Lookup for vulnerable packages by Package URL.
| Purl | pkg:golang/github.com/hashicorp/consul@1.7.4 |
| Type | golang |
| Namespace | github.com/hashicorp |
| Name | consul |
| Version | 1.7.4 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | false |
| Next_non_vulnerable_version | 1.7.9 |
| Latest_non_vulnerable_version | 1.22.5 |
| Affected_by_vulnerabilities |
|
| Fixing_vulnerabilities |
| 0 |
| url |
VCID-2dmf-rj8w-xycm |
| vulnerability_id |
VCID-2dmf-rj8w-xycm |
| summary |
Denial of Service (DoS) in HashiCorp Consul
HashiCorp Consul and Consul Enterprise could crash when configured with an abnormally-formed service-router entry. Introduced in 1.6.0, fixed in 1.6.6 and 1.7.4.
### Specific Go Packages Affected
github.com/hashicorp/consul/agent/consul/discoverychain |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-12758 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0063 |
| scoring_system |
epss |
| scoring_elements |
0.70308 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.0063 |
| scoring_system |
epss |
| scoring_elements |
0.70225 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0063 |
| scoring_system |
epss |
| scoring_elements |
0.70242 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0063 |
| scoring_system |
epss |
| scoring_elements |
0.70219 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0063 |
| scoring_system |
epss |
| scoring_elements |
0.70265 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0063 |
| scoring_system |
epss |
| scoring_elements |
0.7028 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0063 |
| scoring_system |
epss |
| scoring_elements |
0.70304 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0063 |
| scoring_system |
epss |
| scoring_elements |
0.70289 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0063 |
| scoring_system |
epss |
| scoring_elements |
0.70276 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0063 |
| scoring_system |
epss |
| scoring_elements |
0.70317 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0063 |
| scoring_system |
epss |
| scoring_elements |
0.70326 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.0063 |
| scoring_system |
epss |
| scoring_elements |
0.70212 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-12758 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-12758, GHSA-q2qr-3c2p-9235
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2dmf-rj8w-xycm |
|
| 1 |
| url |
VCID-cqzz-az3e-kych |
| vulnerability_id |
VCID-cqzz-az3e-kych |
| summary |
Improper Input Validation in HashiCorp Consul
HashiCorp Consul and Consul Enterprise did not appropriately enforce scope for local tokens issued by a primary data center, where replication to a secondary data center was not enabled. Introduced in 1.4.0, fixed in 1.6.6 and 1.7.4.
### Specific Go Packages Affected
github.com/hashicorp/consul/agent |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-13170 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00514 |
| scoring_system |
epss |
| scoring_elements |
0.66589 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00514 |
| scoring_system |
epss |
| scoring_elements |
0.66519 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00514 |
| scoring_system |
epss |
| scoring_elements |
0.66544 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00514 |
| scoring_system |
epss |
| scoring_elements |
0.66515 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00514 |
| scoring_system |
epss |
| scoring_elements |
0.66564 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00514 |
| scoring_system |
epss |
| scoring_elements |
0.66578 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00514 |
| scoring_system |
epss |
| scoring_elements |
0.66597 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00514 |
| scoring_system |
epss |
| scoring_elements |
0.66585 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00514 |
| scoring_system |
epss |
| scoring_elements |
0.66553 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00514 |
| scoring_system |
epss |
| scoring_elements |
0.66588 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00514 |
| scoring_system |
epss |
| scoring_elements |
0.66606 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00514 |
| scoring_system |
epss |
| scoring_elements |
0.6648 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-13170 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-13170, GHSA-p2j5-3f4c-224r
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cqzz-az3e-kych |
|
| 2 |
| url |
VCID-jm2d-ejbf-qfhz |
| vulnerability_id |
VCID-jm2d-ejbf-qfhz |
| summary |
Allocation of Resources Without Limits or Throttling in Hashicorp Consul
HashiCorp Consul and Consul Enterprise include an HTTP API (introduced in 1.2.0) and DNS (introduced in 1.4.3) caching feature that was vulnerable to denial of service.
### Specific Go Packages Affected
github.com/hashicorp/consul/agent/config
### Fix
The vulnerability is fixed in versions 1.6.6 and 1.7.4. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-13250 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00867 |
| scoring_system |
epss |
| scoring_elements |
0.75186 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00867 |
| scoring_system |
epss |
| scoring_elements |
0.75109 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00867 |
| scoring_system |
epss |
| scoring_elements |
0.75112 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00867 |
| scoring_system |
epss |
| scoring_elements |
0.75142 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00867 |
| scoring_system |
epss |
| scoring_elements |
0.75119 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00867 |
| scoring_system |
epss |
| scoring_elements |
0.75153 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00867 |
| scoring_system |
epss |
| scoring_elements |
0.75165 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00867 |
| scoring_system |
epss |
| scoring_elements |
0.75187 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00867 |
| scoring_system |
epss |
| scoring_elements |
0.7519 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00867 |
| scoring_system |
epss |
| scoring_elements |
0.75197 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-13250 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-13250, GHSA-rqjq-mrgx-85hp
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jm2d-ejbf-qfhz |
|
| 3 |
| url |
VCID-th2f-96u1-syhg |
| vulnerability_id |
VCID-th2f-96u1-syhg |
| summary |
Incorrect Permission Assignment for Critical Resource in Hashicorp Consul
HashiCorp Consul and Consul Enterprise failed to enforce changes to legacy ACL token rules due to non-propagation to secondary data centers. Introduced in 1.4.0, fixed in 1.6.6 and 1.7.4.
### Specific Go Packages Affected
github.com/hashicorp/consul/agent/structs |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-12797 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61173 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61023 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61101 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61129 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61095 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61143 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61158 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61178 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61165 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61146 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61186 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61192 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-12797 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-12797, GHSA-hwqm-x785-qh8p
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-th2f-96u1-syhg |
|
|
| Risk_score | null |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:golang/github.com/hashicorp/consul@1.7.4 |