Lookup for vulnerable packages by Package URL.
| Purl | pkg:golang/github.com/hashicorp/nomad@1.2.6 |
| Type | golang |
| Namespace | github.com/hashicorp |
| Name | nomad |
| Version | 1.2.6 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | false |
| Next_non_vulnerable_version | 1.2.8 |
| Latest_non_vulnerable_version | 1.10.2 |
| Affected_by_vulnerabilities |
|
| Fixing_vulnerabilities |
| 0 |
| url |
VCID-7jkf-h91y-33f3 |
| vulnerability_id |
VCID-7jkf-h91y-33f3 |
| summary |
HashiCorp Nomad vulnerable to Allocation of Resources Without Limits or Throttling
HashiCorp Nomad and Nomad Enterprise 1.x before 1.0.17, 1.1.x before 1.1.12, and 1.2.x before 1.2.6 is vulnerable to Allocation of Resources Without Limits or Throttling. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-24685 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00693 |
| scoring_system |
epss |
| scoring_elements |
0.71884 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00693 |
| scoring_system |
epss |
| scoring_elements |
0.71822 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00693 |
| scoring_system |
epss |
| scoring_elements |
0.7184 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00693 |
| scoring_system |
epss |
| scoring_elements |
0.71814 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00693 |
| scoring_system |
epss |
| scoring_elements |
0.71853 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00693 |
| scoring_system |
epss |
| scoring_elements |
0.71864 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00693 |
| scoring_system |
epss |
| scoring_elements |
0.71888 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00693 |
| scoring_system |
epss |
| scoring_elements |
0.7187 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00693 |
| scoring_system |
epss |
| scoring_elements |
0.71895 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00693 |
| scoring_system |
epss |
| scoring_elements |
0.719 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-24685 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-24685, GHSA-3382-r9q8-4hfg
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7jkf-h91y-33f3 |
|
| 1 |
| url |
VCID-ebpm-9nyy-z7ey |
| vulnerability_id |
VCID-ebpm-9nyy-z7ey |
| summary |
Nomad Spread Job Stanza May Trigger Panic in Servers
Nomad and Nomad Enterprise allows operators with job-submit capabilities to use the spread stanza in a way such that it can cause panic in Nomad servers. This vulnerability, CVE-2022-24684, was fixed in Nomad 1.0.18, 1.1.12, and 1.2.6. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-24684 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00671 |
| scoring_system |
epss |
| scoring_elements |
0.71404 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00671 |
| scoring_system |
epss |
| scoring_elements |
0.71316 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00671 |
| scoring_system |
epss |
| scoring_elements |
0.71334 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00671 |
| scoring_system |
epss |
| scoring_elements |
0.71308 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00671 |
| scoring_system |
epss |
| scoring_elements |
0.71349 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00671 |
| scoring_system |
epss |
| scoring_elements |
0.71362 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00671 |
| scoring_system |
epss |
| scoring_elements |
0.71384 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00671 |
| scoring_system |
epss |
| scoring_elements |
0.71369 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00671 |
| scoring_system |
epss |
| scoring_elements |
0.71352 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00671 |
| scoring_system |
epss |
| scoring_elements |
0.71398 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-24684 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-24684, GHSA-6jm6-cmcp-fqjq
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ebpm-9nyy-z7ey |
|
| 2 |
| url |
VCID-k9md-c96w-7kg1 |
| vulnerability_id |
VCID-k9md-c96w-7kg1 |
| summary |
HashiCorp Nomad Artifact Download Race Condition
HashiCorp Nomad and Nomad Enterprise 0.3.0 through 1.0.17, 1.1.11, and 1.2.5 artifact download functionality has a race condition such that the Nomad client agent could download the wrong artifact into the wrong destination. This issue is fixed in 1.0.18, 1.1.12, and 1.2.6. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-24686 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00356 |
| scoring_system |
epss |
| scoring_elements |
0.57854 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00356 |
| scoring_system |
epss |
| scoring_elements |
0.579 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00356 |
| scoring_system |
epss |
| scoring_elements |
0.57884 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00356 |
| scoring_system |
epss |
| scoring_elements |
0.57882 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00356 |
| scoring_system |
epss |
| scoring_elements |
0.57827 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00356 |
| scoring_system |
epss |
| scoring_elements |
0.57833 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00356 |
| scoring_system |
epss |
| scoring_elements |
0.57864 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00356 |
| scoring_system |
epss |
| scoring_elements |
0.57887 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00356 |
| scoring_system |
epss |
| scoring_elements |
0.57858 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00356 |
| scoring_system |
epss |
| scoring_elements |
0.57879 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-24686 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-24686, GHSA-gwmc-6795-qghj
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-k9md-c96w-7kg1 |
|
| 3 |
| url |
VCID-mt6v-wu59-2fe3 |
| vulnerability_id |
VCID-mt6v-wu59-2fe3 |
| summary |
Arbitrary file reads in HashiCorp Nomad
Nomad is an easy-to-use, flexible, and performant workload orchestrator that can deploy a mix of microservice, batch, containerized, and non-containerized applications. HashiCorp Nomad and Nomad Enterprise 0.9.2 through 1.0.17, 1.1.11, and 1.2.5 allow operators with read-fs and alloc-exec (or job-submit) capabilities to read arbitrary files on the host filesystem as root. There are currently no known workarounds. Users are recommended to upgrade as soon as possible to avoid this issue. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-24683 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00474 |
| scoring_system |
epss |
| scoring_elements |
0.64777 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00474 |
| scoring_system |
epss |
| scoring_elements |
0.6478 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00474 |
| scoring_system |
epss |
| scoring_elements |
0.64742 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00474 |
| scoring_system |
epss |
| scoring_elements |
0.6477 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00474 |
| scoring_system |
epss |
| scoring_elements |
0.64781 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00474 |
| scoring_system |
epss |
| scoring_elements |
0.64764 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00474 |
| scoring_system |
epss |
| scoring_elements |
0.6475 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00474 |
| scoring_system |
epss |
| scoring_elements |
0.6479 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00474 |
| scoring_system |
epss |
| scoring_elements |
0.64702 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00474 |
| scoring_system |
epss |
| scoring_elements |
0.64744 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00474 |
| scoring_system |
epss |
| scoring_elements |
0.64716 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-24683 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-24683, GHSA-wmrx-57hm-mw7r
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mt6v-wu59-2fe3 |
|
|
| Risk_score | null |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:golang/github.com/hashicorp/nomad@1.2.6 |