| 0 |
| url |
VCID-2dmf-rj8w-xycm |
| vulnerability_id |
VCID-2dmf-rj8w-xycm |
| summary |
Denial of Service (DoS) in HashiCorp Consul
HashiCorp Consul and Consul Enterprise could crash when configured with an abnormally-formed service-router entry. Introduced in 1.6.0, fixed in 1.6.6 and 1.7.4.
### Specific Go Packages Affected
github.com/hashicorp/consul/agent/consul/discoverychain |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-12758 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0063 |
| scoring_system |
epss |
| scoring_elements |
0.70361 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.0063 |
| scoring_system |
epss |
| scoring_elements |
0.70242 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.0063 |
| scoring_system |
epss |
| scoring_elements |
0.70219 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.0063 |
| scoring_system |
epss |
| scoring_elements |
0.70265 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.0063 |
| scoring_system |
epss |
| scoring_elements |
0.7028 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.0063 |
| scoring_system |
epss |
| scoring_elements |
0.70304 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.0063 |
| scoring_system |
epss |
| scoring_elements |
0.70289 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.0063 |
| scoring_system |
epss |
| scoring_elements |
0.70276 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.0063 |
| scoring_system |
epss |
| scoring_elements |
0.70317 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.0063 |
| scoring_system |
epss |
| scoring_elements |
0.70326 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.0063 |
| scoring_system |
epss |
| scoring_elements |
0.70308 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.0063 |
| scoring_system |
epss |
| scoring_elements |
0.70212 |
| published_at |
2026-04-01T12:55:00Z |
|
| 12 |
| value |
0.0063 |
| scoring_system |
epss |
| scoring_elements |
0.70225 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-12758 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-12758, GHSA-q2qr-3c2p-9235
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2dmf-rj8w-xycm |
|
| 1 |
| url |
VCID-467g-8bds-t3ef |
| vulnerability_id |
VCID-467g-8bds-t3ef |
| summary |
HashiCorp Consul Incorrect Access Control vulnerability
HashiCorp Consul 1.4.0 through 1.5.0 has Incorrect Access Control. Keys not matching a specific ACL rule used for prefix matching in a policy can be deleted by a token using that policy even with default deny settings configured.
### Specific Go Packages Affected
github.com/hashicorp/consul/acl |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-12291 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0042 |
| scoring_system |
epss |
| scoring_elements |
0.61978 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.0042 |
| scoring_system |
epss |
| scoring_elements |
0.61926 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.0042 |
| scoring_system |
epss |
| scoring_elements |
0.61897 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.0042 |
| scoring_system |
epss |
| scoring_elements |
0.61946 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.0042 |
| scoring_system |
epss |
| scoring_elements |
0.61963 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.0042 |
| scoring_system |
epss |
| scoring_elements |
0.61984 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.0042 |
| scoring_system |
epss |
| scoring_elements |
0.61973 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.0042 |
| scoring_system |
epss |
| scoring_elements |
0.61953 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.0042 |
| scoring_system |
epss |
| scoring_elements |
0.61995 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.0042 |
| scoring_system |
epss |
| scoring_elements |
0.61999 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.0042 |
| scoring_system |
epss |
| scoring_elements |
0.6198 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.0042 |
| scoring_system |
epss |
| scoring_elements |
0.61822 |
| published_at |
2026-04-01T12:55:00Z |
|
| 12 |
| value |
0.0042 |
| scoring_system |
epss |
| scoring_elements |
0.61895 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-12291 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-12291, GHSA-h65h-v7fw-4p38
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-467g-8bds-t3ef |
|
| 2 |
| url |
VCID-cqzz-az3e-kych |
| vulnerability_id |
VCID-cqzz-az3e-kych |
| summary |
Improper Input Validation in HashiCorp Consul
HashiCorp Consul and Consul Enterprise did not appropriately enforce scope for local tokens issued by a primary data center, where replication to a secondary data center was not enabled. Introduced in 1.4.0, fixed in 1.6.6 and 1.7.4.
### Specific Go Packages Affected
github.com/hashicorp/consul/agent |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-13170 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00514 |
| scoring_system |
epss |
| scoring_elements |
0.66613 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00514 |
| scoring_system |
epss |
| scoring_elements |
0.66544 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00514 |
| scoring_system |
epss |
| scoring_elements |
0.66515 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00514 |
| scoring_system |
epss |
| scoring_elements |
0.66564 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00514 |
| scoring_system |
epss |
| scoring_elements |
0.66578 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00514 |
| scoring_system |
epss |
| scoring_elements |
0.66597 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00514 |
| scoring_system |
epss |
| scoring_elements |
0.66585 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00514 |
| scoring_system |
epss |
| scoring_elements |
0.66553 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00514 |
| scoring_system |
epss |
| scoring_elements |
0.66588 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00514 |
| scoring_system |
epss |
| scoring_elements |
0.66606 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00514 |
| scoring_system |
epss |
| scoring_elements |
0.66589 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00514 |
| scoring_system |
epss |
| scoring_elements |
0.6648 |
| published_at |
2026-04-01T12:55:00Z |
|
| 12 |
| value |
0.00514 |
| scoring_system |
epss |
| scoring_elements |
0.66519 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-13170 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-13170, GHSA-p2j5-3f4c-224r
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cqzz-az3e-kych |
|
| 3 |
| url |
VCID-ftvt-9nb3-xue3 |
| vulnerability_id |
VCID-ftvt-9nb3-xue3 |
| summary |
Multiple vulnerabilities have been discovered in HashiCorp Consul, the worst of which could result in denial of service. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-25864 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.8334 |
| scoring_system |
epss |
| scoring_elements |
0.99276 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.8334 |
| scoring_system |
epss |
| scoring_elements |
0.99274 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.8334 |
| scoring_system |
epss |
| scoring_elements |
0.99273 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.8334 |
| scoring_system |
epss |
| scoring_elements |
0.99275 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.84021 |
| scoring_system |
epss |
| scoring_elements |
0.99301 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.84021 |
| scoring_system |
epss |
| scoring_elements |
0.99306 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.84021 |
| scoring_system |
epss |
| scoring_elements |
0.99298 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.84021 |
| scoring_system |
epss |
| scoring_elements |
0.99305 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.84021 |
| scoring_system |
epss |
| scoring_elements |
0.99304 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-25864 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-25864, GHSA-8xmx-h8rq-h94j
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ftvt-9nb3-xue3 |
|
| 4 |
| url |
VCID-gkgb-5g8x-7fgf |
| vulnerability_id |
VCID-gkgb-5g8x-7fgf |
| summary |
Denial of Service (DoS) in HashiCorp Consul
HashiCorp Consul and Consul Enterprise up to 1.6.2 HTTP/RPC services allowed unbounded resource usage, and were susceptible to unauthenticated denial of service. Fixed in 1.6.3.
### Specific Go Packages Affected
github.com/hashicorp/consul/agent/consul |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-7219 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01138 |
| scoring_system |
epss |
| scoring_elements |
0.78452 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.01138 |
| scoring_system |
epss |
| scoring_elements |
0.7842 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.01138 |
| scoring_system |
epss |
| scoring_elements |
0.78403 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.01138 |
| scoring_system |
epss |
| scoring_elements |
0.78395 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.01138 |
| scoring_system |
epss |
| scoring_elements |
0.78424 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.01138 |
| scoring_system |
epss |
| scoring_elements |
0.78423 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.01138 |
| scoring_system |
epss |
| scoring_elements |
0.78418 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.01138 |
| scoring_system |
epss |
| scoring_elements |
0.78341 |
| published_at |
2026-04-01T12:55:00Z |
|
| 8 |
| value |
0.01138 |
| scoring_system |
epss |
| scoring_elements |
0.78347 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.01138 |
| scoring_system |
epss |
| scoring_elements |
0.78378 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.01138 |
| scoring_system |
epss |
| scoring_elements |
0.78362 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.01138 |
| scoring_system |
epss |
| scoring_elements |
0.78388 |
| published_at |
2026-04-08T12:55:00Z |
|
| 12 |
| value |
0.01138 |
| scoring_system |
epss |
| scoring_elements |
0.78394 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-7219 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-7219, GHSA-23jv-v6qj-3fhh
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gkgb-5g8x-7fgf |
|
| 5 |
| url |
VCID-gsqu-g2y4-a7ap |
| vulnerability_id |
VCID-gsqu-g2y4-a7ap |
| summary |
Privilege Escalation in HashiCorp Consul
HashiCorp Consul and Consul Enterprise 1.2.0 up to 1.8.5 allowed operators with operator:read ACL permissions to read the Connect CA private key configuration. Fixed in 1.6.10, 1.7.10, and 1.8.6. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-28053 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00257 |
| scoring_system |
epss |
| scoring_elements |
0.49071 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.00257 |
| scoring_system |
epss |
| scoring_elements |
0.49063 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00257 |
| scoring_system |
epss |
| scoring_elements |
0.4906 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00257 |
| scoring_system |
epss |
| scoring_elements |
0.49039 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00257 |
| scoring_system |
epss |
| scoring_elements |
0.49068 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00257 |
| scoring_system |
epss |
| scoring_elements |
0.49021 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00257 |
| scoring_system |
epss |
| scoring_elements |
0.49075 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00257 |
| scoring_system |
epss |
| scoring_elements |
0.49088 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00257 |
| scoring_system |
epss |
| scoring_elements |
0.49077 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00257 |
| scoring_system |
epss |
| scoring_elements |
0.49109 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00257 |
| scoring_system |
epss |
| scoring_elements |
0.49112 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00257 |
| scoring_system |
epss |
| scoring_elements |
0.49067 |
| published_at |
2026-04-13T12:55:00Z |
|
| 12 |
| value |
0.00257 |
| scoring_system |
epss |
| scoring_elements |
0.49004 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-28053 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-28053, GHSA-6m72-467w-94rh
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gsqu-g2y4-a7ap |
|
| 6 |
| url |
VCID-jm2d-ejbf-qfhz |
| vulnerability_id |
VCID-jm2d-ejbf-qfhz |
| summary |
Allocation of Resources Without Limits or Throttling in Hashicorp Consul
HashiCorp Consul and Consul Enterprise include an HTTP API (introduced in 1.2.0) and DNS (introduced in 1.4.3) caching feature that was vulnerable to denial of service.
### Specific Go Packages Affected
github.com/hashicorp/consul/agent/config
### Fix
The vulnerability is fixed in versions 1.6.6 and 1.7.4. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-13250 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00867 |
| scoring_system |
epss |
| scoring_elements |
0.75224 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00867 |
| scoring_system |
epss |
| scoring_elements |
0.75109 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00867 |
| scoring_system |
epss |
| scoring_elements |
0.75112 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00867 |
| scoring_system |
epss |
| scoring_elements |
0.75142 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00867 |
| scoring_system |
epss |
| scoring_elements |
0.75119 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00867 |
| scoring_system |
epss |
| scoring_elements |
0.75153 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00867 |
| scoring_system |
epss |
| scoring_elements |
0.75165 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00867 |
| scoring_system |
epss |
| scoring_elements |
0.75187 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00867 |
| scoring_system |
epss |
| scoring_elements |
0.7519 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00867 |
| scoring_system |
epss |
| scoring_elements |
0.75197 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00867 |
| scoring_system |
epss |
| scoring_elements |
0.75186 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-13250 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-13250, GHSA-rqjq-mrgx-85hp
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jm2d-ejbf-qfhz |
|
| 7 |
| url |
VCID-mv9z-hxmr-skfp |
| vulnerability_id |
VCID-mv9z-hxmr-skfp |
| summary |
Denial of service in HashiCorp Consul
HashiCorp Consul Enterprise versions 1.7.0 up to 1.7.8 and 1.8.0 up to 1.8.4 includes a namespace replication bug which can be triggered to cause denial of service via infinite Raft writes. Fixed in 1.7.9 and 1.8.5. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-25201 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01543 |
| scoring_system |
epss |
| scoring_elements |
0.81379 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.01543 |
| scoring_system |
epss |
| scoring_elements |
0.81441 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.01543 |
| scoring_system |
epss |
| scoring_elements |
0.81388 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.01543 |
| scoring_system |
epss |
| scoring_elements |
0.81325 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.01543 |
| scoring_system |
epss |
| scoring_elements |
0.81347 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.01543 |
| scoring_system |
epss |
| scoring_elements |
0.81346 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.01543 |
| scoring_system |
epss |
| scoring_elements |
0.81374 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.01543 |
| scoring_system |
epss |
| scoring_elements |
0.81401 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01543 |
| scoring_system |
epss |
| scoring_elements |
0.81419 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.01543 |
| scoring_system |
epss |
| scoring_elements |
0.81418 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.01543 |
| scoring_system |
epss |
| scoring_elements |
0.81417 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.01543 |
| scoring_system |
epss |
| scoring_elements |
0.8138 |
| published_at |
2026-04-13T12:55:00Z |
|
| 12 |
| value |
0.01543 |
| scoring_system |
epss |
| scoring_elements |
0.81316 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-25201 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-25201, GHSA-496g-fr33-whrf
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mv9z-hxmr-skfp |
|
| 8 |
| url |
VCID-pet2-hhx7-g7fc |
| vulnerability_id |
VCID-pet2-hhx7-g7fc |
| summary |
HashiCorp Consul can use cleartext agent-to-agent RPC communication
HashiCorp Consul 0.5.1 through 1.4.0 can use cleartext agent-to-agent RPC communication because the `verify_outgoing` setting is improperly documented. NOTE: the vendor has provided reconfiguration steps that do not require a software upgrade. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-19653 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00427 |
| scoring_system |
epss |
| scoring_elements |
0.6246 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00427 |
| scoring_system |
epss |
| scoring_elements |
0.62377 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00427 |
| scoring_system |
epss |
| scoring_elements |
0.62407 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00427 |
| scoring_system |
epss |
| scoring_elements |
0.62372 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00427 |
| scoring_system |
epss |
| scoring_elements |
0.62421 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00427 |
| scoring_system |
epss |
| scoring_elements |
0.62438 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00427 |
| scoring_system |
epss |
| scoring_elements |
0.62457 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00427 |
| scoring_system |
epss |
| scoring_elements |
0.62447 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00427 |
| scoring_system |
epss |
| scoring_elements |
0.62425 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00427 |
| scoring_system |
epss |
| scoring_elements |
0.62469 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00427 |
| scoring_system |
epss |
| scoring_elements |
0.62476 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00427 |
| scoring_system |
epss |
| scoring_elements |
0.62319 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-19653 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-19653, GHSA-4qvx-qq5w-695p
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pet2-hhx7-g7fc |
|
| 9 |
| url |
VCID-th2f-96u1-syhg |
| vulnerability_id |
VCID-th2f-96u1-syhg |
| summary |
Incorrect Permission Assignment for Critical Resource in Hashicorp Consul
HashiCorp Consul and Consul Enterprise failed to enforce changes to legacy ACL token rules due to non-propagation to secondary data centers. Introduced in 1.4.0, fixed in 1.6.6 and 1.7.4.
### Specific Go Packages Affected
github.com/hashicorp/consul/agent/structs |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-12797 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61162 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61023 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61101 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61129 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61095 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61143 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61158 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61178 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61165 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61146 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61186 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61192 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61173 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-12797 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-12797, GHSA-hwqm-x785-qh8p
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-th2f-96u1-syhg |
|
| 10 |
| url |
VCID-xzyq-wm1j-dkcu |
| vulnerability_id |
VCID-xzyq-wm1j-dkcu |
| summary |
Incorrect Authorization in HashiCorp Consul
HashiCorp Consul and Consul Enterprise 1.4.1 through 1.6.2 did not uniformly enforce ACLs across all API endpoints, resulting in potential unintended information disclosure. Fixed in 1.6.3. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-7955 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.56013 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.56119 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.56096 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.56079 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.56114 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.56116 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.56087 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.55942 |
| published_at |
2026-04-01T12:55:00Z |
|
| 8 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.56053 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.56074 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.56052 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.56104 |
| published_at |
2026-04-08T12:55:00Z |
|
| 12 |
| value |
0.00332 |
| scoring_system |
epss |
| scoring_elements |
0.56108 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-7955 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-7955, GHSA-r9w6-rhh9-7v53
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xzyq-wm1j-dkcu |
|