-3977-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3977-3/" }, { "reference_url": "https://usn.ubuntu.com/3978-1/", "reference_id": "USN-3978-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3978-1/" }, { "reference_url": "https://usn.ubuntu.com/3979-1/", "reference_id": "USN-3979-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3979-1/" }, { "reference_url": "https://usn.ubuntu.com/3980-1/", "reference_id": "USN-3980-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3980-1/" }, { "reference_url": "https://usn.ubuntu.com/3980-2/", "reference_id": "USN-3980-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3980-2/" }, { "reference_url": "https://usn.ubuntu.com/3981-1/", "reference_id": "USN-3981-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3981-1/" }, { "reference_url": "https://usn.ubuntu.com/3981-2/", "reference_id": "USN-3981-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3981-2/" }, { "reference_url": "https://usn.ubuntu.com/3982-1/", "reference_id": "USN-3982-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3982-1/" }, { "reference_url": "https://usn.ubuntu.com/3982-2/", "reference_id": "USN-3982-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3982-2/" }, { "reference_url": "https://usn.ubuntu.com/3983-1/", "reference_id": "USN-3983-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3983-1/" }, { "reference_url": "https://usn.ubuntu.com/3983-2/", "reference_id": "USN-3983-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3983-2/" }, { "reference_url": "https://usn.ubuntu.com/3984-1/", "reference_id": "USN-3984-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3984-1/" }, { "reference_url": "https://usn.ubuntu.com/3985-1/", "reference_id": "USN-3985-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3985-1/" }, { "reference_url": "https://usn.ubuntu.com/3985-2/", "reference_id": "USN-3985-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3985-2/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-297.html", "reference_id": "XSA-297", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-297.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/925515?format=api", "purl": "pkg:deb/debian/intel-microcode@3.20190514.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20190514.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925512?format=api", "purl": "pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-38q7-4ar3-sqcc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925510?format=api", "purl": "pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-38q7-4ar3-sqcc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925514?format=api", "purl": "pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-38q7-4ar3-sqcc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925513?format=api", "purl": "pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie" } ], "aliases": [ "CVE-2018-12127" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9yut-bdsw-gkfy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4186?format=api", "vulnerability_id": "VCID-k45n-139y-pyeq", "summary": "Microarchitectural Data Sampling speculative side channel", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11091.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11091.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-11091", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.82207", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.8222", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.8224", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.82236", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.82262", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.8227", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.82289", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.82282", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.82276", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.82312", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.82314", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.82335", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.82346", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.8235", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.82368", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.82389", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-11091" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705312", "reference_id": "1705312", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705312" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929129", "reference_id": "929129", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929129" }, { "reference_url": "https://security.gentoo.org/glsa/202003-56", "reference_id": "GLSA-202003-56", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-56" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1155", "reference_id": "RHSA-2019:1155", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1155" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1167", "reference_id": "RHSA-2019:1167", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1167" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1168", "reference_id": "RHSA-2019:1168", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1168" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1169", "reference_id": "RHSA-2019:1169", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1169" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1170", "reference_id": "RHSA-2019:1170", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1170" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1171", "reference_id": "RHSA-2019:1171", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1171" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1172", "reference_id": "RHSA-2019:1172", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1172" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1174", "reference_id": "RHSA-2019:1174", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1174" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1175", "reference_id": "RHSA-2019:1175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1175" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1176", "reference_id": "RHSA-2019:1176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1176" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1177", "reference_id": "RHSA-2019:1177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1177" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1178", "reference_id": "RHSA-2019:1178", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1178" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1179", "reference_id": "RHSA-2019:1179", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1179" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1180", "reference_id": "RHSA-2019:1180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1180" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1181", "reference_id": "RHSA-2019:1181", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1181" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1182", "reference_id": "RHSA-2019:1182", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1182" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1183", "reference_id": "RHSA-2019:1183", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1183" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1184", "reference_id": "RHSA-2019:1184", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1184" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1185", "reference_id": "RHSA-2019:1185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1186", "reference_id": "RHSA-2019:1186", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1186" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1187", "reference_id": "RHSA-2019:1187", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1187" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1188", "reference_id": "RHSA-2019:1188", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1188" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1189", "reference_id": "RHSA-2019:1189", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1189" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1190", "reference_id": "RHSA-2019:1190", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1190" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1193", "reference_id": "RHSA-2019:1193", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1193" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1194", "reference_id": "RHSA-2019:1194", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1194" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1195", "reference_id": "RHSA-2019:1195", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1195" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1196", "reference_id": "RHSA-2019:1196", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1196" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1197", "reference_id": "RHSA-2019:1197", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1197" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1198", "reference_id": "RHSA-2019:1198", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1198" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1199", "reference_id": "RHSA-2019:1199", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1199" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1200", "reference_id": "RHSA-2019:1200", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1200" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1201", "reference_id": "RHSA-2019:1201", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1201" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1202", "reference_id": "RHSA-2019:1202", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1202" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1203", "reference_id": "RHSA-2019:1203", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1203" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1204", "reference_id": "RHSA-2019:1204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1205", "reference_id": "RHSA-2019:1205", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1205" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1206", "reference_id": "RHSA-2019:1206", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1206" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1207", "reference_id": "RHSA-2019:1207", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1207" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1208", "reference_id": "RHSA-2019:1208", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1208" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1209", "reference_id": "RHSA-2019:1209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1455", "reference_id": "RHSA-2019:1455", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1455" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2553", "reference_id": "RHSA-2019:2553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2553" }, { "reference_url": "https://usn.ubuntu.com/3977-1/", "reference_id": "USN-3977-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3977-1/" }, { "reference_url": "https://usn.ubuntu.com/3977-2/", "reference_id": "USN-3977-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3977-2/" }, { "reference_url": "https://usn.ubuntu.com/3977-3/", "reference_id": "USN-3977-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3977-3/" }, { "reference_url": "https://usn.ubuntu.com/3978-1/", "reference_id": "USN-3978-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3978-1/" }, { "reference_url": "https://usn.ubuntu.com/3979-1/", "reference_id": "USN-3979-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3979-1/" }, { "reference_url": "https://usn.ubuntu.com/3980-1/", "reference_id": "USN-3980-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3980-1/" }, { "reference_url": "https://usn.ubuntu.com/3980-2/", "reference_id": "USN-3980-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3980-2/" }, { "reference_url": "https://usn.ubuntu.com/3981-1/", "reference_id": "USN-3981-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3981-1/" }, { "reference_url": "https://usn.ubuntu.com/3981-2/", "reference_id": "USN-3981-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3981-2/" }, { "reference_url": "https://usn.ubuntu.com/3982-1/", "reference_id": "USN-3982-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3982-1/" }, { "reference_url": "https://usn.ubuntu.com/3982-2/", "reference_id": "USN-3982-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3982-2/" }, { "reference_url": "https://usn.ubuntu.com/3983-1/", "reference_id": "USN-3983-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3983-1/" }, { "reference_url": "https://usn.ubuntu.com/3983-2/", "reference_id": "USN-3983-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3983-2/" }, { "reference_url": "https://usn.ubuntu.com/3984-1/", "reference_id": "USN-3984-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3984-1/" }, { "reference_url": "https://usn.ubuntu.com/3985-1/", "reference_id": "USN-3985-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3985-1/" }, { "reference_url": "https://usn.ubuntu.com/3985-2/", "reference_id": "USN-3985-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3985-2/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-297.html", "reference_id": "XSA-297", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-297.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/925515?format=api", "purl": "pkg:deb/debian/intel-microcode@3.20190514.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20190514.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925512?format=api", "purl": "pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-38q7-4ar3-sqcc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925510?format=api", "purl": "pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-38q7-4ar3-sqcc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925514?format=api", "purl": "pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-38q7-4ar3-sqcc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925513?format=api", "purl": "pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie" } ], "aliases": [ "CVE-2019-11091" ], "risk_score": 1.7, "exploitability": "0.5", "weighted_severity": "3.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k45n-139y-pyeq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4183?format=api", "vulnerability_id": "VCID-vh89-pyaz-xbdg", "summary": "Microarchitectural Data Sampling speculative side channel", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12126.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12126.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12126", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65634", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65683", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65713", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65678", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.6573", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65742", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65763", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65748", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65719", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65754", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65767", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65753", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65766", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65777", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65776", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.6575", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65799", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646781", "reference_id": "1646781", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646781" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929129", "reference_id": "929129", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929129" }, { "reference_url": "https://security.gentoo.org/glsa/202003-56", "reference_id": "GLSA-202003-56", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-56" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1155", "reference_id": "RHSA-2019:1155", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1155" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1167", "reference_id": "RHSA-2019:1167", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1167" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1168", "reference_id": "RHSA-2019:1168", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1168" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1169", "reference_id": "RHSA-2019:1169", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1169" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1170", "reference_id": "RHSA-2019:1170", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1170" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1171", "reference_id": "RHSA-2019:1171", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1171" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1172", "reference_id": "RHSA-2019:1172", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1172" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1174", "reference_id": "RHSA-2019:1174", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1174" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1175", "reference_id": "RHSA-2019:1175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1175" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1176", "reference_id": "RHSA-2019:1176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1176" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1177", "reference_id": "RHSA-2019:1177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1177" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1178", "reference_id": "RHSA-2019:1178", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1178" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1179", "reference_id": "RHSA-2019:1179", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1179" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1180", "reference_id": "RHSA-2019:1180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1180" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1181", "reference_id": "RHSA-2019:1181", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1181" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1182", "reference_id": "RHSA-2019:1182", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1182" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1183", "reference_id": "RHSA-2019:1183", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1183" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1184", "reference_id": "RHSA-2019:1184", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1184" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1185", "reference_id": "RHSA-2019:1185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1186", "reference_id": "RHSA-2019:1186", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1186" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1187", "reference_id": "RHSA-2019:1187", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1187" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1188", "reference_id": "RHSA-2019:1188", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1188" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1189", "reference_id": "RHSA-2019:1189", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1189" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1190", "reference_id": "RHSA-2019:1190", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1190" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1193", "reference_id": "RHSA-2019:1193", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1193" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1194", "reference_id": "RHSA-2019:1194", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1194" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1195", "reference_id": "RHSA-2019:1195", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1195" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1196", "reference_id": "RHSA-2019:1196", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1196" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1197", "reference_id": "RHSA-2019:1197", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1197" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1198", "reference_id": "RHSA-2019:1198", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1198" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1199", "reference_id": "RHSA-2019:1199", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1199" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1200", "reference_id": "RHSA-2019:1200", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1200" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1201", "reference_id": "RHSA-2019:1201", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1201" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1202", "reference_id": "RHSA-2019:1202", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1202" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1203", "reference_id": "RHSA-2019:1203", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1203" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1204", "reference_id": "RHSA-2019:1204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1205", "reference_id": "RHSA-2019:1205", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1205" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1206", "reference_id": "RHSA-2019:1206", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1206" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1207", "reference_id": "RHSA-2019:1207", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1207" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1208", "reference_id": "RHSA-2019:1208", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1208" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1209", "reference_id": "RHSA-2019:1209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1455", "reference_id": "RHSA-2019:1455", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1455" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2553", "reference_id": "RHSA-2019:2553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2553" }, { "reference_url": "https://usn.ubuntu.com/3977-1/", "reference_id": "USN-3977-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3977-1/" }, { "reference_url": "https://usn.ubuntu.com/3977-2/", "reference_id": "USN-3977-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3977-2/" }, { "reference_url": "https://usn.ubuntu.com/3977-3/", "reference_id": "USN-3977-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3977-3/" }, { "reference_url": "https://usn.ubuntu.com/3978-1/", "reference_id": "USN-3978-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3978-1/" }, { "reference_url": "https://usn.ubuntu.com/3979-1/", "reference_id": "USN-3979-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3979-1/" }, { "reference_url": "https://usn.ubuntu.com/3980-1/", "reference_id": "USN-3980-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3980-1/" }, { "reference_url": "https://usn.ubuntu.com/3980-2/", "reference_id": "USN-3980-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3980-2/" }, { "reference_url": "https://usn.ubuntu.com/3981-1/", "reference_id": "USN-3981-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3981-1/" }, { "reference_url": "https://usn.ubuntu.com/3981-2/", "reference_id": "USN-3981-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3981-2/" }, { "reference_url": "https://usn.ubuntu.com/3982-1/", "reference_id": "USN-3982-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3982-1/" }, { "reference_url": "https://usn.ubuntu.com/3982-2/", "reference_id": "USN-3982-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3982-2/" }, { "reference_url": "https://usn.ubuntu.com/3983-1/", "reference_id": "USN-3983-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3983-1/" }, { "reference_url": "https://usn.ubuntu.com/3983-2/", "reference_id": "USN-3983-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3983-2/" }, { "reference_url": "https://usn.ubuntu.com/3984-1/", "reference_id": "USN-3984-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3984-1/" }, { "reference_url": "https://usn.ubuntu.com/3985-1/", "reference_id": "USN-3985-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3985-1/" }, { "reference_url": "https://usn.ubuntu.com/3985-2/", "reference_id": "USN-3985-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3985-2/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-297.html", "reference_id": "XSA-297", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-297.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/925515?format=api", "purl": "pkg:deb/debian/intel-microcode@3.20190514.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20190514.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925512?format=api", "purl": "pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-38q7-4ar3-sqcc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925510?format=api", "purl": "pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-38q7-4ar3-sqcc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925514?format=api", "purl": "pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-38q7-4ar3-sqcc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925513?format=api", "purl": "pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie" } ], "aliases": [ "CVE-2018-12126", "XSA-297" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vh89-pyaz-xbdg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4185?format=api", "vulnerability_id": "VCID-z9r8-s6v7-zkgd", "summary": "Microarchitectural Data Sampling speculative side channel", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12130.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12130.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12130", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67464", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.675", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67521", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67551", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67565", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67588", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67574", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67541", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67576", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67589", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67568", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00642", "scoring_system": "epss", "scoring_elements": "0.70711", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00642", "scoring_system": "epss", "scoring_elements": "0.70683", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00642", "scoring_system": "epss", "scoring_elements": "0.70693", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00642", "scoring_system": "epss", "scoring_elements": "0.70692", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00642", "scoring_system": "epss", "scoring_elements": "0.7067", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12130" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646784", "reference_id": "1646784", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646784" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929129", "reference_id": "929129", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929129" }, { "reference_url": "https://security.gentoo.org/glsa/202003-56", "reference_id": "GLSA-202003-56", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-56" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1155", "reference_id": "RHSA-2019:1155", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1155" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1167", "reference_id": "RHSA-2019:1167", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1167" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1168", "reference_id": "RHSA-2019:1168", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1168" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1169", "reference_id": "RHSA-2019:1169", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1169" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1170", "reference_id": "RHSA-2019:1170", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1170" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1171", "reference_id": "RHSA-2019:1171", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1171" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1172", "reference_id": "RHSA-2019:1172", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1172" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1174", "reference_id": "RHSA-2019:1174", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1174" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1175", "reference_id": "RHSA-2019:1175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1175" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1176", "reference_id": "RHSA-2019:1176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1176" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1177", "reference_id": "RHSA-2019:1177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1177" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1178", "reference_id": "RHSA-2019:1178", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1178" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1179", "reference_id": "RHSA-2019:1179", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1179" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1180", "reference_id": "RHSA-2019:1180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1180" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1181", "reference_id": "RHSA-2019:1181", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1181" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1182", "reference_id": "RHSA-2019:1182", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1182" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1183", "reference_id": "RHSA-2019:1183", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1183" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1184", "reference_id": "RHSA-2019:1184", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1184" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1185", "reference_id": "RHSA-2019:1185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1186", "reference_id": "RHSA-2019:1186", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1186" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1187", "reference_id": "RHSA-2019:1187", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1187" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1188", "reference_id": "RHSA-2019:1188", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1188" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1189", "reference_id": "RHSA-2019:1189", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1189" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1190", "reference_id": "RHSA-2019:1190", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1190" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1193", "reference_id": "RHSA-2019:1193", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1193" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1194", "reference_id": "RHSA-2019:1194", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1194" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1195", "reference_id": "RHSA-2019:1195", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1195" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1196", "reference_id": "RHSA-2019:1196", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1196" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1197", "reference_id": "RHSA-2019:1197", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1197" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1198", "reference_id": "RHSA-2019:1198", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1198" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1199", "reference_id": "RHSA-2019:1199", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1199" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1200", "reference_id": "RHSA-2019:1200", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1200" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1201", "reference_id": "RHSA-2019:1201", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1201" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1202", "reference_id": "RHSA-2019:1202", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1202" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1203", "reference_id": "RHSA-2019:1203", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1203" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1204", "reference_id": "RHSA-2019:1204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1205", "reference_id": "RHSA-2019:1205", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1205" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1206", "reference_id": "RHSA-2019:1206", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1206" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1207", "reference_id": "RHSA-2019:1207", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1207" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1208", "reference_id": "RHSA-2019:1208", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1208" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1209", "reference_id": "RHSA-2019:1209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1455", "reference_id": "RHSA-2019:1455", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1455" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2553", "reference_id": "RHSA-2019:2553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2553" }, { "reference_url": "https://usn.ubuntu.com/3977-1/", "reference_id": "USN-3977-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3977-1/" }, { "reference_url": "https://usn.ubuntu.com/3977-2/", "reference_id": "USN-3977-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3977-2/" }, { "reference_url": "https://usn.ubuntu.com/3977-3/", "reference_id": "USN-3977-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3977-3/" }, { "reference_url": "https://usn.ubuntu.com/3978-1/", "reference_id": "USN-3978-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3978-1/" }, { "reference_url": "https://usn.ubuntu.com/3979-1/", "reference_id": "USN-3979-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3979-1/" }, { "reference_url": "https://usn.ubuntu.com/3980-1/", "reference_id": "USN-3980-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3980-1/" }, { "reference_url": "https://usn.ubuntu.com/3980-2/", "reference_id": "USN-3980-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3980-2/" }, { "reference_url": "https://usn.ubuntu.com/3981-1/", "reference_id": "USN-3981-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3981-1/" }, { "reference_url": "https://usn.ubuntu.com/3981-2/", "reference_id": "USN-3981-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3981-2/" }, { "reference_url": "https://usn.ubuntu.com/3982-1/", "reference_id": "USN-3982-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3982-1/" }, { "reference_url": "https://usn.ubuntu.com/3982-2/", "reference_id": "USN-3982-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3982-2/" }, { "reference_url": "https://usn.ubuntu.com/3983-1/", "reference_id": "USN-3983-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3983-1/" }, { "reference_url": "https://usn.ubuntu.com/3983-2/", "reference_id": "USN-3983-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3983-2/" }, { "reference_url": "https://usn.ubuntu.com/3984-1/", "reference_id": "USN-3984-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3984-1/" }, { "reference_url": "https://usn.ubuntu.com/3985-1/", "reference_id": "USN-3985-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3985-1/" }, { "reference_url": "https://usn.ubuntu.com/3985-2/", "reference_id": "USN-3985-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3985-2/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-297.html", "reference_id": "XSA-297", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-297.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/925515?format=api", "purl": "pkg:deb/debian/intel-microcode@3.20190514.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20190514.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925512?format=api", "purl": "pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-38q7-4ar3-sqcc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925510?format=api", "purl": "pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-38q7-4ar3-sqcc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925514?format=api", "purl": "pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-38q7-4ar3-sqcc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925513?format=api", "purl": "pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie" } ], "aliases": [ "CVE-2018-12130" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z9r8-s6v7-zkgd" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20190514.1%3Fdistro=trixie" }