Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/veyon@0?distro=trixie
Typedeb
Namespacedebian
Nameveyon
Version0
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version4.1.4+repack1-1
Latest_non_vulnerable_version4.9.7+repack1-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-6gg4-xtn1-3ba9
vulnerability_id VCID-6gg4-xtn1-3ba9
summary On Windows the Veyon Service before version 4.4.2 contains an unquoted service path vulnerability, allowing locally authenticated users with administrative privileges to run malicious executables with LocalSystem privileges. Since Veyon users (both students and teachers) usually don't have administrative privileges, this vulnerability is only dangerous in anyway unsafe setups. The problem has been fixed in version 4.4.2. As a workaround, the exploitation of the vulnerability can be prevented by revoking administrative privileges from all potentially untrustworthy users.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-15261
reference_id
reference_type
scores
0
value 0.08057
scoring_system epss
scoring_elements 0.92097
published_at 2026-04-01T12:55:00Z
1
value 0.08057
scoring_system epss
scoring_elements 0.92105
published_at 2026-04-02T12:55:00Z
2
value 0.08057
scoring_system epss
scoring_elements 0.92111
published_at 2026-04-04T12:55:00Z
3
value 0.08057
scoring_system epss
scoring_elements 0.92116
published_at 2026-04-07T12:55:00Z
4
value 0.08057
scoring_system epss
scoring_elements 0.92127
published_at 2026-04-08T12:55:00Z
5
value 0.08057
scoring_system epss
scoring_elements 0.9213
published_at 2026-04-13T12:55:00Z
6
value 0.08057
scoring_system epss
scoring_elements 0.92134
published_at 2026-04-12T12:55:00Z
7
value 0.08057
scoring_system epss
scoring_elements 0.92141
published_at 2026-04-16T12:55:00Z
8
value 0.08057
scoring_system epss
scoring_elements 0.92138
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-15261
1
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/49925.txt
reference_id CVE-2020-15261
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/49925.txt
fixed_packages
0
url pkg:deb/debian/veyon@0?distro=trixie
purl pkg:deb/debian/veyon@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@0%3Fdistro=trixie
1
url pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.5.3%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.5.3%252Brepack1-1%3Fdistro=trixie
2
url pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.7.5%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.7.5%252Brepack1-1%3Fdistro=trixie
3
url pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie
purl pkg:deb/debian/veyon@4.9.5%2Brepack1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.5%252Brepack1-2%3Fdistro=trixie
4
url pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie
purl pkg:deb/debian/veyon@4.9.7%2Brepack1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@4.9.7%252Brepack1-1%3Fdistro=trixie
aliases CVE-2020-15261
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6gg4-xtn1-3ba9
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/veyon@0%3Fdistro=trixie