Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/nomad@1.5.3-r0?arch=x86_64&distroversion=v3.18&reponame=community
Typeapk
Namespacealpine
Namenomad
Version1.5.3-r0
Qualifiers
arch x86_64
distroversion v3.18
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-2c5h-xmk3-fkfa
vulnerability_id VCID-2c5h-xmk3-fkfa
summary
HashiCorp Nomad vulnerable to unauthenticated client agent HTTP request privilege escalation
HashiCorp Nomad and Nomad Enterprise versions 1.5.0 up to 1.5.2 allow unauthenticated users to bypass intended ACL authorizations for clusters where mTLS is not enabled. This issue is fixed in version 1.5.3.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1782
reference_id
reference_type
scores
0
value 0.00295
scoring_system epss
scoring_elements 0.52755
published_at 2026-04-09T12:55:00Z
1
value 0.00295
scoring_system epss
scoring_elements 0.52709
published_at 2026-04-07T12:55:00Z
2
value 0.00295
scoring_system epss
scoring_elements 0.52789
published_at 2026-04-12T12:55:00Z
3
value 0.00295
scoring_system epss
scoring_elements 0.52806
published_at 2026-04-11T12:55:00Z
4
value 0.00295
scoring_system epss
scoring_elements 0.5276
published_at 2026-04-08T12:55:00Z
5
value 0.00295
scoring_system epss
scoring_elements 0.52773
published_at 2026-04-13T12:55:00Z
6
value 0.00343
scoring_system epss
scoring_elements 0.5695
published_at 2026-04-18T12:55:00Z
7
value 0.00343
scoring_system epss
scoring_elements 0.56953
published_at 2026-04-16T12:55:00Z
8
value 0.00343
scoring_system epss
scoring_elements 0.56927
published_at 2026-04-21T12:55:00Z
9
value 0.00403
scoring_system epss
scoring_elements 0.60827
published_at 2026-04-04T12:55:00Z
10
value 0.00403
scoring_system epss
scoring_elements 0.60797
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1782
1
reference_url https://discuss.hashicorp.com/t/hcsec-2023-12-nomad-unauthenticated-client-agent-http-request-privilege-escalation/52375
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-10T16:26:59Z/
url https://discuss.hashicorp.com/t/hcsec-2023-12-nomad-unauthenticated-client-agent-http-request-privilege-escalation/52375
2
reference_url https://github.com/hashicorp/nomad
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/hashicorp/nomad
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-1782
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-1782
fixed_packages
0
url pkg:apk/alpine/nomad@1.5.3-r0?arch=x86_64&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/nomad@1.5.3-r0?arch=x86_64&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/nomad@1.5.3-r0%3Farch=x86_64&distroversion=v3.18&reponame=community
aliases CVE-2023-1782, GHSA-f8r8-h93m-mj77
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2c5h-xmk3-fkfa
1
url VCID-4ufj-v5z1-huec
vulnerability_id VCID-4ufj-v5z1-huec
summary Multiple vulnerabilities have been discovered in Go, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-24534.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-24534.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-24534
reference_id
reference_type
scores
0
value 0.00119
scoring_system epss
scoring_elements 0.30833
published_at 2026-04-13T12:55:00Z
1
value 0.00119
scoring_system epss
scoring_elements 0.30809
published_at 2026-04-21T12:55:00Z
2
value 0.00119
scoring_system epss
scoring_elements 0.30844
published_at 2026-04-18T12:55:00Z
3
value 0.00119
scoring_system epss
scoring_elements 0.30864
published_at 2026-04-16T12:55:00Z
4
value 0.00119
scoring_system epss
scoring_elements 0.3083
published_at 2026-04-07T12:55:00Z
5
value 0.00119
scoring_system epss
scoring_elements 0.30888
published_at 2026-04-08T12:55:00Z
6
value 0.00119
scoring_system epss
scoring_elements 0.30918
published_at 2026-04-09T12:55:00Z
7
value 0.00119
scoring_system epss
scoring_elements 0.30921
published_at 2026-04-11T12:55:00Z
8
value 0.00119
scoring_system epss
scoring_elements 0.30878
published_at 2026-04-12T12:55:00Z
9
value 0.00137
scoring_system epss
scoring_elements 0.33636
published_at 2026-04-02T12:55:00Z
10
value 0.00137
scoring_system epss
scoring_elements 0.33669
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-24534
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24534
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24534
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2184483
reference_id 2184483
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2184483
5
reference_url https://go.dev/cl/481994
reference_id 481994
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-12T17:14:51Z/
url https://go.dev/cl/481994
6
reference_url https://go.dev/issue/58975
reference_id 58975
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-12T17:14:51Z/
url https://go.dev/issue/58975
7
reference_url https://pkg.go.dev/vuln/GO-2023-1704
reference_id GO-2023-1704
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-12T17:14:51Z/
url https://pkg.go.dev/vuln/GO-2023-1704
8
reference_url https://security.netapp.com/advisory/ntap-20230526-0007/
reference_id ntap-20230526-0007
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-12T17:14:51Z/
url https://security.netapp.com/advisory/ntap-20230526-0007/
9
reference_url https://access.redhat.com/errata/RHSA-2023:3167
reference_id RHSA-2023:3167
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3167
10
reference_url https://access.redhat.com/errata/RHSA-2023:3318
reference_id RHSA-2023:3318
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3318
11
reference_url https://access.redhat.com/errata/RHSA-2023:3319
reference_id RHSA-2023:3319
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3319
12
reference_url https://access.redhat.com/errata/RHSA-2023:3366
reference_id RHSA-2023:3366
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3366
13
reference_url https://access.redhat.com/errata/RHSA-2023:3367
reference_id RHSA-2023:3367
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3367
14
reference_url https://access.redhat.com/errata/RHSA-2023:3445
reference_id RHSA-2023:3445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3445
15
reference_url https://access.redhat.com/errata/RHSA-2023:3450
reference_id RHSA-2023:3450
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3450
16
reference_url https://access.redhat.com/errata/RHSA-2023:3455
reference_id RHSA-2023:3455
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3455
17
reference_url https://access.redhat.com/errata/RHSA-2023:3536
reference_id RHSA-2023:3536
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3536
18
reference_url https://access.redhat.com/errata/RHSA-2023:3540
reference_id RHSA-2023:3540
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3540
19
reference_url https://access.redhat.com/errata/RHSA-2023:3612
reference_id RHSA-2023:3612
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3612
20
reference_url https://access.redhat.com/errata/RHSA-2023:3624
reference_id RHSA-2023:3624
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3624
21
reference_url https://access.redhat.com/errata/RHSA-2023:3918
reference_id RHSA-2023:3918
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3918
22
reference_url https://access.redhat.com/errata/RHSA-2023:3943
reference_id RHSA-2023:3943
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3943
23
reference_url https://access.redhat.com/errata/RHSA-2023:4003
reference_id RHSA-2023:4003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4003
24
reference_url https://access.redhat.com/errata/RHSA-2023:4335
reference_id RHSA-2023:4335
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4335
25
reference_url https://access.redhat.com/errata/RHSA-2023:4459
reference_id RHSA-2023:4459
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4459
26
reference_url https://access.redhat.com/errata/RHSA-2023:4470
reference_id RHSA-2023:4470
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4470
27
reference_url https://access.redhat.com/errata/RHSA-2023:4627
reference_id RHSA-2023:4627
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4627
28
reference_url https://access.redhat.com/errata/RHSA-2023:4657
reference_id RHSA-2023:4657
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4657
29
reference_url https://access.redhat.com/errata/RHSA-2023:4664
reference_id RHSA-2023:4664
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4664
30
reference_url https://access.redhat.com/errata/RHSA-2023:5964
reference_id RHSA-2023:5964
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5964
31
reference_url https://access.redhat.com/errata/RHSA-2023:5976
reference_id RHSA-2023:5976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5976
32
reference_url https://access.redhat.com/errata/RHSA-2023:6346
reference_id RHSA-2023:6346
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6346
33
reference_url https://access.redhat.com/errata/RHSA-2023:6363
reference_id RHSA-2023:6363
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6363
34
reference_url https://access.redhat.com/errata/RHSA-2023:6402
reference_id RHSA-2023:6402
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6402
35
reference_url https://access.redhat.com/errata/RHSA-2023:6420
reference_id RHSA-2023:6420
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6420
36
reference_url https://access.redhat.com/errata/RHSA-2023:6473
reference_id RHSA-2023:6473
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6473
37
reference_url https://access.redhat.com/errata/RHSA-2023:6474
reference_id RHSA-2023:6474
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6474
38
reference_url https://access.redhat.com/errata/RHSA-2023:6832
reference_id RHSA-2023:6832
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6832
39
reference_url https://access.redhat.com/errata/RHSA-2023:6938
reference_id RHSA-2023:6938
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6938
40
reference_url https://access.redhat.com/errata/RHSA-2023:6939
reference_id RHSA-2023:6939
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6939
41
reference_url https://access.redhat.com/errata/RHSA-2024:2944
reference_id RHSA-2024:2944
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2944
42
reference_url https://usn.ubuntu.com/6038-1/
reference_id USN-6038-1
reference_type
scores
url https://usn.ubuntu.com/6038-1/
43
reference_url https://usn.ubuntu.com/6038-2/
reference_id USN-6038-2
reference_type
scores
url https://usn.ubuntu.com/6038-2/
44
reference_url https://usn.ubuntu.com/6140-1/
reference_id USN-6140-1
reference_type
scores
url https://usn.ubuntu.com/6140-1/
45
reference_url https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8
reference_id Xdv6JL9ENs8
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-12T17:14:51Z/
url https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8
fixed_packages
0
url pkg:apk/alpine/nomad@1.5.3-r0?arch=x86_64&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/nomad@1.5.3-r0?arch=x86_64&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/nomad@1.5.3-r0%3Farch=x86_64&distroversion=v3.18&reponame=community
aliases CVE-2023-24534
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4ufj-v5z1-huec
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/nomad@1.5.3-r0%3Farch=x86_64&distroversion=v3.18&reponame=community