{"url":"http://public2.vulnerablecode.io/api/packages/925552?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250512.1~deb12u1?distro=trixie","type":"deb","namespace":"debian","name":"intel-microcode","version":"3.20250512.1~deb12u1","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"3.20250512.1","latest_non_vulnerable_version":"3.20260227.1","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69674?format=json","vulnerability_id":"VCID-51nr-8avm-qued","summary":"microcode_ctl: From CVEorg collector","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-20012.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-20012.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-20012","reference_id":"","reference_type":"","scores":[{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21497","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21164","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21369","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21337","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21189","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21187","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21553","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21309","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21387","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21448","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21459","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21421","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21365","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21361","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-20012"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20012"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172","reference_id":"1105172","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366114","reference_id":"2366114","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366114"},{"reference_url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01322.html","reference_id":"intel-sa-01322.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"},{"value":"4.1","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-14T20:19:54Z/"}],"url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01322.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10101","reference_id":"RHSA-2025:10101","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10101"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10102","reference_id":"RHSA-2025:10102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10103","reference_id":"RHSA-2025:10103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10107","reference_id":"RHSA-2025:10107","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10108","reference_id":"RHSA-2025:10108","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10109","reference_id":"RHSA-2025:10109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10111","reference_id":"RHSA-2025:10111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10126","reference_id":"RHSA-2025:10126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10162","reference_id":"RHSA-2025:10162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10162"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10991","reference_id":"RHSA-2025:10991","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10991"},{"reference_url":"https://usn.ubuntu.com/7535-1/","reference_id":"USN-7535-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7535-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925553?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250512.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250512.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925552?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250512.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250512.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925554?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250512.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250512.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2025-20012"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-51nr-8avm-qued"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69665?format=json","vulnerability_id":"VCID-5cgx-1n9u-gqbh","summary":"microcode_ctl: Exposure of sensitive information","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-45332.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-45332.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-45332","reference_id":"","reference_type":"","scores":[{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.27978","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28309","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28263","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28167","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28055","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28474","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28516","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28307","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28372","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28416","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28419","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28376","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28318","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.2833","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-45332"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45332","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45332"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172","reference_id":"1105172","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366162","reference_id":"2366162","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366162"},{"reference_url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01247.html","reference_id":"intel-sa-01247.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"5.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-14T13:56:46Z/"}],"url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01247.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10101","reference_id":"RHSA-2025:10101","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10101"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10102","reference_id":"RHSA-2025:10102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10103","reference_id":"RHSA-2025:10103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10107","reference_id":"RHSA-2025:10107","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10108","reference_id":"RHSA-2025:10108","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10109","reference_id":"RHSA-2025:10109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10111","reference_id":"RHSA-2025:10111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10126","reference_id":"RHSA-2025:10126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10162","reference_id":"RHSA-2025:10162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10162"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10991","reference_id":"RHSA-2025:10991","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10991"},{"reference_url":"https://usn.ubuntu.com/7535-1/","reference_id":"USN-7535-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7535-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925553?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250512.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250512.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925552?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250512.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250512.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925554?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250512.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250512.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2024-45332"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5cgx-1n9u-gqbh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69668?format=json","vulnerability_id":"VCID-5vkn-4rqc-qkbk","summary":"microcode_ctl: From CVEorg collector","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24495.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24495.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24495","reference_id":"","reference_type":"","scores":[{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22271","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21939","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22149","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22104","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21965","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21952","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22314","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22099","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22182","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22236","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22255","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22214","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22154","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24495"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24495","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24495"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172","reference_id":"1105172","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366089","reference_id":"2366089","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366089"},{"reference_url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01322.html","reference_id":"intel-sa-01322.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"6.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-14T17:16:37Z/"}],"url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01322.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10101","reference_id":"RHSA-2025:10101","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10101"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10102","reference_id":"RHSA-2025:10102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10103","reference_id":"RHSA-2025:10103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10107","reference_id":"RHSA-2025:10107","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10108","reference_id":"RHSA-2025:10108","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10109","reference_id":"RHSA-2025:10109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10111","reference_id":"RHSA-2025:10111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10126","reference_id":"RHSA-2025:10126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10162","reference_id":"RHSA-2025:10162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10162"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10991","reference_id":"RHSA-2025:10991","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10991"},{"reference_url":"https://usn.ubuntu.com/7535-1/","reference_id":"USN-7535-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7535-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925553?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250512.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250512.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925552?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250512.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250512.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925554?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250512.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250512.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2025-24495"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5vkn-4rqc-qkbk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69673?format=json","vulnerability_id":"VCID-b55f-n1ed-g7eq","summary":"microcode_ctl: Uncaught exception in the core management mechanism","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-20054.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-20054.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-20054","reference_id":"","reference_type":"","scores":[{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11706","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11737","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11736","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11852","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11821","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11776","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14522","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14669","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14628","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14591","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.1453","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14638","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.1471","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14611","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-20054"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20054","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20054"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172","reference_id":"1105172","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366113","reference_id":"2366113","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366113"},{"reference_url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01244.html","reference_id":"intel-sa-01244.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"6.8","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-14T15:48:16Z/"}],"url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01244.html"},{"reference_url":"https://usn.ubuntu.com/7535-1/","reference_id":"USN-7535-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7535-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925553?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250512.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250512.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925552?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250512.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250512.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925554?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250512.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250512.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2025-20054"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b55f-n1ed-g7eq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4395?format=json","vulnerability_id":"VCID-ejhc-6yqt-gkgv","summary":"x86: Indirect Target Selection","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28956.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28956.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-28956","reference_id":"","reference_type":"","scores":[{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25696","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25764","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25806","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25577","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.2565","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25706","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45504","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45428","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.4551","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45557","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45554","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45419","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45368","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45505","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-28956"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28956","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28956"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172","reference_id":"1105172","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105193","reference_id":"1105193","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105193"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366125","reference_id":"2366125","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366125"},{"reference_url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01153.html","reference_id":"intel-sa-01153.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"5.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-14T14:42:03Z/"}],"url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01153.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10101","reference_id":"RHSA-2025:10101","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10101"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10102","reference_id":"RHSA-2025:10102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10103","reference_id":"RHSA-2025:10103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10107","reference_id":"RHSA-2025:10107","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10108","reference_id":"RHSA-2025:10108","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10109","reference_id":"RHSA-2025:10109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10111","reference_id":"RHSA-2025:10111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10126","reference_id":"RHSA-2025:10126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10162","reference_id":"RHSA-2025:10162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10162"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10991","reference_id":"RHSA-2025:10991","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10991"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13962","reference_id":"RHSA-2025:13962","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13962"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19962","reference_id":"RHSA-2025:19962","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19962"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:20095","reference_id":"RHSA-2025:20095","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:20095"},{"reference_url":"https://usn.ubuntu.com/7535-1/","reference_id":"USN-7535-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7535-1/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-469.html","reference_id":"XSA-469","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-469.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925553?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250512.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250512.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925552?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250512.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250512.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925554?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250512.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250512.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2024-28956","XSA-469"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ejhc-6yqt-gkgv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69671?format=json","vulnerability_id":"VCID-j4ak-hjn5-guat","summary":"microcode_ctl: Exposure of sensitive information","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-20623.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-20623.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-20623","reference_id":"","reference_type":"","scores":[{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26489","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26666","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26626","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26569","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26561","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26838","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26879","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26665","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26734","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26784","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26788","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26743","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26686","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26695","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-20623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20623"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172","reference_id":"1105172","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366133","reference_id":"2366133","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366133"},{"reference_url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01247.html","reference_id":"intel-sa-01247.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"5.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-14T15:10:08Z/"}],"url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01247.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10101","reference_id":"RHSA-2025:10101","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10101"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10102","reference_id":"RHSA-2025:10102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10103","reference_id":"RHSA-2025:10103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10107","reference_id":"RHSA-2025:10107","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10108","reference_id":"RHSA-2025:10108","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10109","reference_id":"RHSA-2025:10109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10111","reference_id":"RHSA-2025:10111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10126","reference_id":"RHSA-2025:10126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10162","reference_id":"RHSA-2025:10162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10162"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10991","reference_id":"RHSA-2025:10991","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10991"},{"reference_url":"https://usn.ubuntu.com/7535-1/","reference_id":"USN-7535-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7535-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925553?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250512.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250512.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925552?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250512.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250512.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925554?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250512.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250512.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2025-20623"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j4ak-hjn5-guat"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69666?format=json","vulnerability_id":"VCID-wqfe-hkrk-nbaj","summary":"microcode_ctl: Exposure of sensitive information","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-43420.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-43420.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-43420","reference_id":"","reference_type":"","scores":[{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26489","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26666","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26626","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26569","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26561","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26838","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26879","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26665","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26734","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26784","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26788","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26743","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26686","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26695","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-43420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43420","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43420"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172","reference_id":"1105172","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366159","reference_id":"2366159","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366159"},{"reference_url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01247.html","reference_id":"intel-sa-01247.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"5.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-14T13:59:10Z/"}],"url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01247.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10101","reference_id":"RHSA-2025:10101","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10101"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10102","reference_id":"RHSA-2025:10102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10103","reference_id":"RHSA-2025:10103","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10103"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10107","reference_id":"RHSA-2025:10107","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10108","reference_id":"RHSA-2025:10108","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10109","reference_id":"RHSA-2025:10109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10111","reference_id":"RHSA-2025:10111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10126","reference_id":"RHSA-2025:10126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10162","reference_id":"RHSA-2025:10162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10162"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10991","reference_id":"RHSA-2025:10991","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10991"},{"reference_url":"https://usn.ubuntu.com/7535-1/","reference_id":"USN-7535-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7535-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925553?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250512.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250512.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925552?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250512.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250512.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925554?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250512.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250512.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2024-43420"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wqfe-hkrk-nbaj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69672?format=json","vulnerability_id":"VCID-zcxx-ra5c-hyh9","summary":"microcode_ctl: Insufficient resource pool in the core management mechanism","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-20103.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-20103.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-20103","reference_id":"","reference_type":"","scores":[{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.2562","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25777","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.2576","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25731","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25676","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25668","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29348","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29453","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29457","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29413","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.2936","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29479","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29527","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29412","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-20103"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20103","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20103"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172","reference_id":"1105172","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366091","reference_id":"2366091","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366091"},{"reference_url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01244.html","reference_id":"intel-sa-01244.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"value":"5.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-14T13:49:36Z/"}],"url":"https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01244.html"},{"reference_url":"https://usn.ubuntu.com/7535-1/","reference_id":"USN-7535-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7535-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925512?format=json","purl":"pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925553?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250512.1~deb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250512.1~deb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925552?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250512.1~deb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250512.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925554?format=json","purl":"pkg:deb/debian/intel-microcode@3.20250512.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250512.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925510?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925514?format=json","purl":"pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-38q7-4ar3-sqcc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925513?format=json","purl":"pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"}],"aliases":["CVE-2025-20103"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zcxx-ra5c-hyh9"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20250512.1~deb12u1%3Fdistro=trixie"}