| 0 |
| url |
VCID-1wv8-rvwu-nye3 |
| vulnerability_id |
VCID-1wv8-rvwu-nye3 |
| summary |
ansible-core Incorrect Authorization vulnerability
A flaw was found in Ansible. The ansible-core `user` module can allow an unprivileged user to silently create or replace the contents of any file on any system path and take ownership of it when a privileged user executes the `user` module against the unprivileged user's home directory. If the unprivileged user has traversal permissions on the directory containing the exploited target file, they retain full control over the contents of the file as its owner. |
| references |
| 0 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:10762 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L |
|
| 1 |
| value |
5.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-06T14:20:56Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:10762 |
|
| 1 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:8969 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L |
|
| 1 |
| value |
5.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-06T14:20:56Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:8969 |
|
| 2 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:9894 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L |
|
| 1 |
| value |
5.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-06T14:20:56Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:9894 |
|
| 3 |
| reference_url |
https://access.redhat.com/errata/RHSA-2025:1861 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L |
|
| 1 |
| value |
5.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-06T14:20:56Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2025:1861 |
|
| 4 |
|
| 5 |
| reference_url |
https://access.redhat.com/security/cve/CVE-2024-9902 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L |
|
| 1 |
| value |
5.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-06T14:20:56Z/ |
|
|
| url |
https://access.redhat.com/security/cve/CVE-2024-9902 |
|
| 6 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-9902 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08887 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08851 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.089 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08831 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08909 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08936 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08935 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-9902 |
|
| 7 |
| reference_url |
https://bugzilla.redhat.com/show_bug.cgi?id=2318271 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L |
|
| 1 |
| value |
5.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-06T14:20:56Z/ |
|
|
| url |
https://bugzilla.redhat.com/show_bug.cgi?id=2318271 |
|
| 8 |
|
| 9 |
|
| 10 |
| reference_url |
https://github.com/ansible/ansible |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L |
|
| 1 |
| value |
5.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/ansible/ansible |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-9902, GHSA-32p4-gm2c-wmch
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1wv8-rvwu-nye3 |
|
| 1 |
| url |
VCID-3jej-4jyp-cqbt |
| vulnerability_id |
VCID-3jej-4jyp-cqbt |
| summary |
An archive traversal flaw was found in all ansible-engine versions 2.9.x prior to 2.9.7, when running ansible-galaxy collection install. When extracting a collection .tar.gz file, the directory is created without sanitizing the filename. An attacker could take advantage to overwrite any file within the system. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10691 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00098 |
| scoring_system |
epss |
| scoring_elements |
0.26919 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00098 |
| scoring_system |
epss |
| scoring_elements |
0.26976 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00098 |
| scoring_system |
epss |
| scoring_elements |
0.2702 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00098 |
| scoring_system |
epss |
| scoring_elements |
0.27017 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00098 |
| scoring_system |
epss |
| scoring_elements |
0.26971 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00098 |
| scoring_system |
epss |
| scoring_elements |
0.26903 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00098 |
| scoring_system |
epss |
| scoring_elements |
0.27113 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00098 |
| scoring_system |
epss |
| scoring_elements |
0.27077 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00098 |
| scoring_system |
epss |
| scoring_elements |
0.27037 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10691 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://github.com/advisories/GHSA-3c67-gc48-983w |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.2 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L |
|
| 1 |
| value |
MODERATE |
| scoring_system |
cvssv3.1_qr |
| scoring_elements |
|
|
| 2 |
| value |
4.8 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/advisories/GHSA-3c67-gc48-983w |
|
| 6 |
| reference_url |
https://github.com/ansible/ansible |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.2 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L |
|
| 1 |
| value |
4.8 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/ansible/ansible |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-10691, GHSA-3c67-gc48-983w, PYSEC-2020-2
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3jej-4jyp-cqbt |
|
| 2 |
| url |
VCID-4pht-n5pc-f3gw |
| vulnerability_id |
VCID-4pht-n5pc-f3gw |
| summary |
Ansible vulnerable to Insertion of Sensitive Information into Log File
A flaw was found in Ansible, where sensitive information stored in Ansible Vault files can be exposed in plaintext during the execution of a playbook. This occurs when using tasks such as include_vars to load vaulted variables without setting the no_log: true parameter, resulting in sensitive data being printed in the playbook output or logs. This can lead to the unintentional disclosure of secrets like passwords or API keys, compromising security and potentially allowing unauthorized access or actions. |
| references |
| 0 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:10762 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:21:23Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:10762 |
|
| 1 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:8969 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:21:23Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:8969 |
|
| 2 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:9894 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:21:23Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:9894 |
|
| 3 |
| reference_url |
https://access.redhat.com/errata/RHSA-2025:1249 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:21:23Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2025:1249 |
|
| 4 |
|
| 5 |
| reference_url |
https://access.redhat.com/security/cve/CVE-2024-8775 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:21:23Z/ |
|
|
| url |
https://access.redhat.com/security/cve/CVE-2024-8775 |
|
| 6 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-8775 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11844 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11929 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11976 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11766 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11849 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11902 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11911 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11872 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-8775 |
|
| 7 |
| reference_url |
https://bugzilla.redhat.com/show_bug.cgi?id=2312119 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:21:23Z/ |
|
|
| url |
https://bugzilla.redhat.com/show_bug.cgi?id=2312119 |
|
| 8 |
|
| 9 |
|
| 10 |
| reference_url |
https://github.com/advisories/GHSA-jpxc-vmjf-9fcj |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
HIGH |
| scoring_system |
cvssv3.1_qr |
| scoring_elements |
|
|
| 2 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 3 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 4 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:21:23Z/ |
|
|
| url |
https://github.com/advisories/GHSA-jpxc-vmjf-9fcj |
|
| 11 |
| reference_url |
https://github.com/ansible/ansible |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/ansible/ansible |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-8775, GHSA-jpxc-vmjf-9fcj
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4pht-n5pc-f3gw |
|
| 3 |
| url |
VCID-5hwt-gkgx-jqb4 |
| vulnerability_id |
VCID-5hwt-gkgx-jqb4 |
| summary |
Ansible 2.5 prior to 2.5.5, and 2.4 prior to 2.4.5, do not honor the no_log task flag for failed tasks. When the no_log flag has been used to protect sensitive data passed to a task from being logged, and that task does not run successfully, Ansible will expose sensitive data in log files and on the terminal of the user running Ansible. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-10855 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03372 |
| scoring_system |
epss |
| scoring_elements |
0.87314 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.03372 |
| scoring_system |
epss |
| scoring_elements |
0.87372 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.03372 |
| scoring_system |
epss |
| scoring_elements |
0.87368 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.03372 |
| scoring_system |
epss |
| scoring_elements |
0.87377 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.03372 |
| scoring_system |
epss |
| scoring_elements |
0.87365 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.03372 |
| scoring_system |
epss |
| scoring_elements |
0.87358 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.03372 |
| scoring_system |
epss |
| scoring_elements |
0.8734 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.03372 |
| scoring_system |
epss |
| scoring_elements |
0.87324 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-10855 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
| reference_url |
https://github.com/ansible/ansible |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.9 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
8.2 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/ansible/ansible |
|
| 19 |
|
| 20 |
| reference_url |
https://usn.ubuntu.com/4072-1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.9 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
8.2 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://usn.ubuntu.com/4072-1 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2018-10855 |
| reference_id |
CVE-2018-10855 |
| reference_type |
|
| scores |
| 0 |
| value |
4.3 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:N/C:P/I:N/A:N |
|
| 1 |
| value |
5.9 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
|
| 2 |
| value |
5.9 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
|
| 3 |
| value |
8.2 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 4 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2018-10855 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/ansible@2.2.1.0-2%2Bdeb9u1 |
| purl |
pkg:deb/debian/ansible@2.2.1.0-2%2Bdeb9u1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1wv8-rvwu-nye3 |
|
| 1 |
| vulnerability |
VCID-3jej-4jyp-cqbt |
|
| 2 |
| vulnerability |
VCID-4pht-n5pc-f3gw |
|
| 3 |
| vulnerability |
VCID-5hwt-gkgx-jqb4 |
|
| 4 |
| vulnerability |
VCID-682j-e2pu-1uee |
|
| 5 |
| vulnerability |
VCID-a49n-tvnt-p3df |
|
| 6 |
| vulnerability |
VCID-ae1r-yq1g-rkem |
|
| 7 |
| vulnerability |
VCID-atun-stks-4kcb |
|
| 8 |
| vulnerability |
VCID-axc3-wcsk-q3eg |
|
| 9 |
| vulnerability |
VCID-b8zs-br97-57av |
|
| 10 |
| vulnerability |
VCID-c1d7-4rje-ayf9 |
|
| 11 |
| vulnerability |
VCID-d4ka-dk4p-kfhb |
|
| 12 |
| vulnerability |
VCID-drt9-vx5r-akgm |
|
| 13 |
| vulnerability |
VCID-dzdx-wae5-8ydy |
|
| 14 |
| vulnerability |
VCID-e3z2-ydhb-gqfg |
|
| 15 |
| vulnerability |
VCID-ezaq-tqd3-4yd1 |
|
| 16 |
| vulnerability |
VCID-ezux-6buh-h7h7 |
|
| 17 |
| vulnerability |
VCID-fj2p-7wkh-1fhq |
|
| 18 |
| vulnerability |
VCID-g2pj-dmae-e3er |
|
| 19 |
| vulnerability |
VCID-geaa-6dxx-tbcw |
|
| 20 |
| vulnerability |
VCID-h1n3-cmte-eugf |
|
| 21 |
| vulnerability |
VCID-hqar-fca3-cbht |
|
| 22 |
| vulnerability |
VCID-jnmu-c8dt-5yb6 |
|
| 23 |
| vulnerability |
VCID-jrxz-b168-7ug4 |
|
| 24 |
| vulnerability |
VCID-kb5h-116p-33b4 |
|
| 25 |
| vulnerability |
VCID-nukv-kkws-xkb1 |
|
| 26 |
| vulnerability |
VCID-puq1-z5h7-pkdg |
|
| 27 |
| vulnerability |
VCID-rdwq-93d6-c7b4 |
|
| 28 |
| vulnerability |
VCID-rknj-nkgs-wyg2 |
|
| 29 |
| vulnerability |
VCID-rsry-fw45-9yev |
|
| 30 |
| vulnerability |
VCID-swpr-3qae-d7fe |
|
| 31 |
| vulnerability |
VCID-uhg5-zpzt-e3gz |
|
| 32 |
| vulnerability |
VCID-ujbp-cc1r-wfe9 |
|
| 33 |
| vulnerability |
VCID-v3h9-1t69-v7a3 |
|
| 34 |
| vulnerability |
VCID-v6rk-y6ws-dkh9 |
|
| 35 |
| vulnerability |
VCID-w8qm-73f3-rkbm |
|
| 36 |
| vulnerability |
VCID-wqm7-2ajr-6ue8 |
|
| 37 |
| vulnerability |
VCID-x5e2-7whc-v3fc |
|
| 38 |
| vulnerability |
VCID-x94k-nxyd-27gs |
|
| 39 |
| vulnerability |
VCID-xg2f-12w4-yqge |
|
| 40 |
| vulnerability |
VCID-xw8r-fn6y-mbhp |
|
| 41 |
| vulnerability |
VCID-y91x-2rch-pkar |
|
| 42 |
| vulnerability |
VCID-yeea-n94x-qqch |
|
| 43 |
| vulnerability |
VCID-yur3-am6j-w7ay |
|
| 44 |
| vulnerability |
VCID-zmr4-652z-r3dm |
|
| 45 |
| vulnerability |
VCID-zzzs-scbg-bbe9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@2.2.1.0-2%252Bdeb9u1 |
|
| 1 |
| url |
pkg:deb/debian/ansible@2.7.7%2Bdfsg-1%2Bdeb10u1 |
| purl |
pkg:deb/debian/ansible@2.7.7%2Bdfsg-1%2Bdeb10u1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1wv8-rvwu-nye3 |
|
| 1 |
| vulnerability |
VCID-3jej-4jyp-cqbt |
|
| 2 |
| vulnerability |
VCID-4pht-n5pc-f3gw |
|
| 3 |
| vulnerability |
VCID-682j-e2pu-1uee |
|
| 4 |
| vulnerability |
VCID-a49n-tvnt-p3df |
|
| 5 |
| vulnerability |
VCID-ae1r-yq1g-rkem |
|
| 6 |
| vulnerability |
VCID-atun-stks-4kcb |
|
| 7 |
| vulnerability |
VCID-axc3-wcsk-q3eg |
|
| 8 |
| vulnerability |
VCID-b8zs-br97-57av |
|
| 9 |
| vulnerability |
VCID-d4ka-dk4p-kfhb |
|
| 10 |
| vulnerability |
VCID-dzdx-wae5-8ydy |
|
| 11 |
| vulnerability |
VCID-e3z2-ydhb-gqfg |
|
| 12 |
| vulnerability |
VCID-ezaq-tqd3-4yd1 |
|
| 13 |
| vulnerability |
VCID-ezux-6buh-h7h7 |
|
| 14 |
| vulnerability |
VCID-fj2p-7wkh-1fhq |
|
| 15 |
| vulnerability |
VCID-g2pj-dmae-e3er |
|
| 16 |
| vulnerability |
VCID-geaa-6dxx-tbcw |
|
| 17 |
| vulnerability |
VCID-h1n3-cmte-eugf |
|
| 18 |
| vulnerability |
VCID-hqar-fca3-cbht |
|
| 19 |
| vulnerability |
VCID-jnmu-c8dt-5yb6 |
|
| 20 |
| vulnerability |
VCID-jrxz-b168-7ug4 |
|
| 21 |
| vulnerability |
VCID-kb5h-116p-33b4 |
|
| 22 |
| vulnerability |
VCID-nukv-kkws-xkb1 |
|
| 23 |
| vulnerability |
VCID-rdwq-93d6-c7b4 |
|
| 24 |
| vulnerability |
VCID-rsry-fw45-9yev |
|
| 25 |
| vulnerability |
VCID-swpr-3qae-d7fe |
|
| 26 |
| vulnerability |
VCID-uhg5-zpzt-e3gz |
|
| 27 |
| vulnerability |
VCID-ujbp-cc1r-wfe9 |
|
| 28 |
| vulnerability |
VCID-v3h9-1t69-v7a3 |
|
| 29 |
| vulnerability |
VCID-v6rk-y6ws-dkh9 |
|
| 30 |
| vulnerability |
VCID-w8qm-73f3-rkbm |
|
| 31 |
| vulnerability |
VCID-x5e2-7whc-v3fc |
|
| 32 |
| vulnerability |
VCID-x94k-nxyd-27gs |
|
| 33 |
| vulnerability |
VCID-xg2f-12w4-yqge |
|
| 34 |
| vulnerability |
VCID-xw8r-fn6y-mbhp |
|
| 35 |
| vulnerability |
VCID-yeea-n94x-qqch |
|
| 36 |
| vulnerability |
VCID-yur3-am6j-w7ay |
|
| 37 |
| vulnerability |
VCID-zzzs-scbg-bbe9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@2.7.7%252Bdfsg-1%252Bdeb10u1 |
|
|
| aliases |
CVE-2018-10855, GHSA-jwcc-j78w-j73w, PYSEC-2018-42
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5hwt-gkgx-jqb4 |
|
| 4 |
| url |
VCID-682j-e2pu-1uee |
| vulnerability_id |
VCID-682j-e2pu-1uee |
| summary |
Improper Neutralization of Special Elements Used in a Template Engine
A template injection flaw was found in Ansible where a user's controller internal templating operations may remove the unsafe designation from template data. This issue could allow an attacker to use a specially crafted file to introduce code injection when supplying templating data. |
| references |
| 0 |
| reference_url |
https://access.redhat.com/errata/RHSA-2023:7773 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.6 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-19T03:55:28Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2023:7773 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-5764 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.2163 |
| published_at |
2026-04-08T12:55:00Z |
|
| 1 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21687 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21801 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21552 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21699 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21746 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.2166 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21603 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-5764 |
|
| 3 |
| reference_url |
https://bugzilla.redhat.com/show_bug.cgi?id=2247629 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.6 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-19T03:55:28Z/ |
|
|
| url |
https://bugzilla.redhat.com/show_bug.cgi?id=2247629 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
| reference_url |
https://access.redhat.com/security/cve/CVE-2023-5764 |
| reference_id |
CVE-2023-5764 |
| reference_type |
|
| scores |
| 0 |
| value |
6.6 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-19T03:55:28Z/ |
|
|
| url |
https://access.redhat.com/security/cve/CVE-2023-5764 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-5764, GHSA-7j69-qfc3-2fq9
|
| risk_score |
3.2 |
| exploitability |
0.5 |
| weighted_severity |
6.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-682j-e2pu-1uee |
|
| 5 |
| url |
VCID-a49n-tvnt-p3df |
| vulnerability_id |
VCID-a49n-tvnt-p3df |
| summary |
A vulnerability was found in Ansible Engine versions 2.9.x before 2.9.3, 2.8.x before 2.8.8, 2.7.x before 2.7.16 and earlier, where in Ansible's nxos_file_copy module can be used to copy files to a flash or bootflash on NXOS devices. Malicious code could craft the filename parameter to perform OS command injections. This could result in a loss of confidentiality of the system among other issues. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-14905 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15751 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15692 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15607 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15801 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15738 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.157 |
| published_at |
2026-04-01T12:55:00Z |
|
| 6 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15683 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15618 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15718 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-14905 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
| reference_url |
https://github.com/ansible/ansible |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.6 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L |
|
| 1 |
| value |
7.0 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/ansible/ansible |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2019-14905 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.6 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:L/AC:L/Au:N/C:P/I:P/A:P |
|
| 1 |
| value |
7.3 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L |
|
| 2 |
| value |
5.6 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L |
|
| 3 |
| value |
7.0 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N |
|
| 4 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2019-14905 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-14905, GHSA-frxj-5j27-f8rf, PYSEC-2020-206
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-a49n-tvnt-p3df |
|
| 6 |
| url |
VCID-ae1r-yq1g-rkem |
| vulnerability_id |
VCID-ae1r-yq1g-rkem |
| summary |
A flaw was found in Ansible 2.7.17 and prior, 2.8.9 and prior, and 2.9.6 and prior when using the Extract-Zip function from the win_unzip module as the extracted file(s) are not checked if they belong to the destination folder. An attacker could take advantage of this flaw by crafting an archive anywhere in the file system, using a path traversal. This issue is fixed in 2.10. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-1737 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00119 |
| scoring_system |
epss |
| scoring_elements |
0.30802 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00119 |
| scoring_system |
epss |
| scoring_elements |
0.30848 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00119 |
| scoring_system |
epss |
| scoring_elements |
0.30983 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00119 |
| scoring_system |
epss |
| scoring_elements |
0.3089 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00119 |
| scoring_system |
epss |
| scoring_elements |
0.30889 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00119 |
| scoring_system |
epss |
| scoring_elements |
0.30858 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00119 |
| scoring_system |
epss |
| scoring_elements |
0.308 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00119 |
| scoring_system |
epss |
| scoring_elements |
0.30936 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00119 |
| scoring_system |
epss |
| scoring_elements |
0.30807 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-1737 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
| reference_url |
https://github.com/samdoran/ansible |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
8.5 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/samdoran/ansible |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-1737, GHSA-893h-35v4-mxqx, PYSEC-2020-9
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ae1r-yq1g-rkem |
|
| 7 |
| url |
VCID-atun-stks-4kcb |
| vulnerability_id |
VCID-atun-stks-4kcb |
| summary |
Insertion of Sensitive Information into Log File
A flaw was found in ansible module where credentials are disclosed in the console log by default and not protected by the security feature when using the bitbucket_pipeline_variable module. This flaw allows an attacker to steal bitbucket_pipeline credentials. The highest threat from this vulnerability is to confidentiality. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-20180 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11284 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11312 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11345 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11339 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11285 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11204 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11412 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11355 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11208 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-20180 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-20180, GHSA-fh5v-5f35-2rv2
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-atun-stks-4kcb |
|
| 8 |
| url |
VCID-axc3-wcsk-q3eg |
| vulnerability_id |
VCID-axc3-wcsk-q3eg |
| summary |
A flaw was found in Ansible, where a user's controller is vulnerable to template injection. This issue can occur through facts used in the template if the user is trying to put templates in multi-line YAML strings and the facts being handled do not routinely include special template characters. This flaw allows attackers to perform command injection, which discloses sensitive information. The highest threat from this vulnerability is to confidentiality and integrity. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3583 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.5489 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.54913 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.54931 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.54919 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.54804 |
| published_at |
2026-04-01T12:55:00Z |
|
| 5 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.5487 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.54901 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.54875 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.5492 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3583 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://github.com/ansible/ansible |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N |
|
| 1 |
| value |
8.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/ansible/ansible |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3583, GHSA-2pfh-q76x-gwvm, PYSEC-2021-358
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-axc3-wcsk-q3eg |
|
| 9 |
| url |
VCID-b8zs-br97-57av |
| vulnerability_id |
VCID-b8zs-br97-57av |
| summary |
A flaw was found in Ansible 2.7.16 and prior, 2.8.8 and prior, and 2.9.5 and prior when a password is set with the argument "password" of svn module, it is used on svn command line, disclosing to other users within the same node. An attacker could take advantage by reading the cmdline file from that particular PID on the procfs. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-1739 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13748 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13797 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13834 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13865 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13815 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.1378 |
| published_at |
2026-04-01T12:55:00Z |
|
| 6 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13874 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.1393 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13732 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-1739 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
| reference_url |
https://github.com/ansible/ansible |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
3.9 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N |
|
| 1 |
| value |
2.4 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/ansible/ansible |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2020-1739 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
3.3 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:L/AC:M/Au:N/C:P/I:P/A:N |
|
| 1 |
| value |
3.9 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N |
|
| 2 |
| value |
2.4 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 3 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2020-1739 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/ansible@2.7.7%2Bdfsg-1%2Bdeb10u1 |
| purl |
pkg:deb/debian/ansible@2.7.7%2Bdfsg-1%2Bdeb10u1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1wv8-rvwu-nye3 |
|
| 1 |
| vulnerability |
VCID-3jej-4jyp-cqbt |
|
| 2 |
| vulnerability |
VCID-4pht-n5pc-f3gw |
|
| 3 |
| vulnerability |
VCID-682j-e2pu-1uee |
|
| 4 |
| vulnerability |
VCID-a49n-tvnt-p3df |
|
| 5 |
| vulnerability |
VCID-ae1r-yq1g-rkem |
|
| 6 |
| vulnerability |
VCID-atun-stks-4kcb |
|
| 7 |
| vulnerability |
VCID-axc3-wcsk-q3eg |
|
| 8 |
| vulnerability |
VCID-b8zs-br97-57av |
|
| 9 |
| vulnerability |
VCID-d4ka-dk4p-kfhb |
|
| 10 |
| vulnerability |
VCID-dzdx-wae5-8ydy |
|
| 11 |
| vulnerability |
VCID-e3z2-ydhb-gqfg |
|
| 12 |
| vulnerability |
VCID-ezaq-tqd3-4yd1 |
|
| 13 |
| vulnerability |
VCID-ezux-6buh-h7h7 |
|
| 14 |
| vulnerability |
VCID-fj2p-7wkh-1fhq |
|
| 15 |
| vulnerability |
VCID-g2pj-dmae-e3er |
|
| 16 |
| vulnerability |
VCID-geaa-6dxx-tbcw |
|
| 17 |
| vulnerability |
VCID-h1n3-cmte-eugf |
|
| 18 |
| vulnerability |
VCID-hqar-fca3-cbht |
|
| 19 |
| vulnerability |
VCID-jnmu-c8dt-5yb6 |
|
| 20 |
| vulnerability |
VCID-jrxz-b168-7ug4 |
|
| 21 |
| vulnerability |
VCID-kb5h-116p-33b4 |
|
| 22 |
| vulnerability |
VCID-nukv-kkws-xkb1 |
|
| 23 |
| vulnerability |
VCID-rdwq-93d6-c7b4 |
|
| 24 |
| vulnerability |
VCID-rsry-fw45-9yev |
|
| 25 |
| vulnerability |
VCID-swpr-3qae-d7fe |
|
| 26 |
| vulnerability |
VCID-uhg5-zpzt-e3gz |
|
| 27 |
| vulnerability |
VCID-ujbp-cc1r-wfe9 |
|
| 28 |
| vulnerability |
VCID-v3h9-1t69-v7a3 |
|
| 29 |
| vulnerability |
VCID-v6rk-y6ws-dkh9 |
|
| 30 |
| vulnerability |
VCID-w8qm-73f3-rkbm |
|
| 31 |
| vulnerability |
VCID-x5e2-7whc-v3fc |
|
| 32 |
| vulnerability |
VCID-x94k-nxyd-27gs |
|
| 33 |
| vulnerability |
VCID-xg2f-12w4-yqge |
|
| 34 |
| vulnerability |
VCID-xw8r-fn6y-mbhp |
|
| 35 |
| vulnerability |
VCID-yeea-n94x-qqch |
|
| 36 |
| vulnerability |
VCID-yur3-am6j-w7ay |
|
| 37 |
| vulnerability |
VCID-zzzs-scbg-bbe9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@2.7.7%252Bdfsg-1%252Bdeb10u1 |
|
| 1 |
|
|
| aliases |
CVE-2020-1739, GHSA-923p-fr2c-g5m2, PYSEC-2020-11
|
| risk_score |
1.8 |
| exploitability |
0.5 |
| weighted_severity |
3.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-b8zs-br97-57av |
|
| 10 |
| url |
VCID-c1d7-4rje-ayf9 |
| vulnerability_id |
VCID-c1d7-4rje-ayf9 |
| summary |
A flaw was found in the way Ansible (2.3.x before 2.3.3, and 2.4.x before 2.4.1) passed certain parameters to the jenkins_plugin module. Remote attackers could use this flaw to expose sensitive information from a remote host's logs. This flaw was fixed by not allowing passwords to be specified in the "params" argument, and noting this in the module documentation. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7550 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00675 |
| scoring_system |
epss |
| scoring_elements |
0.71454 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00675 |
| scoring_system |
epss |
| scoring_elements |
0.71419 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00675 |
| scoring_system |
epss |
| scoring_elements |
0.71411 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00675 |
| scoring_system |
epss |
| scoring_elements |
0.71412 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00675 |
| scoring_system |
epss |
| scoring_elements |
0.71437 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00675 |
| scoring_system |
epss |
| scoring_elements |
0.71453 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00675 |
| scoring_system |
epss |
| scoring_elements |
0.71465 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00675 |
| scoring_system |
epss |
| scoring_elements |
0.71488 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00675 |
| scoring_system |
epss |
| scoring_elements |
0.71472 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7550 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://github.com/ansible/ansible |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
9.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
CRITICAL |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/ansible/ansible |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2017-7550 |
| reference_id |
CVE-2017-7550 |
| reference_type |
|
| scores |
| 0 |
| value |
5.0 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:L/Au:N/C:P/I:N/A:N |
|
| 1 |
| value |
9.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 2 |
| value |
9.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 3 |
| value |
CRITICAL |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2017-7550 |
|
| 14 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/ansible@2.7.7%2Bdfsg-1%2Bdeb10u1 |
| purl |
pkg:deb/debian/ansible@2.7.7%2Bdfsg-1%2Bdeb10u1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1wv8-rvwu-nye3 |
|
| 1 |
| vulnerability |
VCID-3jej-4jyp-cqbt |
|
| 2 |
| vulnerability |
VCID-4pht-n5pc-f3gw |
|
| 3 |
| vulnerability |
VCID-682j-e2pu-1uee |
|
| 4 |
| vulnerability |
VCID-a49n-tvnt-p3df |
|
| 5 |
| vulnerability |
VCID-ae1r-yq1g-rkem |
|
| 6 |
| vulnerability |
VCID-atun-stks-4kcb |
|
| 7 |
| vulnerability |
VCID-axc3-wcsk-q3eg |
|
| 8 |
| vulnerability |
VCID-b8zs-br97-57av |
|
| 9 |
| vulnerability |
VCID-d4ka-dk4p-kfhb |
|
| 10 |
| vulnerability |
VCID-dzdx-wae5-8ydy |
|
| 11 |
| vulnerability |
VCID-e3z2-ydhb-gqfg |
|
| 12 |
| vulnerability |
VCID-ezaq-tqd3-4yd1 |
|
| 13 |
| vulnerability |
VCID-ezux-6buh-h7h7 |
|
| 14 |
| vulnerability |
VCID-fj2p-7wkh-1fhq |
|
| 15 |
| vulnerability |
VCID-g2pj-dmae-e3er |
|
| 16 |
| vulnerability |
VCID-geaa-6dxx-tbcw |
|
| 17 |
| vulnerability |
VCID-h1n3-cmte-eugf |
|
| 18 |
| vulnerability |
VCID-hqar-fca3-cbht |
|
| 19 |
| vulnerability |
VCID-jnmu-c8dt-5yb6 |
|
| 20 |
| vulnerability |
VCID-jrxz-b168-7ug4 |
|
| 21 |
| vulnerability |
VCID-kb5h-116p-33b4 |
|
| 22 |
| vulnerability |
VCID-nukv-kkws-xkb1 |
|
| 23 |
| vulnerability |
VCID-rdwq-93d6-c7b4 |
|
| 24 |
| vulnerability |
VCID-rsry-fw45-9yev |
|
| 25 |
| vulnerability |
VCID-swpr-3qae-d7fe |
|
| 26 |
| vulnerability |
VCID-uhg5-zpzt-e3gz |
|
| 27 |
| vulnerability |
VCID-ujbp-cc1r-wfe9 |
|
| 28 |
| vulnerability |
VCID-v3h9-1t69-v7a3 |
|
| 29 |
| vulnerability |
VCID-v6rk-y6ws-dkh9 |
|
| 30 |
| vulnerability |
VCID-w8qm-73f3-rkbm |
|
| 31 |
| vulnerability |
VCID-x5e2-7whc-v3fc |
|
| 32 |
| vulnerability |
VCID-x94k-nxyd-27gs |
|
| 33 |
| vulnerability |
VCID-xg2f-12w4-yqge |
|
| 34 |
| vulnerability |
VCID-xw8r-fn6y-mbhp |
|
| 35 |
| vulnerability |
VCID-yeea-n94x-qqch |
|
| 36 |
| vulnerability |
VCID-yur3-am6j-w7ay |
|
| 37 |
| vulnerability |
VCID-zzzs-scbg-bbe9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@2.7.7%252Bdfsg-1%252Bdeb10u1 |
|
|
| aliases |
CVE-2017-7550, GHSA-588w-w6mv-3cw5, PYSEC-2017-4
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-c1d7-4rje-ayf9 |
|
| 11 |
| url |
VCID-d4ka-dk4p-kfhb |
| vulnerability_id |
VCID-d4ka-dk4p-kfhb |
| summary |
A flaw was found in the solaris_zone module from the Ansible Community modules. When setting the name for the zone on the Solaris host, the zone name is checked by listing the process with the 'ps' bare command on the remote machine. An attacker could take advantage of this flaw by crafting the name of the zone and executing arbitrary commands in the remote host. Ansible Engine 2.7.15, 2.8.7, and 2.9.2 as well as previous versions are affected. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-14904 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.1244 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.12481 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.1252 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.12549 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.12498 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.12417 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.12609 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.12567 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.12463 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-14904 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
| reference_url |
https://github.com/ansible/ansible |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L |
|
| 1 |
| value |
8.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:L/VA:L/SC:H/SI:L/SA:L |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/ansible/ansible |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/ansible@2.7.7%2Bdfsg-1%2Bdeb10u1 |
| purl |
pkg:deb/debian/ansible@2.7.7%2Bdfsg-1%2Bdeb10u1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1wv8-rvwu-nye3 |
|
| 1 |
| vulnerability |
VCID-3jej-4jyp-cqbt |
|
| 2 |
| vulnerability |
VCID-4pht-n5pc-f3gw |
|
| 3 |
| vulnerability |
VCID-682j-e2pu-1uee |
|
| 4 |
| vulnerability |
VCID-a49n-tvnt-p3df |
|
| 5 |
| vulnerability |
VCID-ae1r-yq1g-rkem |
|
| 6 |
| vulnerability |
VCID-atun-stks-4kcb |
|
| 7 |
| vulnerability |
VCID-axc3-wcsk-q3eg |
|
| 8 |
| vulnerability |
VCID-b8zs-br97-57av |
|
| 9 |
| vulnerability |
VCID-d4ka-dk4p-kfhb |
|
| 10 |
| vulnerability |
VCID-dzdx-wae5-8ydy |
|
| 11 |
| vulnerability |
VCID-e3z2-ydhb-gqfg |
|
| 12 |
| vulnerability |
VCID-ezaq-tqd3-4yd1 |
|
| 13 |
| vulnerability |
VCID-ezux-6buh-h7h7 |
|
| 14 |
| vulnerability |
VCID-fj2p-7wkh-1fhq |
|
| 15 |
| vulnerability |
VCID-g2pj-dmae-e3er |
|
| 16 |
| vulnerability |
VCID-geaa-6dxx-tbcw |
|
| 17 |
| vulnerability |
VCID-h1n3-cmte-eugf |
|
| 18 |
| vulnerability |
VCID-hqar-fca3-cbht |
|
| 19 |
| vulnerability |
VCID-jnmu-c8dt-5yb6 |
|
| 20 |
| vulnerability |
VCID-jrxz-b168-7ug4 |
|
| 21 |
| vulnerability |
VCID-kb5h-116p-33b4 |
|
| 22 |
| vulnerability |
VCID-nukv-kkws-xkb1 |
|
| 23 |
| vulnerability |
VCID-rdwq-93d6-c7b4 |
|
| 24 |
| vulnerability |
VCID-rsry-fw45-9yev |
|
| 25 |
| vulnerability |
VCID-swpr-3qae-d7fe |
|
| 26 |
| vulnerability |
VCID-uhg5-zpzt-e3gz |
|
| 27 |
| vulnerability |
VCID-ujbp-cc1r-wfe9 |
|
| 28 |
| vulnerability |
VCID-v3h9-1t69-v7a3 |
|
| 29 |
| vulnerability |
VCID-v6rk-y6ws-dkh9 |
|
| 30 |
| vulnerability |
VCID-w8qm-73f3-rkbm |
|
| 31 |
| vulnerability |
VCID-x5e2-7whc-v3fc |
|
| 32 |
| vulnerability |
VCID-x94k-nxyd-27gs |
|
| 33 |
| vulnerability |
VCID-xg2f-12w4-yqge |
|
| 34 |
| vulnerability |
VCID-xw8r-fn6y-mbhp |
|
| 35 |
| vulnerability |
VCID-yeea-n94x-qqch |
|
| 36 |
| vulnerability |
VCID-yur3-am6j-w7ay |
|
| 37 |
| vulnerability |
VCID-zzzs-scbg-bbe9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@2.7.7%252Bdfsg-1%252Bdeb10u1 |
|
| 1 |
|
|
| aliases |
CVE-2019-14904, GHSA-gwr8-5j83-483c, PYSEC-2020-161
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-d4ka-dk4p-kfhb |
|
| 12 |
| url |
VCID-drt9-vx5r-akgm |
| vulnerability_id |
VCID-drt9-vx5r-akgm |
| summary |
Ansible fetch module before versions 2.5.15, 2.6.14, 2.7.8 has a path traversal vulnerability which allows copying and overwriting files outside of the specified destination in the local ansible controller host, by not restricting an absolute path. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-3828 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08479 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08511 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08518 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08499 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08426 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08508 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08454 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08411 |
| published_at |
2026-04-01T12:55:00Z |
|
| 8 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08494 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-3828 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
| reference_url |
https://github.com/ansible/ansible |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.2 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N |
|
| 1 |
| value |
2.4 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N |
|
| 2 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/ansible/ansible |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
| reference_url |
https://usn.ubuntu.com/4072-1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.2 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N |
|
| 1 |
| value |
2.4 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N |
|
| 2 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://usn.ubuntu.com/4072-1 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2019-3828 |
| reference_id |
CVE-2019-3828 |
| reference_type |
|
| scores |
| 0 |
| value |
3.3 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:L/AC:M/Au:N/C:P/I:P/A:N |
|
| 1 |
| value |
4.2 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N |
|
| 2 |
| value |
4.2 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N |
|
| 3 |
| value |
2.4 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N |
|
| 4 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2019-3828 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/ansible@2.2.1.0-2%2Bdeb9u1 |
| purl |
pkg:deb/debian/ansible@2.2.1.0-2%2Bdeb9u1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1wv8-rvwu-nye3 |
|
| 1 |
| vulnerability |
VCID-3jej-4jyp-cqbt |
|
| 2 |
| vulnerability |
VCID-4pht-n5pc-f3gw |
|
| 3 |
| vulnerability |
VCID-5hwt-gkgx-jqb4 |
|
| 4 |
| vulnerability |
VCID-682j-e2pu-1uee |
|
| 5 |
| vulnerability |
VCID-a49n-tvnt-p3df |
|
| 6 |
| vulnerability |
VCID-ae1r-yq1g-rkem |
|
| 7 |
| vulnerability |
VCID-atun-stks-4kcb |
|
| 8 |
| vulnerability |
VCID-axc3-wcsk-q3eg |
|
| 9 |
| vulnerability |
VCID-b8zs-br97-57av |
|
| 10 |
| vulnerability |
VCID-c1d7-4rje-ayf9 |
|
| 11 |
| vulnerability |
VCID-d4ka-dk4p-kfhb |
|
| 12 |
| vulnerability |
VCID-drt9-vx5r-akgm |
|
| 13 |
| vulnerability |
VCID-dzdx-wae5-8ydy |
|
| 14 |
| vulnerability |
VCID-e3z2-ydhb-gqfg |
|
| 15 |
| vulnerability |
VCID-ezaq-tqd3-4yd1 |
|
| 16 |
| vulnerability |
VCID-ezux-6buh-h7h7 |
|
| 17 |
| vulnerability |
VCID-fj2p-7wkh-1fhq |
|
| 18 |
| vulnerability |
VCID-g2pj-dmae-e3er |
|
| 19 |
| vulnerability |
VCID-geaa-6dxx-tbcw |
|
| 20 |
| vulnerability |
VCID-h1n3-cmte-eugf |
|
| 21 |
| vulnerability |
VCID-hqar-fca3-cbht |
|
| 22 |
| vulnerability |
VCID-jnmu-c8dt-5yb6 |
|
| 23 |
| vulnerability |
VCID-jrxz-b168-7ug4 |
|
| 24 |
| vulnerability |
VCID-kb5h-116p-33b4 |
|
| 25 |
| vulnerability |
VCID-nukv-kkws-xkb1 |
|
| 26 |
| vulnerability |
VCID-puq1-z5h7-pkdg |
|
| 27 |
| vulnerability |
VCID-rdwq-93d6-c7b4 |
|
| 28 |
| vulnerability |
VCID-rknj-nkgs-wyg2 |
|
| 29 |
| vulnerability |
VCID-rsry-fw45-9yev |
|
| 30 |
| vulnerability |
VCID-swpr-3qae-d7fe |
|
| 31 |
| vulnerability |
VCID-uhg5-zpzt-e3gz |
|
| 32 |
| vulnerability |
VCID-ujbp-cc1r-wfe9 |
|
| 33 |
| vulnerability |
VCID-v3h9-1t69-v7a3 |
|
| 34 |
| vulnerability |
VCID-v6rk-y6ws-dkh9 |
|
| 35 |
| vulnerability |
VCID-w8qm-73f3-rkbm |
|
| 36 |
| vulnerability |
VCID-wqm7-2ajr-6ue8 |
|
| 37 |
| vulnerability |
VCID-x5e2-7whc-v3fc |
|
| 38 |
| vulnerability |
VCID-x94k-nxyd-27gs |
|
| 39 |
| vulnerability |
VCID-xg2f-12w4-yqge |
|
| 40 |
| vulnerability |
VCID-xw8r-fn6y-mbhp |
|
| 41 |
| vulnerability |
VCID-y91x-2rch-pkar |
|
| 42 |
| vulnerability |
VCID-yeea-n94x-qqch |
|
| 43 |
| vulnerability |
VCID-yur3-am6j-w7ay |
|
| 44 |
| vulnerability |
VCID-zmr4-652z-r3dm |
|
| 45 |
| vulnerability |
VCID-zzzs-scbg-bbe9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@2.2.1.0-2%252Bdeb9u1 |
|
| 1 |
| url |
pkg:deb/debian/ansible@2.7.7%2Bdfsg-1%2Bdeb10u1 |
| purl |
pkg:deb/debian/ansible@2.7.7%2Bdfsg-1%2Bdeb10u1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1wv8-rvwu-nye3 |
|
| 1 |
| vulnerability |
VCID-3jej-4jyp-cqbt |
|
| 2 |
| vulnerability |
VCID-4pht-n5pc-f3gw |
|
| 3 |
| vulnerability |
VCID-682j-e2pu-1uee |
|
| 4 |
| vulnerability |
VCID-a49n-tvnt-p3df |
|
| 5 |
| vulnerability |
VCID-ae1r-yq1g-rkem |
|
| 6 |
| vulnerability |
VCID-atun-stks-4kcb |
|
| 7 |
| vulnerability |
VCID-axc3-wcsk-q3eg |
|
| 8 |
| vulnerability |
VCID-b8zs-br97-57av |
|
| 9 |
| vulnerability |
VCID-d4ka-dk4p-kfhb |
|
| 10 |
| vulnerability |
VCID-dzdx-wae5-8ydy |
|
| 11 |
| vulnerability |
VCID-e3z2-ydhb-gqfg |
|
| 12 |
| vulnerability |
VCID-ezaq-tqd3-4yd1 |
|
| 13 |
| vulnerability |
VCID-ezux-6buh-h7h7 |
|
| 14 |
| vulnerability |
VCID-fj2p-7wkh-1fhq |
|
| 15 |
| vulnerability |
VCID-g2pj-dmae-e3er |
|
| 16 |
| vulnerability |
VCID-geaa-6dxx-tbcw |
|
| 17 |
| vulnerability |
VCID-h1n3-cmte-eugf |
|
| 18 |
| vulnerability |
VCID-hqar-fca3-cbht |
|
| 19 |
| vulnerability |
VCID-jnmu-c8dt-5yb6 |
|
| 20 |
| vulnerability |
VCID-jrxz-b168-7ug4 |
|
| 21 |
| vulnerability |
VCID-kb5h-116p-33b4 |
|
| 22 |
| vulnerability |
VCID-nukv-kkws-xkb1 |
|
| 23 |
| vulnerability |
VCID-rdwq-93d6-c7b4 |
|
| 24 |
| vulnerability |
VCID-rsry-fw45-9yev |
|
| 25 |
| vulnerability |
VCID-swpr-3qae-d7fe |
|
| 26 |
| vulnerability |
VCID-uhg5-zpzt-e3gz |
|
| 27 |
| vulnerability |
VCID-ujbp-cc1r-wfe9 |
|
| 28 |
| vulnerability |
VCID-v3h9-1t69-v7a3 |
|
| 29 |
| vulnerability |
VCID-v6rk-y6ws-dkh9 |
|
| 30 |
| vulnerability |
VCID-w8qm-73f3-rkbm |
|
| 31 |
| vulnerability |
VCID-x5e2-7whc-v3fc |
|
| 32 |
| vulnerability |
VCID-x94k-nxyd-27gs |
|
| 33 |
| vulnerability |
VCID-xg2f-12w4-yqge |
|
| 34 |
| vulnerability |
VCID-xw8r-fn6y-mbhp |
|
| 35 |
| vulnerability |
VCID-yeea-n94x-qqch |
|
| 36 |
| vulnerability |
VCID-yur3-am6j-w7ay |
|
| 37 |
| vulnerability |
VCID-zzzs-scbg-bbe9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@2.7.7%252Bdfsg-1%252Bdeb10u1 |
|
|
| aliases |
CVE-2019-3828, GHSA-74vq-h4q8-x6jv, PYSEC-2019-5
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-drt9-vx5r-akgm |
|
| 13 |
| url |
VCID-dzdx-wae5-8ydy |
| vulnerability_id |
VCID-dzdx-wae5-8ydy |
| summary |
Ansible leaks password to logs
A flaw was found in Ansible in the amazon.aws collection when using the `tower_callback` parameter from the `amazon.aws.ec2_instance` module. This flaw allows an attacker to take advantage of this issue as the module is handling the parameter insecurely, leading to the password leaking in the logs. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-3697 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00191 |
| scoring_system |
epss |
| scoring_elements |
0.41039 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00191 |
| scoring_system |
epss |
| scoring_elements |
0.41008 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00216 |
| scoring_system |
epss |
| scoring_elements |
0.44224 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00216 |
| scoring_system |
epss |
| scoring_elements |
0.44207 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00216 |
| scoring_system |
epss |
| scoring_elements |
0.44203 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00216 |
| scoring_system |
epss |
| scoring_elements |
0.44152 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00216 |
| scoring_system |
epss |
| scoring_elements |
0.44192 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00216 |
| scoring_system |
epss |
| scoring_elements |
0.44191 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-3697 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-3697, GHSA-cpx3-93w7-457x
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dzdx-wae5-8ydy |
|
| 14 |
| url |
VCID-e3z2-ydhb-gqfg |
| vulnerability_id |
VCID-e3z2-ydhb-gqfg |
| summary |
A flaw was found in the Ansible Engine 2.9.18, where sensitive info is not masked by default and is not protected by the no_log feature when using the sub-option feature of the basic.py module. This flaw allows an attacker to obtain sensitive information. The highest threat from this vulnerability is to confidentiality. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-20228 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35396 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.3542 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35463 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35454 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35429 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35383 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.355 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35276 |
| published_at |
2026-04-01T12:55:00Z |
|
| 8 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35475 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-20228 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
| reference_url |
https://github.com/ansible/ansible |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/ansible/ansible |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/ansible@2.7.7%2Bdfsg-1%2Bdeb10u1 |
| purl |
pkg:deb/debian/ansible@2.7.7%2Bdfsg-1%2Bdeb10u1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1wv8-rvwu-nye3 |
|
| 1 |
| vulnerability |
VCID-3jej-4jyp-cqbt |
|
| 2 |
| vulnerability |
VCID-4pht-n5pc-f3gw |
|
| 3 |
| vulnerability |
VCID-682j-e2pu-1uee |
|
| 4 |
| vulnerability |
VCID-a49n-tvnt-p3df |
|
| 5 |
| vulnerability |
VCID-ae1r-yq1g-rkem |
|
| 6 |
| vulnerability |
VCID-atun-stks-4kcb |
|
| 7 |
| vulnerability |
VCID-axc3-wcsk-q3eg |
|
| 8 |
| vulnerability |
VCID-b8zs-br97-57av |
|
| 9 |
| vulnerability |
VCID-d4ka-dk4p-kfhb |
|
| 10 |
| vulnerability |
VCID-dzdx-wae5-8ydy |
|
| 11 |
| vulnerability |
VCID-e3z2-ydhb-gqfg |
|
| 12 |
| vulnerability |
VCID-ezaq-tqd3-4yd1 |
|
| 13 |
| vulnerability |
VCID-ezux-6buh-h7h7 |
|
| 14 |
| vulnerability |
VCID-fj2p-7wkh-1fhq |
|
| 15 |
| vulnerability |
VCID-g2pj-dmae-e3er |
|
| 16 |
| vulnerability |
VCID-geaa-6dxx-tbcw |
|
| 17 |
| vulnerability |
VCID-h1n3-cmte-eugf |
|
| 18 |
| vulnerability |
VCID-hqar-fca3-cbht |
|
| 19 |
| vulnerability |
VCID-jnmu-c8dt-5yb6 |
|
| 20 |
| vulnerability |
VCID-jrxz-b168-7ug4 |
|
| 21 |
| vulnerability |
VCID-kb5h-116p-33b4 |
|
| 22 |
| vulnerability |
VCID-nukv-kkws-xkb1 |
|
| 23 |
| vulnerability |
VCID-rdwq-93d6-c7b4 |
|
| 24 |
| vulnerability |
VCID-rsry-fw45-9yev |
|
| 25 |
| vulnerability |
VCID-swpr-3qae-d7fe |
|
| 26 |
| vulnerability |
VCID-uhg5-zpzt-e3gz |
|
| 27 |
| vulnerability |
VCID-ujbp-cc1r-wfe9 |
|
| 28 |
| vulnerability |
VCID-v3h9-1t69-v7a3 |
|
| 29 |
| vulnerability |
VCID-v6rk-y6ws-dkh9 |
|
| 30 |
| vulnerability |
VCID-w8qm-73f3-rkbm |
|
| 31 |
| vulnerability |
VCID-x5e2-7whc-v3fc |
|
| 32 |
| vulnerability |
VCID-x94k-nxyd-27gs |
|
| 33 |
| vulnerability |
VCID-xg2f-12w4-yqge |
|
| 34 |
| vulnerability |
VCID-xw8r-fn6y-mbhp |
|
| 35 |
| vulnerability |
VCID-yeea-n94x-qqch |
|
| 36 |
| vulnerability |
VCID-yur3-am6j-w7ay |
|
| 37 |
| vulnerability |
VCID-zzzs-scbg-bbe9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@2.7.7%252Bdfsg-1%252Bdeb10u1 |
|
| 1 |
|
|
| aliases |
CVE-2021-20228, GHSA-5rrg-rr89-x9mv, PYSEC-2021-1
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-e3z2-ydhb-gqfg |
|
| 15 |
| url |
VCID-ezaq-tqd3-4yd1 |
| vulnerability_id |
VCID-ezaq-tqd3-4yd1 |
| summary |
A security flaw was found in Ansible Engine, all Ansible 2.7.x versions prior to 2.7.17, all Ansible 2.8.x versions prior to 2.8.11 and all Ansible 2.9.x versions prior to 2.9.7, when managing kubernetes using the k8s module. Sensitive parameters such as passwords and tokens are passed to kubectl from the command line, not using an environment variable or an input configuration file. This will disclose passwords and tokens from process list and no_log directive from debug module would not have any effect making these secrets being disclosed on stdout and log files. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-1753 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.1278 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12825 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12862 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12896 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12816 |
| published_at |
2026-04-01T12:55:00Z |
|
| 5 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12766 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12964 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12914 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12845 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-1753 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
| reference_url |
https://github.com/advisories/GHSA-86hp-cj9j-33vv |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
MODERATE |
| scoring_system |
cvssv3.1_qr |
| scoring_elements |
|
|
| 2 |
| value |
6.8 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/advisories/GHSA-86hp-cj9j-33vv |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2020-1753 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
2.1 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:L/AC:L/Au:N/C:P/I:N/A:N |
|
| 1 |
| value |
5.0 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N |
|
| 2 |
| value |
5.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 3 |
| value |
6.8 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 4 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2020-1753 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/ansible@2.7.7%2Bdfsg-1%2Bdeb10u1 |
| purl |
pkg:deb/debian/ansible@2.7.7%2Bdfsg-1%2Bdeb10u1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1wv8-rvwu-nye3 |
|
| 1 |
| vulnerability |
VCID-3jej-4jyp-cqbt |
|
| 2 |
| vulnerability |
VCID-4pht-n5pc-f3gw |
|
| 3 |
| vulnerability |
VCID-682j-e2pu-1uee |
|
| 4 |
| vulnerability |
VCID-a49n-tvnt-p3df |
|
| 5 |
| vulnerability |
VCID-ae1r-yq1g-rkem |
|
| 6 |
| vulnerability |
VCID-atun-stks-4kcb |
|
| 7 |
| vulnerability |
VCID-axc3-wcsk-q3eg |
|
| 8 |
| vulnerability |
VCID-b8zs-br97-57av |
|
| 9 |
| vulnerability |
VCID-d4ka-dk4p-kfhb |
|
| 10 |
| vulnerability |
VCID-dzdx-wae5-8ydy |
|
| 11 |
| vulnerability |
VCID-e3z2-ydhb-gqfg |
|
| 12 |
| vulnerability |
VCID-ezaq-tqd3-4yd1 |
|
| 13 |
| vulnerability |
VCID-ezux-6buh-h7h7 |
|
| 14 |
| vulnerability |
VCID-fj2p-7wkh-1fhq |
|
| 15 |
| vulnerability |
VCID-g2pj-dmae-e3er |
|
| 16 |
| vulnerability |
VCID-geaa-6dxx-tbcw |
|
| 17 |
| vulnerability |
VCID-h1n3-cmte-eugf |
|
| 18 |
| vulnerability |
VCID-hqar-fca3-cbht |
|
| 19 |
| vulnerability |
VCID-jnmu-c8dt-5yb6 |
|
| 20 |
| vulnerability |
VCID-jrxz-b168-7ug4 |
|
| 21 |
| vulnerability |
VCID-kb5h-116p-33b4 |
|
| 22 |
| vulnerability |
VCID-nukv-kkws-xkb1 |
|
| 23 |
| vulnerability |
VCID-rdwq-93d6-c7b4 |
|
| 24 |
| vulnerability |
VCID-rsry-fw45-9yev |
|
| 25 |
| vulnerability |
VCID-swpr-3qae-d7fe |
|
| 26 |
| vulnerability |
VCID-uhg5-zpzt-e3gz |
|
| 27 |
| vulnerability |
VCID-ujbp-cc1r-wfe9 |
|
| 28 |
| vulnerability |
VCID-v3h9-1t69-v7a3 |
|
| 29 |
| vulnerability |
VCID-v6rk-y6ws-dkh9 |
|
| 30 |
| vulnerability |
VCID-w8qm-73f3-rkbm |
|
| 31 |
| vulnerability |
VCID-x5e2-7whc-v3fc |
|
| 32 |
| vulnerability |
VCID-x94k-nxyd-27gs |
|
| 33 |
| vulnerability |
VCID-xg2f-12w4-yqge |
|
| 34 |
| vulnerability |
VCID-xw8r-fn6y-mbhp |
|
| 35 |
| vulnerability |
VCID-yeea-n94x-qqch |
|
| 36 |
| vulnerability |
VCID-yur3-am6j-w7ay |
|
| 37 |
| vulnerability |
VCID-zzzs-scbg-bbe9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@2.7.7%252Bdfsg-1%252Bdeb10u1 |
|
| 1 |
|
|
| aliases |
CVE-2020-1753, GHSA-86hp-cj9j-33vv, PYSEC-2020-210
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ezaq-tqd3-4yd1 |
|
| 16 |
| url |
VCID-ezux-6buh-h7h7 |
| vulnerability_id |
VCID-ezux-6buh-h7h7 |
| summary |
A flaw was found in Ansible Engine affecting Ansible Engine versions 2.7.x before 2.7.17 and 2.8.x before 2.8.11 and 2.9.x before 2.9.7 as well as Ansible Tower before and including versions 3.4.5 and 3.5.5 and 3.6.3 when using modules which decrypts vault files such as assemble, script, unarchive, win_copy, aws_s3 or copy modules. The temporary directory is created in /tmp leaves the s ts unencrypted. On Operating Systems which /tmp is not a tmpfs but part of the root partition, the directory is only cleared on boot and the decryp emains when the host is switched off. The system will be vulnerable when the system is not running. So decrypted data must be cleared as soon as possible and the data which normally is encrypted ble. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10685 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.4073 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.40748 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.40764 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.40757 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.40707 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.40783 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.40671 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.40755 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10685 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
| reference_url |
https://github.com/advisories/GHSA-77g3-3j5w-64w4 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
MODERATE |
| scoring_system |
cvssv3.1_qr |
| scoring_elements |
|
|
| 2 |
| value |
6.8 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/advisories/GHSA-77g3-3j5w-64w4 |
|
| 23 |
| reference_url |
https://github.com/ansible/ansible |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
6.8 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/ansible/ansible |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/ansible@2.7.7%2Bdfsg-1%2Bdeb10u1 |
| purl |
pkg:deb/debian/ansible@2.7.7%2Bdfsg-1%2Bdeb10u1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1wv8-rvwu-nye3 |
|
| 1 |
| vulnerability |
VCID-3jej-4jyp-cqbt |
|
| 2 |
| vulnerability |
VCID-4pht-n5pc-f3gw |
|
| 3 |
| vulnerability |
VCID-682j-e2pu-1uee |
|
| 4 |
| vulnerability |
VCID-a49n-tvnt-p3df |
|
| 5 |
| vulnerability |
VCID-ae1r-yq1g-rkem |
|
| 6 |
| vulnerability |
VCID-atun-stks-4kcb |
|
| 7 |
| vulnerability |
VCID-axc3-wcsk-q3eg |
|
| 8 |
| vulnerability |
VCID-b8zs-br97-57av |
|
| 9 |
| vulnerability |
VCID-d4ka-dk4p-kfhb |
|
| 10 |
| vulnerability |
VCID-dzdx-wae5-8ydy |
|
| 11 |
| vulnerability |
VCID-e3z2-ydhb-gqfg |
|
| 12 |
| vulnerability |
VCID-ezaq-tqd3-4yd1 |
|
| 13 |
| vulnerability |
VCID-ezux-6buh-h7h7 |
|
| 14 |
| vulnerability |
VCID-fj2p-7wkh-1fhq |
|
| 15 |
| vulnerability |
VCID-g2pj-dmae-e3er |
|
| 16 |
| vulnerability |
VCID-geaa-6dxx-tbcw |
|
| 17 |
| vulnerability |
VCID-h1n3-cmte-eugf |
|
| 18 |
| vulnerability |
VCID-hqar-fca3-cbht |
|
| 19 |
| vulnerability |
VCID-jnmu-c8dt-5yb6 |
|
| 20 |
| vulnerability |
VCID-jrxz-b168-7ug4 |
|
| 21 |
| vulnerability |
VCID-kb5h-116p-33b4 |
|
| 22 |
| vulnerability |
VCID-nukv-kkws-xkb1 |
|
| 23 |
| vulnerability |
VCID-rdwq-93d6-c7b4 |
|
| 24 |
| vulnerability |
VCID-rsry-fw45-9yev |
|
| 25 |
| vulnerability |
VCID-swpr-3qae-d7fe |
|
| 26 |
| vulnerability |
VCID-uhg5-zpzt-e3gz |
|
| 27 |
| vulnerability |
VCID-ujbp-cc1r-wfe9 |
|
| 28 |
| vulnerability |
VCID-v3h9-1t69-v7a3 |
|
| 29 |
| vulnerability |
VCID-v6rk-y6ws-dkh9 |
|
| 30 |
| vulnerability |
VCID-w8qm-73f3-rkbm |
|
| 31 |
| vulnerability |
VCID-x5e2-7whc-v3fc |
|
| 32 |
| vulnerability |
VCID-x94k-nxyd-27gs |
|
| 33 |
| vulnerability |
VCID-xg2f-12w4-yqge |
|
| 34 |
| vulnerability |
VCID-xw8r-fn6y-mbhp |
|
| 35 |
| vulnerability |
VCID-yeea-n94x-qqch |
|
| 36 |
| vulnerability |
VCID-yur3-am6j-w7ay |
|
| 37 |
| vulnerability |
VCID-zzzs-scbg-bbe9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@2.7.7%252Bdfsg-1%252Bdeb10u1 |
|
| 1 |
|
|
| aliases |
CVE-2020-10685, GHSA-77g3-3j5w-64w4, PYSEC-2020-1
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ezux-6buh-h7h7 |
|
| 17 |
| url |
VCID-fetz-42jf-nqe8 |
| vulnerability_id |
VCID-fetz-42jf-nqe8 |
| summary |
An input validation vulnerability was found in Ansible's mysql_user module before 2.2.1.0, which may fail to correctly change a password in certain circumstances. Thus the previous password would still be active when it should have been changed. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-8647 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38395 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38371 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38235 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38337 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38301 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38276 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38319 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38311 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.3826 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-8647 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
| reference_url |
https://github.com/advisories/GHSA-x4cm-m36h-c6qj |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.9 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N |
|
| 1 |
| value |
MODERATE |
| scoring_system |
cvssv3.1_qr |
| scoring_elements |
|
|
| 2 |
| value |
6.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/advisories/GHSA-x4cm-m36h-c6qj |
|
| 9 |
| reference_url |
https://github.com/ansible/ansible |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.9 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N |
|
| 1 |
| value |
6.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/ansible/ansible |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/ansible@2.2.1.0-2~bpo8%2B1 |
| purl |
pkg:deb/debian/ansible@2.2.1.0-2~bpo8%2B1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1wv8-rvwu-nye3 |
|
| 1 |
| vulnerability |
VCID-3jej-4jyp-cqbt |
|
| 2 |
| vulnerability |
VCID-4pht-n5pc-f3gw |
|
| 3 |
| vulnerability |
VCID-5hwt-gkgx-jqb4 |
|
| 4 |
| vulnerability |
VCID-682j-e2pu-1uee |
|
| 5 |
| vulnerability |
VCID-a49n-tvnt-p3df |
|
| 6 |
| vulnerability |
VCID-ae1r-yq1g-rkem |
|
| 7 |
| vulnerability |
VCID-atun-stks-4kcb |
|
| 8 |
| vulnerability |
VCID-axc3-wcsk-q3eg |
|
| 9 |
| vulnerability |
VCID-b8zs-br97-57av |
|
| 10 |
| vulnerability |
VCID-c1d7-4rje-ayf9 |
|
| 11 |
| vulnerability |
VCID-d4ka-dk4p-kfhb |
|
| 12 |
| vulnerability |
VCID-drt9-vx5r-akgm |
|
| 13 |
| vulnerability |
VCID-dzdx-wae5-8ydy |
|
| 14 |
| vulnerability |
VCID-e3z2-ydhb-gqfg |
|
| 15 |
| vulnerability |
VCID-ezaq-tqd3-4yd1 |
|
| 16 |
| vulnerability |
VCID-ezux-6buh-h7h7 |
|
| 17 |
| vulnerability |
VCID-fj2p-7wkh-1fhq |
|
| 18 |
| vulnerability |
VCID-g2pj-dmae-e3er |
|
| 19 |
| vulnerability |
VCID-geaa-6dxx-tbcw |
|
| 20 |
| vulnerability |
VCID-h1n3-cmte-eugf |
|
| 21 |
| vulnerability |
VCID-hqar-fca3-cbht |
|
| 22 |
| vulnerability |
VCID-jhxm-379u-subt |
|
| 23 |
| vulnerability |
VCID-jnmu-c8dt-5yb6 |
|
| 24 |
| vulnerability |
VCID-jrxz-b168-7ug4 |
|
| 25 |
| vulnerability |
VCID-kb5h-116p-33b4 |
|
| 26 |
| vulnerability |
VCID-nukv-kkws-xkb1 |
|
| 27 |
| vulnerability |
VCID-puq1-z5h7-pkdg |
|
| 28 |
| vulnerability |
VCID-rdwq-93d6-c7b4 |
|
| 29 |
| vulnerability |
VCID-rknj-nkgs-wyg2 |
|
| 30 |
| vulnerability |
VCID-rsry-fw45-9yev |
|
| 31 |
| vulnerability |
VCID-swpr-3qae-d7fe |
|
| 32 |
| vulnerability |
VCID-uhg5-zpzt-e3gz |
|
| 33 |
| vulnerability |
VCID-ujbp-cc1r-wfe9 |
|
| 34 |
| vulnerability |
VCID-v3h9-1t69-v7a3 |
|
| 35 |
| vulnerability |
VCID-v6rk-y6ws-dkh9 |
|
| 36 |
| vulnerability |
VCID-w8qm-73f3-rkbm |
|
| 37 |
| vulnerability |
VCID-wqm7-2ajr-6ue8 |
|
| 38 |
| vulnerability |
VCID-x5e2-7whc-v3fc |
|
| 39 |
| vulnerability |
VCID-x94k-nxyd-27gs |
|
| 40 |
| vulnerability |
VCID-xg2f-12w4-yqge |
|
| 41 |
| vulnerability |
VCID-xw8r-fn6y-mbhp |
|
| 42 |
| vulnerability |
VCID-y91x-2rch-pkar |
|
| 43 |
| vulnerability |
VCID-yeea-n94x-qqch |
|
| 44 |
| vulnerability |
VCID-yur3-am6j-w7ay |
|
| 45 |
| vulnerability |
VCID-zmr4-652z-r3dm |
|
| 46 |
| vulnerability |
VCID-zzzs-scbg-bbe9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@2.2.1.0-2~bpo8%252B1 |
|
|
| aliases |
CVE-2016-8647, GHSA-x4cm-m36h-c6qj, PYSEC-2018-58
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fetz-42jf-nqe8 |
|
| 18 |
| url |
VCID-fj2p-7wkh-1fhq |
| vulnerability_id |
VCID-fj2p-7wkh-1fhq |
| summary |
A flaw was found in ansible module where credentials are disclosed in the console log by default and not protected by the security feature when using the bitbucket_pipeline_variable module. This flaw allows an attacker to steal bitbucket_pipeline credentials. The highest threat from this vulnerability is to confidentiality. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-20178 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00044 |
| scoring_system |
epss |
| scoring_elements |
0.13388 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00044 |
| scoring_system |
epss |
| scoring_elements |
0.13435 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00044 |
| scoring_system |
epss |
| scoring_elements |
0.13471 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00044 |
| scoring_system |
epss |
| scoring_elements |
0.13411 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.00044 |
| scoring_system |
epss |
| scoring_elements |
0.13498 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00044 |
| scoring_system |
epss |
| scoring_elements |
0.13448 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00044 |
| scoring_system |
epss |
| scoring_elements |
0.13367 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00044 |
| scoring_system |
epss |
| scoring_elements |
0.13571 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00044 |
| scoring_system |
epss |
| scoring_elements |
0.1351 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-20178 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-20178, GHSA-wv5p-gmmv-wh9v, PYSEC-2021-106
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fj2p-7wkh-1fhq |
|
| 19 |
| url |
VCID-g2pj-dmae-e3er |
| vulnerability_id |
VCID-g2pj-dmae-e3er |
| summary |
An information disclosure flaw was found in ansible-core due to a failure to respect the ANSIBLE_NO_LOG configuration in some scenarios. It was discovered that information is still included in the output in certain tasks, such as loop items. Depending on the task, this issue may include sensitive information, such as decrypted secret values. |
| references |
| 0 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:0733 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
5.0 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N |
|
| 2 |
| value |
5.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 4 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T18:30:30Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:0733 |
|
| 1 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:2246 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
5.0 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T18:30:30Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:2246 |
|
| 2 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:3043 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
5.0 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T18:30:30Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:3043 |
|
| 3 |
|
| 4 |
| reference_url |
https://access.redhat.com/security/cve/CVE-2024-0690 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
5.0 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N |
|
| 2 |
| value |
5.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 4 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T18:30:30Z/ |
|
|
| url |
https://access.redhat.com/security/cve/CVE-2024-0690 |
|
| 5 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-0690 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20151 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.2031 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20369 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20093 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20174 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20232 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20256 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20211 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-0690 |
|
| 6 |
| reference_url |
https://bugzilla.redhat.com/show_bug.cgi?id=2259013 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
5.0 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N |
|
| 2 |
| value |
5.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 4 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T18:30:30Z/ |
|
|
| url |
https://bugzilla.redhat.com/show_bug.cgi?id=2259013 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
| reference_url |
https://github.com/ansible/ansible/pull/82565 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
5.0 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N |
|
| 2 |
| value |
5.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 4 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-06T18:30:30Z/ |
|
|
| url |
https://github.com/ansible/ansible/pull/82565 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-0690, GHSA-h24r-m9qc-pvpg, PYSEC-2024-36
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-g2pj-dmae-e3er |
|
| 20 |
| url |
VCID-geaa-6dxx-tbcw |
| vulnerability_id |
VCID-geaa-6dxx-tbcw |
| summary |
A flaw was found in Ansible Engine's ansible-connection module, where sensitive information such as the Ansible user credentials is disclosed by default in the traceback error message. The highest threat from this vulnerability is to confidentiality. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3620 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0029 |
| scoring_system |
epss |
| scoring_elements |
0.52409 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.0029 |
| scoring_system |
epss |
| scoring_elements |
0.52437 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.0029 |
| scoring_system |
epss |
| scoring_elements |
0.52402 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.0029 |
| scoring_system |
epss |
| scoring_elements |
0.52455 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.0029 |
| scoring_system |
epss |
| scoring_elements |
0.52364 |
| published_at |
2026-04-01T12:55:00Z |
|
| 5 |
| value |
0.0029 |
| scoring_system |
epss |
| scoring_elements |
0.525 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.0029 |
| scoring_system |
epss |
| scoring_elements |
0.52484 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.0029 |
| scoring_system |
epss |
| scoring_elements |
0.52468 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.0029 |
| scoring_system |
epss |
| scoring_elements |
0.52449 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3620 |
|
| 8 |
| reference_url |
https://bugzilla.redhat.com/show_bug.cgi?id=1975767 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
6.8 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:25Z/ |
|
|
| url |
https://bugzilla.redhat.com/show_bug.cgi?id=1975767 |
|
| 9 |
|
| 10 |
|
| 11 |
| reference_url |
https://github.com/advisories/GHSA-4r65-35qq-ch8j |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
MODERATE |
| scoring_system |
cvssv3.1_qr |
| scoring_elements |
|
|
| 2 |
| value |
6.8 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/advisories/GHSA-4r65-35qq-ch8j |
|
| 12 |
| reference_url |
https://github.com/ansible/ansible |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
6.8 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/ansible/ansible |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3620, GHSA-4r65-35qq-ch8j, PYSEC-2022-164
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-geaa-6dxx-tbcw |
|
| 21 |
| url |
VCID-h1n3-cmte-eugf |
| vulnerability_id |
VCID-h1n3-cmte-eugf |
| summary |
A flaw was found in the Ansible Engine affecting Ansible Engine versions 2.7.x before 2.7.17 and 2.8.x before 2.8.11 and 2.9.x before 2.9.7 as well as Ansible Tower before and including versions 3.4.5 and 3.5.5 and 3.6.3 when the ldap_attr and ldap_entry community modules are used. The issue discloses the LDAP bind password to stdout or a log file if a playbook task is written using the bind_pw in the parameters field. The highest threat from this vulnerability is data confidentiality. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-1746 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.18964 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19016 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19063 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19057 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19003 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.18923 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19207 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.1902 |
| published_at |
2026-04-01T12:55:00Z |
|
| 8 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19155 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-1746 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
| reference_url |
https://github.com/advisories/GHSA-j2h6-73x8-22c4 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.0 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
MODERATE |
| scoring_system |
cvssv3.1_qr |
| scoring_elements |
|
|
| 2 |
| value |
5.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/advisories/GHSA-j2h6-73x8-22c4 |
|
| 23 |
| reference_url |
https://github.com/ansible/ansible |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.0 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
5.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/ansible/ansible |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/ansible@2.7.7%2Bdfsg-1%2Bdeb10u1 |
| purl |
pkg:deb/debian/ansible@2.7.7%2Bdfsg-1%2Bdeb10u1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1wv8-rvwu-nye3 |
|
| 1 |
| vulnerability |
VCID-3jej-4jyp-cqbt |
|
| 2 |
| vulnerability |
VCID-4pht-n5pc-f3gw |
|
| 3 |
| vulnerability |
VCID-682j-e2pu-1uee |
|
| 4 |
| vulnerability |
VCID-a49n-tvnt-p3df |
|
| 5 |
| vulnerability |
VCID-ae1r-yq1g-rkem |
|
| 6 |
| vulnerability |
VCID-atun-stks-4kcb |
|
| 7 |
| vulnerability |
VCID-axc3-wcsk-q3eg |
|
| 8 |
| vulnerability |
VCID-b8zs-br97-57av |
|
| 9 |
| vulnerability |
VCID-d4ka-dk4p-kfhb |
|
| 10 |
| vulnerability |
VCID-dzdx-wae5-8ydy |
|
| 11 |
| vulnerability |
VCID-e3z2-ydhb-gqfg |
|
| 12 |
| vulnerability |
VCID-ezaq-tqd3-4yd1 |
|
| 13 |
| vulnerability |
VCID-ezux-6buh-h7h7 |
|
| 14 |
| vulnerability |
VCID-fj2p-7wkh-1fhq |
|
| 15 |
| vulnerability |
VCID-g2pj-dmae-e3er |
|
| 16 |
| vulnerability |
VCID-geaa-6dxx-tbcw |
|
| 17 |
| vulnerability |
VCID-h1n3-cmte-eugf |
|
| 18 |
| vulnerability |
VCID-hqar-fca3-cbht |
|
| 19 |
| vulnerability |
VCID-jnmu-c8dt-5yb6 |
|
| 20 |
| vulnerability |
VCID-jrxz-b168-7ug4 |
|
| 21 |
| vulnerability |
VCID-kb5h-116p-33b4 |
|
| 22 |
| vulnerability |
VCID-nukv-kkws-xkb1 |
|
| 23 |
| vulnerability |
VCID-rdwq-93d6-c7b4 |
|
| 24 |
| vulnerability |
VCID-rsry-fw45-9yev |
|
| 25 |
| vulnerability |
VCID-swpr-3qae-d7fe |
|
| 26 |
| vulnerability |
VCID-uhg5-zpzt-e3gz |
|
| 27 |
| vulnerability |
VCID-ujbp-cc1r-wfe9 |
|
| 28 |
| vulnerability |
VCID-v3h9-1t69-v7a3 |
|
| 29 |
| vulnerability |
VCID-v6rk-y6ws-dkh9 |
|
| 30 |
| vulnerability |
VCID-w8qm-73f3-rkbm |
|
| 31 |
| vulnerability |
VCID-x5e2-7whc-v3fc |
|
| 32 |
| vulnerability |
VCID-x94k-nxyd-27gs |
|
| 33 |
| vulnerability |
VCID-xg2f-12w4-yqge |
|
| 34 |
| vulnerability |
VCID-xw8r-fn6y-mbhp |
|
| 35 |
| vulnerability |
VCID-yeea-n94x-qqch |
|
| 36 |
| vulnerability |
VCID-yur3-am6j-w7ay |
|
| 37 |
| vulnerability |
VCID-zzzs-scbg-bbe9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@2.7.7%252Bdfsg-1%252Bdeb10u1 |
|
| 1 |
|
|
| aliases |
CVE-2020-1746, GHSA-j2h6-73x8-22c4, PYSEC-2020-13
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-h1n3-cmte-eugf |
|
| 22 |
| url |
VCID-hfxe-jjf5-nqd1 |
| vulnerability_id |
VCID-hfxe-jjf5-nqd1 |
| summary |
A flaw was found in Ansible before version 2.2.0. The apt_key module does not properly verify key fingerprints, allowing remote adversary to create an OpenPGP key which matches the short key ID and inject this key instead of the correct key. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-8614 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00079 |
| scoring_system |
epss |
| scoring_elements |
0.23411 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00079 |
| scoring_system |
epss |
| scoring_elements |
0.23465 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00079 |
| scoring_system |
epss |
| scoring_elements |
0.23504 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00079 |
| scoring_system |
epss |
| scoring_elements |
0.23486 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00079 |
| scoring_system |
epss |
| scoring_elements |
0.23436 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00079 |
| scoring_system |
epss |
| scoring_elements |
0.23363 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00079 |
| scoring_system |
epss |
| scoring_elements |
0.23582 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00079 |
| scoring_system |
epss |
| scoring_elements |
0.23383 |
| published_at |
2026-04-01T12:55:00Z |
|
| 8 |
| value |
0.00079 |
| scoring_system |
epss |
| scoring_elements |
0.23544 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-8614 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://github.com/ansible/ansible |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/ansible/ansible |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/ansible@2.2.1.0-2~bpo8%2B1 |
| purl |
pkg:deb/debian/ansible@2.2.1.0-2~bpo8%2B1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1wv8-rvwu-nye3 |
|
| 1 |
| vulnerability |
VCID-3jej-4jyp-cqbt |
|
| 2 |
| vulnerability |
VCID-4pht-n5pc-f3gw |
|
| 3 |
| vulnerability |
VCID-5hwt-gkgx-jqb4 |
|
| 4 |
| vulnerability |
VCID-682j-e2pu-1uee |
|
| 5 |
| vulnerability |
VCID-a49n-tvnt-p3df |
|
| 6 |
| vulnerability |
VCID-ae1r-yq1g-rkem |
|
| 7 |
| vulnerability |
VCID-atun-stks-4kcb |
|
| 8 |
| vulnerability |
VCID-axc3-wcsk-q3eg |
|
| 9 |
| vulnerability |
VCID-b8zs-br97-57av |
|
| 10 |
| vulnerability |
VCID-c1d7-4rje-ayf9 |
|
| 11 |
| vulnerability |
VCID-d4ka-dk4p-kfhb |
|
| 12 |
| vulnerability |
VCID-drt9-vx5r-akgm |
|
| 13 |
| vulnerability |
VCID-dzdx-wae5-8ydy |
|
| 14 |
| vulnerability |
VCID-e3z2-ydhb-gqfg |
|
| 15 |
| vulnerability |
VCID-ezaq-tqd3-4yd1 |
|
| 16 |
| vulnerability |
VCID-ezux-6buh-h7h7 |
|
| 17 |
| vulnerability |
VCID-fj2p-7wkh-1fhq |
|
| 18 |
| vulnerability |
VCID-g2pj-dmae-e3er |
|
| 19 |
| vulnerability |
VCID-geaa-6dxx-tbcw |
|
| 20 |
| vulnerability |
VCID-h1n3-cmte-eugf |
|
| 21 |
| vulnerability |
VCID-hqar-fca3-cbht |
|
| 22 |
| vulnerability |
VCID-jhxm-379u-subt |
|
| 23 |
| vulnerability |
VCID-jnmu-c8dt-5yb6 |
|
| 24 |
| vulnerability |
VCID-jrxz-b168-7ug4 |
|
| 25 |
| vulnerability |
VCID-kb5h-116p-33b4 |
|
| 26 |
| vulnerability |
VCID-nukv-kkws-xkb1 |
|
| 27 |
| vulnerability |
VCID-puq1-z5h7-pkdg |
|
| 28 |
| vulnerability |
VCID-rdwq-93d6-c7b4 |
|
| 29 |
| vulnerability |
VCID-rknj-nkgs-wyg2 |
|
| 30 |
| vulnerability |
VCID-rsry-fw45-9yev |
|
| 31 |
| vulnerability |
VCID-swpr-3qae-d7fe |
|
| 32 |
| vulnerability |
VCID-uhg5-zpzt-e3gz |
|
| 33 |
| vulnerability |
VCID-ujbp-cc1r-wfe9 |
|
| 34 |
| vulnerability |
VCID-v3h9-1t69-v7a3 |
|
| 35 |
| vulnerability |
VCID-v6rk-y6ws-dkh9 |
|
| 36 |
| vulnerability |
VCID-w8qm-73f3-rkbm |
|
| 37 |
| vulnerability |
VCID-wqm7-2ajr-6ue8 |
|
| 38 |
| vulnerability |
VCID-x5e2-7whc-v3fc |
|
| 39 |
| vulnerability |
VCID-x94k-nxyd-27gs |
|
| 40 |
| vulnerability |
VCID-xg2f-12w4-yqge |
|
| 41 |
| vulnerability |
VCID-xw8r-fn6y-mbhp |
|
| 42 |
| vulnerability |
VCID-y91x-2rch-pkar |
|
| 43 |
| vulnerability |
VCID-yeea-n94x-qqch |
|
| 44 |
| vulnerability |
VCID-yur3-am6j-w7ay |
|
| 45 |
| vulnerability |
VCID-zmr4-652z-r3dm |
|
| 46 |
| vulnerability |
VCID-zzzs-scbg-bbe9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@2.2.1.0-2~bpo8%252B1 |
|
|
| aliases |
CVE-2016-8614, GHSA-cmwx-9m2h-x7v4, PYSEC-2018-37
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hfxe-jjf5-nqd1 |
|
| 23 |
| url |
VCID-hnjw-vehk-2fdd |
| vulnerability_id |
VCID-hnjw-vehk-2fdd |
| summary |
Ansible before 1.9.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3908 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23694 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23718 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23835 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23876 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23663 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23733 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23779 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23795 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23751 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3908 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://github.com/ansible/ansible |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/ansible/ansible |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
| reference_url |
http://www.ansible.com/security |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
http://www.ansible.com/security |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/ansible@2.2.1.0-2~bpo8%2B1 |
| purl |
pkg:deb/debian/ansible@2.2.1.0-2~bpo8%2B1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1wv8-rvwu-nye3 |
|
| 1 |
| vulnerability |
VCID-3jej-4jyp-cqbt |
|
| 2 |
| vulnerability |
VCID-4pht-n5pc-f3gw |
|
| 3 |
| vulnerability |
VCID-5hwt-gkgx-jqb4 |
|
| 4 |
| vulnerability |
VCID-682j-e2pu-1uee |
|
| 5 |
| vulnerability |
VCID-a49n-tvnt-p3df |
|
| 6 |
| vulnerability |
VCID-ae1r-yq1g-rkem |
|
| 7 |
| vulnerability |
VCID-atun-stks-4kcb |
|
| 8 |
| vulnerability |
VCID-axc3-wcsk-q3eg |
|
| 9 |
| vulnerability |
VCID-b8zs-br97-57av |
|
| 10 |
| vulnerability |
VCID-c1d7-4rje-ayf9 |
|
| 11 |
| vulnerability |
VCID-d4ka-dk4p-kfhb |
|
| 12 |
| vulnerability |
VCID-drt9-vx5r-akgm |
|
| 13 |
| vulnerability |
VCID-dzdx-wae5-8ydy |
|
| 14 |
| vulnerability |
VCID-e3z2-ydhb-gqfg |
|
| 15 |
| vulnerability |
VCID-ezaq-tqd3-4yd1 |
|
| 16 |
| vulnerability |
VCID-ezux-6buh-h7h7 |
|
| 17 |
| vulnerability |
VCID-fj2p-7wkh-1fhq |
|
| 18 |
| vulnerability |
VCID-g2pj-dmae-e3er |
|
| 19 |
| vulnerability |
VCID-geaa-6dxx-tbcw |
|
| 20 |
| vulnerability |
VCID-h1n3-cmte-eugf |
|
| 21 |
| vulnerability |
VCID-hqar-fca3-cbht |
|
| 22 |
| vulnerability |
VCID-jhxm-379u-subt |
|
| 23 |
| vulnerability |
VCID-jnmu-c8dt-5yb6 |
|
| 24 |
| vulnerability |
VCID-jrxz-b168-7ug4 |
|
| 25 |
| vulnerability |
VCID-kb5h-116p-33b4 |
|
| 26 |
| vulnerability |
VCID-nukv-kkws-xkb1 |
|
| 27 |
| vulnerability |
VCID-puq1-z5h7-pkdg |
|
| 28 |
| vulnerability |
VCID-rdwq-93d6-c7b4 |
|
| 29 |
| vulnerability |
VCID-rknj-nkgs-wyg2 |
|
| 30 |
| vulnerability |
VCID-rsry-fw45-9yev |
|
| 31 |
| vulnerability |
VCID-swpr-3qae-d7fe |
|
| 32 |
| vulnerability |
VCID-uhg5-zpzt-e3gz |
|
| 33 |
| vulnerability |
VCID-ujbp-cc1r-wfe9 |
|
| 34 |
| vulnerability |
VCID-v3h9-1t69-v7a3 |
|
| 35 |
| vulnerability |
VCID-v6rk-y6ws-dkh9 |
|
| 36 |
| vulnerability |
VCID-w8qm-73f3-rkbm |
|
| 37 |
| vulnerability |
VCID-wqm7-2ajr-6ue8 |
|
| 38 |
| vulnerability |
VCID-x5e2-7whc-v3fc |
|
| 39 |
| vulnerability |
VCID-x94k-nxyd-27gs |
|
| 40 |
| vulnerability |
VCID-xg2f-12w4-yqge |
|
| 41 |
| vulnerability |
VCID-xw8r-fn6y-mbhp |
|
| 42 |
| vulnerability |
VCID-y91x-2rch-pkar |
|
| 43 |
| vulnerability |
VCID-yeea-n94x-qqch |
|
| 44 |
| vulnerability |
VCID-yur3-am6j-w7ay |
|
| 45 |
| vulnerability |
VCID-zmr4-652z-r3dm |
|
| 46 |
| vulnerability |
VCID-zzzs-scbg-bbe9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@2.2.1.0-2~bpo8%252B1 |
|
|
| aliases |
CVE-2015-3908, GHSA-w64c-pxjj-h866, PYSEC-2015-1
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hnjw-vehk-2fdd |
|
| 24 |
| url |
VCID-hqar-fca3-cbht |
| vulnerability_id |
VCID-hqar-fca3-cbht |
| summary |
A race condition flaw was found in Ansible Engine 2.7.17 and prior, 2.8.9 and prior, 2.9.6 and prior when running a playbook with an unprivileged become user. When Ansible needs to run a module with become user, the temporary directory is created in /var/tmp. This directory is created with "umask 77 && mkdir -p <dir>"; this operation does not fail if the directory already exists and is owned by another user. An attacker could take advantage to gain control of the become user as the target directory can be retrieved by iterating '/proc/<pid>/cmdline'. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-1733 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08244 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08262 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08283 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08291 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08272 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08208 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08259 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08146 |
| published_at |
2026-04-01T12:55:00Z |
|
| 8 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08205 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-1733 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
| reference_url |
https://github.com/ansible/ansible |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.0 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L |
|
| 1 |
| value |
1.0 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L |
|
| 2 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/ansible/ansible |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2020-1733 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
3.7 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:L/AC:H/Au:N/C:P/I:P/A:P |
|
| 1 |
| value |
5.0 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L |
|
| 2 |
| value |
1.0 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L |
|
| 3 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2020-1733 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/ansible@2.7.7%2Bdfsg-1%2Bdeb10u1 |
| purl |
pkg:deb/debian/ansible@2.7.7%2Bdfsg-1%2Bdeb10u1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1wv8-rvwu-nye3 |
|
| 1 |
| vulnerability |
VCID-3jej-4jyp-cqbt |
|
| 2 |
| vulnerability |
VCID-4pht-n5pc-f3gw |
|
| 3 |
| vulnerability |
VCID-682j-e2pu-1uee |
|
| 4 |
| vulnerability |
VCID-a49n-tvnt-p3df |
|
| 5 |
| vulnerability |
VCID-ae1r-yq1g-rkem |
|
| 6 |
| vulnerability |
VCID-atun-stks-4kcb |
|
| 7 |
| vulnerability |
VCID-axc3-wcsk-q3eg |
|
| 8 |
| vulnerability |
VCID-b8zs-br97-57av |
|
| 9 |
| vulnerability |
VCID-d4ka-dk4p-kfhb |
|
| 10 |
| vulnerability |
VCID-dzdx-wae5-8ydy |
|
| 11 |
| vulnerability |
VCID-e3z2-ydhb-gqfg |
|
| 12 |
| vulnerability |
VCID-ezaq-tqd3-4yd1 |
|
| 13 |
| vulnerability |
VCID-ezux-6buh-h7h7 |
|
| 14 |
| vulnerability |
VCID-fj2p-7wkh-1fhq |
|
| 15 |
| vulnerability |
VCID-g2pj-dmae-e3er |
|
| 16 |
| vulnerability |
VCID-geaa-6dxx-tbcw |
|
| 17 |
| vulnerability |
VCID-h1n3-cmte-eugf |
|
| 18 |
| vulnerability |
VCID-hqar-fca3-cbht |
|
| 19 |
| vulnerability |
VCID-jnmu-c8dt-5yb6 |
|
| 20 |
| vulnerability |
VCID-jrxz-b168-7ug4 |
|
| 21 |
| vulnerability |
VCID-kb5h-116p-33b4 |
|
| 22 |
| vulnerability |
VCID-nukv-kkws-xkb1 |
|
| 23 |
| vulnerability |
VCID-rdwq-93d6-c7b4 |
|
| 24 |
| vulnerability |
VCID-rsry-fw45-9yev |
|
| 25 |
| vulnerability |
VCID-swpr-3qae-d7fe |
|
| 26 |
| vulnerability |
VCID-uhg5-zpzt-e3gz |
|
| 27 |
| vulnerability |
VCID-ujbp-cc1r-wfe9 |
|
| 28 |
| vulnerability |
VCID-v3h9-1t69-v7a3 |
|
| 29 |
| vulnerability |
VCID-v6rk-y6ws-dkh9 |
|
| 30 |
| vulnerability |
VCID-w8qm-73f3-rkbm |
|
| 31 |
| vulnerability |
VCID-x5e2-7whc-v3fc |
|
| 32 |
| vulnerability |
VCID-x94k-nxyd-27gs |
|
| 33 |
| vulnerability |
VCID-xg2f-12w4-yqge |
|
| 34 |
| vulnerability |
VCID-xw8r-fn6y-mbhp |
|
| 35 |
| vulnerability |
VCID-yeea-n94x-qqch |
|
| 36 |
| vulnerability |
VCID-yur3-am6j-w7ay |
|
| 37 |
| vulnerability |
VCID-zzzs-scbg-bbe9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@2.7.7%252Bdfsg-1%252Bdeb10u1 |
|
| 1 |
|
|
| aliases |
CVE-2020-1733, GHSA-g4mq-6fp5-qwcf, PYSEC-2020-5
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hqar-fca3-cbht |
|
| 25 |
| url |
VCID-jhxm-379u-subt |
| vulnerability_id |
VCID-jhxm-379u-subt |
| summary |
Ansible before version 2.3 has an input validation vulnerability in the handling of data sent from client systems. An attacker with control over a client system being managed by Ansible, and the ability to send facts back to the Ansible server, could use this flaw to execute arbitrary code on the Ansible server using the Ansible server privileges. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7466 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02741 |
| scoring_system |
epss |
| scoring_elements |
0.85982 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.02741 |
| scoring_system |
epss |
| scoring_elements |
0.85915 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.02741 |
| scoring_system |
epss |
| scoring_elements |
0.85927 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.02741 |
| scoring_system |
epss |
| scoring_elements |
0.85943 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.02741 |
| scoring_system |
epss |
| scoring_elements |
0.85945 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.02741 |
| scoring_system |
epss |
| scoring_elements |
0.85964 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.02741 |
| scoring_system |
epss |
| scoring_elements |
0.85974 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.02741 |
| scoring_system |
epss |
| scoring_elements |
0.85989 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.02741 |
| scoring_system |
epss |
| scoring_elements |
0.85987 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7466 |
|
| 8 |
|
| 9 |
|
| 10 |
| reference_url |
https://github.com/ansible/ansible |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8.0 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
8.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/ansible/ansible |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2017-7466 |
| reference_id |
CVE-2017-7466 |
| reference_type |
|
| scores |
| 0 |
| value |
8.5 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:S/C:C/I:C/A:C |
|
| 1 |
| value |
8.0 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H |
|
| 2 |
| value |
8.0 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H |
|
| 3 |
| value |
8.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 4 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2017-7466 |
|
| 22 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/ansible@2.2.1.0-2%2Bdeb9u1 |
| purl |
pkg:deb/debian/ansible@2.2.1.0-2%2Bdeb9u1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1wv8-rvwu-nye3 |
|
| 1 |
| vulnerability |
VCID-3jej-4jyp-cqbt |
|
| 2 |
| vulnerability |
VCID-4pht-n5pc-f3gw |
|
| 3 |
| vulnerability |
VCID-5hwt-gkgx-jqb4 |
|
| 4 |
| vulnerability |
VCID-682j-e2pu-1uee |
|
| 5 |
| vulnerability |
VCID-a49n-tvnt-p3df |
|
| 6 |
| vulnerability |
VCID-ae1r-yq1g-rkem |
|
| 7 |
| vulnerability |
VCID-atun-stks-4kcb |
|
| 8 |
| vulnerability |
VCID-axc3-wcsk-q3eg |
|
| 9 |
| vulnerability |
VCID-b8zs-br97-57av |
|
| 10 |
| vulnerability |
VCID-c1d7-4rje-ayf9 |
|
| 11 |
| vulnerability |
VCID-d4ka-dk4p-kfhb |
|
| 12 |
| vulnerability |
VCID-drt9-vx5r-akgm |
|
| 13 |
| vulnerability |
VCID-dzdx-wae5-8ydy |
|
| 14 |
| vulnerability |
VCID-e3z2-ydhb-gqfg |
|
| 15 |
| vulnerability |
VCID-ezaq-tqd3-4yd1 |
|
| 16 |
| vulnerability |
VCID-ezux-6buh-h7h7 |
|
| 17 |
| vulnerability |
VCID-fj2p-7wkh-1fhq |
|
| 18 |
| vulnerability |
VCID-g2pj-dmae-e3er |
|
| 19 |
| vulnerability |
VCID-geaa-6dxx-tbcw |
|
| 20 |
| vulnerability |
VCID-h1n3-cmte-eugf |
|
| 21 |
| vulnerability |
VCID-hqar-fca3-cbht |
|
| 22 |
| vulnerability |
VCID-jnmu-c8dt-5yb6 |
|
| 23 |
| vulnerability |
VCID-jrxz-b168-7ug4 |
|
| 24 |
| vulnerability |
VCID-kb5h-116p-33b4 |
|
| 25 |
| vulnerability |
VCID-nukv-kkws-xkb1 |
|
| 26 |
| vulnerability |
VCID-puq1-z5h7-pkdg |
|
| 27 |
| vulnerability |
VCID-rdwq-93d6-c7b4 |
|
| 28 |
| vulnerability |
VCID-rknj-nkgs-wyg2 |
|
| 29 |
| vulnerability |
VCID-rsry-fw45-9yev |
|
| 30 |
| vulnerability |
VCID-swpr-3qae-d7fe |
|
| 31 |
| vulnerability |
VCID-uhg5-zpzt-e3gz |
|
| 32 |
| vulnerability |
VCID-ujbp-cc1r-wfe9 |
|
| 33 |
| vulnerability |
VCID-v3h9-1t69-v7a3 |
|
| 34 |
| vulnerability |
VCID-v6rk-y6ws-dkh9 |
|
| 35 |
| vulnerability |
VCID-w8qm-73f3-rkbm |
|
| 36 |
| vulnerability |
VCID-wqm7-2ajr-6ue8 |
|
| 37 |
| vulnerability |
VCID-x5e2-7whc-v3fc |
|
| 38 |
| vulnerability |
VCID-x94k-nxyd-27gs |
|
| 39 |
| vulnerability |
VCID-xg2f-12w4-yqge |
|
| 40 |
| vulnerability |
VCID-xw8r-fn6y-mbhp |
|
| 41 |
| vulnerability |
VCID-y91x-2rch-pkar |
|
| 42 |
| vulnerability |
VCID-yeea-n94x-qqch |
|
| 43 |
| vulnerability |
VCID-yur3-am6j-w7ay |
|
| 44 |
| vulnerability |
VCID-zmr4-652z-r3dm |
|
| 45 |
| vulnerability |
VCID-zzzs-scbg-bbe9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@2.2.1.0-2%252Bdeb9u1 |
|
|
| aliases |
CVE-2017-7466, GHSA-3m8p-xpm6-8ww3, PYSEC-2018-40
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jhxm-379u-subt |
|
| 26 |
| url |
VCID-jnmu-c8dt-5yb6 |
| vulnerability_id |
VCID-jnmu-c8dt-5yb6 |
| summary |
A vulnerability was found in Ansible engine 2.x up to 2.8 and Ansible tower 3.x up to 3.5. When a module has an argument_spec with sub parameters marked as no_log, passing an invalid parameter name to the module will cause the task to fail before the no_log options in the sub parameters are processed. As a result, data in the sub parameter fields will not be masked and will be displayed if Ansible is run with increased verbosity and present in the module invocation arguments for the task. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-14858 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.1843 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18479 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18624 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18679 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18394 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18475 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18528 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18529 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18481 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-14858 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
| reference_url |
https://github.com/ansible/ansible |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
6.8 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/ansible/ansible |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2019-14858 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
2.1 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:L/AC:L/Au:N/C:P/I:N/A:N |
|
| 1 |
| value |
7.3 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H |
|
| 2 |
| value |
5.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 3 |
| value |
6.8 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 4 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2019-14858 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-14858, GHSA-h653-95qw-h2mp, PYSEC-2019-171
|
| risk_score |
3.3 |
| exploitability |
0.5 |
| weighted_severity |
6.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jnmu-c8dt-5yb6 |
|
| 27 |
| url |
VCID-jrxz-b168-7ug4 |
| vulnerability_id |
VCID-jrxz-b168-7ug4 |
| summary |
A flaw was found in the Ansible Engine, in ansible-engine 2.8.x before 2.8.15 and ansible-engine 2.9.x before 2.9.13, when installing packages using the dnf module. GPG signatures are ignored during installation even when disable_gpg_check is set to False, which is the default behavior. This flaw leads to malicious packages being installed on the system and arbitrary code executed via package installation scripts. The highest threat from this vulnerability is to integrity and system availability. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-14365 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0007 |
| scoring_system |
epss |
| scoring_elements |
0.21575 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.0007 |
| scoring_system |
epss |
| scoring_elements |
0.21632 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.0007 |
| scoring_system |
epss |
| scoring_elements |
0.2167 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.0007 |
| scoring_system |
epss |
| scoring_elements |
0.21658 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.0007 |
| scoring_system |
epss |
| scoring_elements |
0.216 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0007 |
| scoring_system |
epss |
| scoring_elements |
0.21524 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.0007 |
| scoring_system |
epss |
| scoring_elements |
0.21774 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.0007 |
| scoring_system |
epss |
| scoring_elements |
0.21718 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.0007 |
| scoring_system |
epss |
| scoring_elements |
0.21548 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-14365 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
| reference_url |
https://github.com/advisories/GHSA-m429-fhmv-c6q2 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
|
| 1 |
| value |
MODERATE |
| scoring_system |
cvssv3.1_qr |
| scoring_elements |
|
|
| 2 |
| value |
6.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/advisories/GHSA-m429-fhmv-c6q2 |
|
| 23 |
| reference_url |
https://github.com/ansible/ansible |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
|
| 1 |
| value |
6.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/ansible/ansible |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/ansible@2.7.7%2Bdfsg-1%2Bdeb10u1 |
| purl |
pkg:deb/debian/ansible@2.7.7%2Bdfsg-1%2Bdeb10u1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1wv8-rvwu-nye3 |
|
| 1 |
| vulnerability |
VCID-3jej-4jyp-cqbt |
|
| 2 |
| vulnerability |
VCID-4pht-n5pc-f3gw |
|
| 3 |
| vulnerability |
VCID-682j-e2pu-1uee |
|
| 4 |
| vulnerability |
VCID-a49n-tvnt-p3df |
|
| 5 |
| vulnerability |
VCID-ae1r-yq1g-rkem |
|
| 6 |
| vulnerability |
VCID-atun-stks-4kcb |
|
| 7 |
| vulnerability |
VCID-axc3-wcsk-q3eg |
|
| 8 |
| vulnerability |
VCID-b8zs-br97-57av |
|
| 9 |
| vulnerability |
VCID-d4ka-dk4p-kfhb |
|
| 10 |
| vulnerability |
VCID-dzdx-wae5-8ydy |
|
| 11 |
| vulnerability |
VCID-e3z2-ydhb-gqfg |
|
| 12 |
| vulnerability |
VCID-ezaq-tqd3-4yd1 |
|
| 13 |
| vulnerability |
VCID-ezux-6buh-h7h7 |
|
| 14 |
| vulnerability |
VCID-fj2p-7wkh-1fhq |
|
| 15 |
| vulnerability |
VCID-g2pj-dmae-e3er |
|
| 16 |
| vulnerability |
VCID-geaa-6dxx-tbcw |
|
| 17 |
| vulnerability |
VCID-h1n3-cmte-eugf |
|
| 18 |
| vulnerability |
VCID-hqar-fca3-cbht |
|
| 19 |
| vulnerability |
VCID-jnmu-c8dt-5yb6 |
|
| 20 |
| vulnerability |
VCID-jrxz-b168-7ug4 |
|
| 21 |
| vulnerability |
VCID-kb5h-116p-33b4 |
|
| 22 |
| vulnerability |
VCID-nukv-kkws-xkb1 |
|
| 23 |
| vulnerability |
VCID-rdwq-93d6-c7b4 |
|
| 24 |
| vulnerability |
VCID-rsry-fw45-9yev |
|
| 25 |
| vulnerability |
VCID-swpr-3qae-d7fe |
|
| 26 |
| vulnerability |
VCID-uhg5-zpzt-e3gz |
|
| 27 |
| vulnerability |
VCID-ujbp-cc1r-wfe9 |
|
| 28 |
| vulnerability |
VCID-v3h9-1t69-v7a3 |
|
| 29 |
| vulnerability |
VCID-v6rk-y6ws-dkh9 |
|
| 30 |
| vulnerability |
VCID-w8qm-73f3-rkbm |
|
| 31 |
| vulnerability |
VCID-x5e2-7whc-v3fc |
|
| 32 |
| vulnerability |
VCID-x94k-nxyd-27gs |
|
| 33 |
| vulnerability |
VCID-xg2f-12w4-yqge |
|
| 34 |
| vulnerability |
VCID-xw8r-fn6y-mbhp |
|
| 35 |
| vulnerability |
VCID-yeea-n94x-qqch |
|
| 36 |
| vulnerability |
VCID-yur3-am6j-w7ay |
|
| 37 |
| vulnerability |
VCID-zzzs-scbg-bbe9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@2.7.7%252Bdfsg-1%252Bdeb10u1 |
|
| 1 |
|
|
| aliases |
CVE-2020-14365, GHSA-m429-fhmv-c6q2, PYSEC-2020-209
|
| risk_score |
3.2 |
| exploitability |
0.5 |
| weighted_severity |
6.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jrxz-b168-7ug4 |
|
| 28 |
| url |
VCID-kb5h-116p-33b4 |
| vulnerability_id |
VCID-kb5h-116p-33b4 |
| summary |
In Ansible, all Ansible Engine versions up to ansible-engine 2.8.5, ansible-engine 2.7.13, ansible-engine 2.6.19, were logging at the DEBUG level which lead to a disclosure of credentials if a plugin used a library that logged credentials at the DEBUG level. This flaw does not affect Ansible modules, as those are executed in a separate process. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-14846 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00153 |
| scoring_system |
epss |
| scoring_elements |
0.35985 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00153 |
| scoring_system |
epss |
| scoring_elements |
0.35913 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00153 |
| scoring_system |
epss |
| scoring_elements |
0.36104 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00153 |
| scoring_system |
epss |
| scoring_elements |
0.36134 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00153 |
| scoring_system |
epss |
| scoring_elements |
0.3597 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00153 |
| scoring_system |
epss |
| scoring_elements |
0.36019 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00153 |
| scoring_system |
epss |
| scoring_elements |
0.36043 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00153 |
| scoring_system |
epss |
| scoring_elements |
0.36048 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00153 |
| scoring_system |
epss |
| scoring_elements |
0.3601 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-14846 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
| reference_url |
https://github.com/ansible/ansible |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
8.5 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/ansible/ansible |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2019-14846 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
2.1 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:L/AC:L/Au:N/C:P/I:N/A:N |
|
| 1 |
| value |
7.3 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H |
|
| 2 |
| value |
7.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 3 |
| value |
8.5 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 4 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2019-14846 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/ansible@2.7.7%2Bdfsg-1%2Bdeb10u1 |
| purl |
pkg:deb/debian/ansible@2.7.7%2Bdfsg-1%2Bdeb10u1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1wv8-rvwu-nye3 |
|
| 1 |
| vulnerability |
VCID-3jej-4jyp-cqbt |
|
| 2 |
| vulnerability |
VCID-4pht-n5pc-f3gw |
|
| 3 |
| vulnerability |
VCID-682j-e2pu-1uee |
|
| 4 |
| vulnerability |
VCID-a49n-tvnt-p3df |
|
| 5 |
| vulnerability |
VCID-ae1r-yq1g-rkem |
|
| 6 |
| vulnerability |
VCID-atun-stks-4kcb |
|
| 7 |
| vulnerability |
VCID-axc3-wcsk-q3eg |
|
| 8 |
| vulnerability |
VCID-b8zs-br97-57av |
|
| 9 |
| vulnerability |
VCID-d4ka-dk4p-kfhb |
|
| 10 |
| vulnerability |
VCID-dzdx-wae5-8ydy |
|
| 11 |
| vulnerability |
VCID-e3z2-ydhb-gqfg |
|
| 12 |
| vulnerability |
VCID-ezaq-tqd3-4yd1 |
|
| 13 |
| vulnerability |
VCID-ezux-6buh-h7h7 |
|
| 14 |
| vulnerability |
VCID-fj2p-7wkh-1fhq |
|
| 15 |
| vulnerability |
VCID-g2pj-dmae-e3er |
|
| 16 |
| vulnerability |
VCID-geaa-6dxx-tbcw |
|
| 17 |
| vulnerability |
VCID-h1n3-cmte-eugf |
|
| 18 |
| vulnerability |
VCID-hqar-fca3-cbht |
|
| 19 |
| vulnerability |
VCID-jnmu-c8dt-5yb6 |
|
| 20 |
| vulnerability |
VCID-jrxz-b168-7ug4 |
|
| 21 |
| vulnerability |
VCID-kb5h-116p-33b4 |
|
| 22 |
| vulnerability |
VCID-nukv-kkws-xkb1 |
|
| 23 |
| vulnerability |
VCID-rdwq-93d6-c7b4 |
|
| 24 |
| vulnerability |
VCID-rsry-fw45-9yev |
|
| 25 |
| vulnerability |
VCID-swpr-3qae-d7fe |
|
| 26 |
| vulnerability |
VCID-uhg5-zpzt-e3gz |
|
| 27 |
| vulnerability |
VCID-ujbp-cc1r-wfe9 |
|
| 28 |
| vulnerability |
VCID-v3h9-1t69-v7a3 |
|
| 29 |
| vulnerability |
VCID-v6rk-y6ws-dkh9 |
|
| 30 |
| vulnerability |
VCID-w8qm-73f3-rkbm |
|
| 31 |
| vulnerability |
VCID-x5e2-7whc-v3fc |
|
| 32 |
| vulnerability |
VCID-x94k-nxyd-27gs |
|
| 33 |
| vulnerability |
VCID-xg2f-12w4-yqge |
|
| 34 |
| vulnerability |
VCID-xw8r-fn6y-mbhp |
|
| 35 |
| vulnerability |
VCID-yeea-n94x-qqch |
|
| 36 |
| vulnerability |
VCID-yur3-am6j-w7ay |
|
| 37 |
| vulnerability |
VCID-zzzs-scbg-bbe9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@2.7.7%252Bdfsg-1%252Bdeb10u1 |
|
| 1 |
|
|
| aliases |
CVE-2019-14846, GHSA-pm48-cvv2-29q5, PYSEC-2019-4
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kb5h-116p-33b4 |
|
| 29 |
| url |
VCID-nukv-kkws-xkb1 |
| vulnerability_id |
VCID-nukv-kkws-xkb1 |
| summary |
A flaw was found in ansible 2.8.0 before 2.8.4. Fields managing sensitive data should be set as such by no_log feature. Some of these fields in GCP modules are not set properly. service_account_contents() which is common class for all gcp modules is not setting no_log to True. Any sensitive data managed by that function would be leak as an output when running ansible playbooks. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-10217 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62258 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62171 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62229 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.6228 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62301 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62311 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62293 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62275 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62225 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-10217 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://github.com/ansible/ansible |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/ansible/ansible |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2019-10217 |
| reference_id |
CVE-2019-10217 |
| reference_type |
|
| scores |
| 0 |
| value |
4.0 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:L/Au:S/C:P/I:N/A:N |
|
| 1 |
| value |
5.7 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N |
|
| 2 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 3 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 4 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2019-10217 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-10217, GHSA-p75j-wc34-527c, PYSEC-2019-3
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-nukv-kkws-xkb1 |
|
| 30 |
| url |
VCID-puq1-z5h7-pkdg |
| vulnerability_id |
VCID-puq1-z5h7-pkdg |
| summary |
ansible before versions 2.5.14, 2.6.11, 2.7.5 is vulnerable to a information disclosure flaw in vvv+ mode with no_log on that can lead to leakage of sensible data. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-16876 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00638 |
| scoring_system |
epss |
| scoring_elements |
0.70437 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00638 |
| scoring_system |
epss |
| scoring_elements |
0.70446 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00638 |
| scoring_system |
epss |
| scoring_elements |
0.70491 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00638 |
| scoring_system |
epss |
| scoring_elements |
0.70506 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00638 |
| scoring_system |
epss |
| scoring_elements |
0.7053 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00638 |
| scoring_system |
epss |
| scoring_elements |
0.70515 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00638 |
| scoring_system |
epss |
| scoring_elements |
0.70501 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00638 |
| scoring_system |
epss |
| scoring_elements |
0.70451 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00638 |
| scoring_system |
epss |
| scoring_elements |
0.70468 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-16876 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
| reference_url |
https://github.com/ansible/ansible |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
8.2 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/ansible/ansible |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
| reference_url |
https://usn.ubuntu.com/4072-1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
8.2 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://usn.ubuntu.com/4072-1 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2018-16876 |
| reference_id |
CVE-2018-16876 |
| reference_type |
|
| scores |
| 0 |
| value |
3.5 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:S/C:P/I:N/A:N |
|
| 1 |
| value |
3.1 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N |
|
| 2 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 3 |
| value |
8.2 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 4 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2018-16876 |
|
| 48 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/ansible@2.2.1.0-2%2Bdeb9u1 |
| purl |
pkg:deb/debian/ansible@2.2.1.0-2%2Bdeb9u1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1wv8-rvwu-nye3 |
|
| 1 |
| vulnerability |
VCID-3jej-4jyp-cqbt |
|
| 2 |
| vulnerability |
VCID-4pht-n5pc-f3gw |
|
| 3 |
| vulnerability |
VCID-5hwt-gkgx-jqb4 |
|
| 4 |
| vulnerability |
VCID-682j-e2pu-1uee |
|
| 5 |
| vulnerability |
VCID-a49n-tvnt-p3df |
|
| 6 |
| vulnerability |
VCID-ae1r-yq1g-rkem |
|
| 7 |
| vulnerability |
VCID-atun-stks-4kcb |
|
| 8 |
| vulnerability |
VCID-axc3-wcsk-q3eg |
|
| 9 |
| vulnerability |
VCID-b8zs-br97-57av |
|
| 10 |
| vulnerability |
VCID-c1d7-4rje-ayf9 |
|
| 11 |
| vulnerability |
VCID-d4ka-dk4p-kfhb |
|
| 12 |
| vulnerability |
VCID-drt9-vx5r-akgm |
|
| 13 |
| vulnerability |
VCID-dzdx-wae5-8ydy |
|
| 14 |
| vulnerability |
VCID-e3z2-ydhb-gqfg |
|
| 15 |
| vulnerability |
VCID-ezaq-tqd3-4yd1 |
|
| 16 |
| vulnerability |
VCID-ezux-6buh-h7h7 |
|
| 17 |
| vulnerability |
VCID-fj2p-7wkh-1fhq |
|
| 18 |
| vulnerability |
VCID-g2pj-dmae-e3er |
|
| 19 |
| vulnerability |
VCID-geaa-6dxx-tbcw |
|
| 20 |
| vulnerability |
VCID-h1n3-cmte-eugf |
|
| 21 |
| vulnerability |
VCID-hqar-fca3-cbht |
|
| 22 |
| vulnerability |
VCID-jnmu-c8dt-5yb6 |
|
| 23 |
| vulnerability |
VCID-jrxz-b168-7ug4 |
|
| 24 |
| vulnerability |
VCID-kb5h-116p-33b4 |
|
| 25 |
| vulnerability |
VCID-nukv-kkws-xkb1 |
|
| 26 |
| vulnerability |
VCID-puq1-z5h7-pkdg |
|
| 27 |
| vulnerability |
VCID-rdwq-93d6-c7b4 |
|
| 28 |
| vulnerability |
VCID-rknj-nkgs-wyg2 |
|
| 29 |
| vulnerability |
VCID-rsry-fw45-9yev |
|
| 30 |
| vulnerability |
VCID-swpr-3qae-d7fe |
|
| 31 |
| vulnerability |
VCID-uhg5-zpzt-e3gz |
|
| 32 |
| vulnerability |
VCID-ujbp-cc1r-wfe9 |
|
| 33 |
| vulnerability |
VCID-v3h9-1t69-v7a3 |
|
| 34 |
| vulnerability |
VCID-v6rk-y6ws-dkh9 |
|
| 35 |
| vulnerability |
VCID-w8qm-73f3-rkbm |
|
| 36 |
| vulnerability |
VCID-wqm7-2ajr-6ue8 |
|
| 37 |
| vulnerability |
VCID-x5e2-7whc-v3fc |
|
| 38 |
| vulnerability |
VCID-x94k-nxyd-27gs |
|
| 39 |
| vulnerability |
VCID-xg2f-12w4-yqge |
|
| 40 |
| vulnerability |
VCID-xw8r-fn6y-mbhp |
|
| 41 |
| vulnerability |
VCID-y91x-2rch-pkar |
|
| 42 |
| vulnerability |
VCID-yeea-n94x-qqch |
|
| 43 |
| vulnerability |
VCID-yur3-am6j-w7ay |
|
| 44 |
| vulnerability |
VCID-zmr4-652z-r3dm |
|
| 45 |
| vulnerability |
VCID-zzzs-scbg-bbe9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@2.2.1.0-2%252Bdeb9u1 |
|
| 1 |
| url |
pkg:deb/debian/ansible@2.7.7%2Bdfsg-1%2Bdeb10u1 |
| purl |
pkg:deb/debian/ansible@2.7.7%2Bdfsg-1%2Bdeb10u1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1wv8-rvwu-nye3 |
|
| 1 |
| vulnerability |
VCID-3jej-4jyp-cqbt |
|
| 2 |
| vulnerability |
VCID-4pht-n5pc-f3gw |
|
| 3 |
| vulnerability |
VCID-682j-e2pu-1uee |
|
| 4 |
| vulnerability |
VCID-a49n-tvnt-p3df |
|
| 5 |
| vulnerability |
VCID-ae1r-yq1g-rkem |
|
| 6 |
| vulnerability |
VCID-atun-stks-4kcb |
|
| 7 |
| vulnerability |
VCID-axc3-wcsk-q3eg |
|
| 8 |
| vulnerability |
VCID-b8zs-br97-57av |
|
| 9 |
| vulnerability |
VCID-d4ka-dk4p-kfhb |
|
| 10 |
| vulnerability |
VCID-dzdx-wae5-8ydy |
|
| 11 |
| vulnerability |
VCID-e3z2-ydhb-gqfg |
|
| 12 |
| vulnerability |
VCID-ezaq-tqd3-4yd1 |
|
| 13 |
| vulnerability |
VCID-ezux-6buh-h7h7 |
|
| 14 |
| vulnerability |
VCID-fj2p-7wkh-1fhq |
|
| 15 |
| vulnerability |
VCID-g2pj-dmae-e3er |
|
| 16 |
| vulnerability |
VCID-geaa-6dxx-tbcw |
|
| 17 |
| vulnerability |
VCID-h1n3-cmte-eugf |
|
| 18 |
| vulnerability |
VCID-hqar-fca3-cbht |
|
| 19 |
| vulnerability |
VCID-jnmu-c8dt-5yb6 |
|
| 20 |
| vulnerability |
VCID-jrxz-b168-7ug4 |
|
| 21 |
| vulnerability |
VCID-kb5h-116p-33b4 |
|
| 22 |
| vulnerability |
VCID-nukv-kkws-xkb1 |
|
| 23 |
| vulnerability |
VCID-rdwq-93d6-c7b4 |
|
| 24 |
| vulnerability |
VCID-rsry-fw45-9yev |
|
| 25 |
| vulnerability |
VCID-swpr-3qae-d7fe |
|
| 26 |
| vulnerability |
VCID-uhg5-zpzt-e3gz |
|
| 27 |
| vulnerability |
VCID-ujbp-cc1r-wfe9 |
|
| 28 |
| vulnerability |
VCID-v3h9-1t69-v7a3 |
|
| 29 |
| vulnerability |
VCID-v6rk-y6ws-dkh9 |
|
| 30 |
| vulnerability |
VCID-w8qm-73f3-rkbm |
|
| 31 |
| vulnerability |
VCID-x5e2-7whc-v3fc |
|
| 32 |
| vulnerability |
VCID-x94k-nxyd-27gs |
|
| 33 |
| vulnerability |
VCID-xg2f-12w4-yqge |
|
| 34 |
| vulnerability |
VCID-xw8r-fn6y-mbhp |
|
| 35 |
| vulnerability |
VCID-yeea-n94x-qqch |
|
| 36 |
| vulnerability |
VCID-yur3-am6j-w7ay |
|
| 37 |
| vulnerability |
VCID-zzzs-scbg-bbe9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@2.7.7%252Bdfsg-1%252Bdeb10u1 |
|
|
| aliases |
CVE-2018-16876, GHSA-j569-fghw-f9rx, PYSEC-2019-141
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-puq1-z5h7-pkdg |
|
| 31 |
| url |
VCID-q4q1-aueh-sub2 |
| vulnerability_id |
VCID-q4q1-aueh-sub2 |
| summary |
Ansible before version 2.2.0 fails to properly sanitize fact variables sent from the Ansible controller. An attacker with the ability to create special variables on the controller could execute arbitrary commands on Ansible clients as the user Ansible runs as. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-8628 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00422 |
| scoring_system |
epss |
| scoring_elements |
0.62098 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.00422 |
| scoring_system |
epss |
| scoring_elements |
0.6208 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00422 |
| scoring_system |
epss |
| scoring_elements |
0.62031 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00422 |
| scoring_system |
epss |
| scoring_elements |
0.62061 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00422 |
| scoring_system |
epss |
| scoring_elements |
0.6203 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00422 |
| scoring_system |
epss |
| scoring_elements |
0.62118 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00422 |
| scoring_system |
epss |
| scoring_elements |
0.62107 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00422 |
| scoring_system |
epss |
| scoring_elements |
0.62086 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00422 |
| scoring_system |
epss |
| scoring_elements |
0.61959 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-8628 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://github.com/advisories/GHSA-jg4f-jqm5-4mgq |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
|
| 1 |
| value |
CRITICAL |
| scoring_system |
cvssv3.1_qr |
| scoring_elements |
|
|
| 2 |
| value |
9.4 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H |
|
| 3 |
| value |
CRITICAL |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/advisories/GHSA-jg4f-jqm5-4mgq |
|
| 7 |
| reference_url |
https://github.com/ansible/ansible |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
|
| 1 |
| value |
9.4 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H |
|
| 2 |
| value |
CRITICAL |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/ansible/ansible |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/ansible@2.2.1.0-2~bpo8%2B1 |
| purl |
pkg:deb/debian/ansible@2.2.1.0-2~bpo8%2B1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1wv8-rvwu-nye3 |
|
| 1 |
| vulnerability |
VCID-3jej-4jyp-cqbt |
|
| 2 |
| vulnerability |
VCID-4pht-n5pc-f3gw |
|
| 3 |
| vulnerability |
VCID-5hwt-gkgx-jqb4 |
|
| 4 |
| vulnerability |
VCID-682j-e2pu-1uee |
|
| 5 |
| vulnerability |
VCID-a49n-tvnt-p3df |
|
| 6 |
| vulnerability |
VCID-ae1r-yq1g-rkem |
|
| 7 |
| vulnerability |
VCID-atun-stks-4kcb |
|
| 8 |
| vulnerability |
VCID-axc3-wcsk-q3eg |
|
| 9 |
| vulnerability |
VCID-b8zs-br97-57av |
|
| 10 |
| vulnerability |
VCID-c1d7-4rje-ayf9 |
|
| 11 |
| vulnerability |
VCID-d4ka-dk4p-kfhb |
|
| 12 |
| vulnerability |
VCID-drt9-vx5r-akgm |
|
| 13 |
| vulnerability |
VCID-dzdx-wae5-8ydy |
|
| 14 |
| vulnerability |
VCID-e3z2-ydhb-gqfg |
|
| 15 |
| vulnerability |
VCID-ezaq-tqd3-4yd1 |
|
| 16 |
| vulnerability |
VCID-ezux-6buh-h7h7 |
|
| 17 |
| vulnerability |
VCID-fj2p-7wkh-1fhq |
|
| 18 |
| vulnerability |
VCID-g2pj-dmae-e3er |
|
| 19 |
| vulnerability |
VCID-geaa-6dxx-tbcw |
|
| 20 |
| vulnerability |
VCID-h1n3-cmte-eugf |
|
| 21 |
| vulnerability |
VCID-hqar-fca3-cbht |
|
| 22 |
| vulnerability |
VCID-jhxm-379u-subt |
|
| 23 |
| vulnerability |
VCID-jnmu-c8dt-5yb6 |
|
| 24 |
| vulnerability |
VCID-jrxz-b168-7ug4 |
|
| 25 |
| vulnerability |
VCID-kb5h-116p-33b4 |
|
| 26 |
| vulnerability |
VCID-nukv-kkws-xkb1 |
|
| 27 |
| vulnerability |
VCID-puq1-z5h7-pkdg |
|
| 28 |
| vulnerability |
VCID-rdwq-93d6-c7b4 |
|
| 29 |
| vulnerability |
VCID-rknj-nkgs-wyg2 |
|
| 30 |
| vulnerability |
VCID-rsry-fw45-9yev |
|
| 31 |
| vulnerability |
VCID-swpr-3qae-d7fe |
|
| 32 |
| vulnerability |
VCID-uhg5-zpzt-e3gz |
|
| 33 |
| vulnerability |
VCID-ujbp-cc1r-wfe9 |
|
| 34 |
| vulnerability |
VCID-v3h9-1t69-v7a3 |
|
| 35 |
| vulnerability |
VCID-v6rk-y6ws-dkh9 |
|
| 36 |
| vulnerability |
VCID-w8qm-73f3-rkbm |
|
| 37 |
| vulnerability |
VCID-wqm7-2ajr-6ue8 |
|
| 38 |
| vulnerability |
VCID-x5e2-7whc-v3fc |
|
| 39 |
| vulnerability |
VCID-x94k-nxyd-27gs |
|
| 40 |
| vulnerability |
VCID-xg2f-12w4-yqge |
|
| 41 |
| vulnerability |
VCID-xw8r-fn6y-mbhp |
|
| 42 |
| vulnerability |
VCID-y91x-2rch-pkar |
|
| 43 |
| vulnerability |
VCID-yeea-n94x-qqch |
|
| 44 |
| vulnerability |
VCID-yur3-am6j-w7ay |
|
| 45 |
| vulnerability |
VCID-zmr4-652z-r3dm |
|
| 46 |
| vulnerability |
VCID-zzzs-scbg-bbe9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@2.2.1.0-2~bpo8%252B1 |
|
|
| aliases |
CVE-2016-8628, GHSA-jg4f-jqm5-4mgq, PYSEC-2018-38
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-q4q1-aueh-sub2 |
|
| 32 |
| url |
VCID-rdwq-93d6-c7b4 |
| vulnerability_id |
VCID-rdwq-93d6-c7b4 |
| summary |
An incomplete fix was found for the fix of the flaw CVE-2020-1733 ansible: insecure temporary directory when running become_user from become directive. The provided fix is insufficient to prevent the race condition on systems using ACLs and FUSE filesystems. Ansible Engine 2.7.18, 2.8.12, and 2.9.9 as well as previous versions are affected and Ansible Tower 3.4.5, 3.5.6 and 3.6.4 as well as previous versions are affected. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10744 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11545 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.1157 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11597 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11537 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11452 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11664 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11607 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.1148 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10744 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://github.com/ansible/ansible |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.0 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L |
|
| 1 |
| value |
2.0 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L |
|
| 2 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/ansible/ansible |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-10744, GHSA-vp9j-rghq-8jhh, PYSEC-2020-208
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rdwq-93d6-c7b4 |
|
| 33 |
| url |
VCID-rknj-nkgs-wyg2 |
| vulnerability_id |
VCID-rknj-nkgs-wyg2 |
| summary |
Ansible "User" module leaks any data which is passed on as a parameter to ssh-keygen. This could lean in undesirable situations such as passphrases credentials passed as a parameter for the ssh-keygen executable. Showing those credentials in clear text form for every user which have access just to the process list. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-16837 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12429 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12291 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12329 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12367 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.1236 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12309 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.1223 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12385 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.1227 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-16837 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
| reference_url |
https://github.com/ansible/ansible |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
8.5 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/ansible/ansible |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
| reference_url |
https://usn.ubuntu.com/4072-1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
8.5 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://usn.ubuntu.com/4072-1 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/ansible@2.2.1.0-2%2Bdeb9u1 |
| purl |
pkg:deb/debian/ansible@2.2.1.0-2%2Bdeb9u1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1wv8-rvwu-nye3 |
|
| 1 |
| vulnerability |
VCID-3jej-4jyp-cqbt |
|
| 2 |
| vulnerability |
VCID-4pht-n5pc-f3gw |
|
| 3 |
| vulnerability |
VCID-5hwt-gkgx-jqb4 |
|
| 4 |
| vulnerability |
VCID-682j-e2pu-1uee |
|
| 5 |
| vulnerability |
VCID-a49n-tvnt-p3df |
|
| 6 |
| vulnerability |
VCID-ae1r-yq1g-rkem |
|
| 7 |
| vulnerability |
VCID-atun-stks-4kcb |
|
| 8 |
| vulnerability |
VCID-axc3-wcsk-q3eg |
|
| 9 |
| vulnerability |
VCID-b8zs-br97-57av |
|
| 10 |
| vulnerability |
VCID-c1d7-4rje-ayf9 |
|
| 11 |
| vulnerability |
VCID-d4ka-dk4p-kfhb |
|
| 12 |
| vulnerability |
VCID-drt9-vx5r-akgm |
|
| 13 |
| vulnerability |
VCID-dzdx-wae5-8ydy |
|
| 14 |
| vulnerability |
VCID-e3z2-ydhb-gqfg |
|
| 15 |
| vulnerability |
VCID-ezaq-tqd3-4yd1 |
|
| 16 |
| vulnerability |
VCID-ezux-6buh-h7h7 |
|
| 17 |
| vulnerability |
VCID-fj2p-7wkh-1fhq |
|
| 18 |
| vulnerability |
VCID-g2pj-dmae-e3er |
|
| 19 |
| vulnerability |
VCID-geaa-6dxx-tbcw |
|
| 20 |
| vulnerability |
VCID-h1n3-cmte-eugf |
|
| 21 |
| vulnerability |
VCID-hqar-fca3-cbht |
|
| 22 |
| vulnerability |
VCID-jnmu-c8dt-5yb6 |
|
| 23 |
| vulnerability |
VCID-jrxz-b168-7ug4 |
|
| 24 |
| vulnerability |
VCID-kb5h-116p-33b4 |
|
| 25 |
| vulnerability |
VCID-nukv-kkws-xkb1 |
|
| 26 |
| vulnerability |
VCID-puq1-z5h7-pkdg |
|
| 27 |
| vulnerability |
VCID-rdwq-93d6-c7b4 |
|
| 28 |
| vulnerability |
VCID-rknj-nkgs-wyg2 |
|
| 29 |
| vulnerability |
VCID-rsry-fw45-9yev |
|
| 30 |
| vulnerability |
VCID-swpr-3qae-d7fe |
|
| 31 |
| vulnerability |
VCID-uhg5-zpzt-e3gz |
|
| 32 |
| vulnerability |
VCID-ujbp-cc1r-wfe9 |
|
| 33 |
| vulnerability |
VCID-v3h9-1t69-v7a3 |
|
| 34 |
| vulnerability |
VCID-v6rk-y6ws-dkh9 |
|
| 35 |
| vulnerability |
VCID-w8qm-73f3-rkbm |
|
| 36 |
| vulnerability |
VCID-wqm7-2ajr-6ue8 |
|
| 37 |
| vulnerability |
VCID-x5e2-7whc-v3fc |
|
| 38 |
| vulnerability |
VCID-x94k-nxyd-27gs |
|
| 39 |
| vulnerability |
VCID-xg2f-12w4-yqge |
|
| 40 |
| vulnerability |
VCID-xw8r-fn6y-mbhp |
|
| 41 |
| vulnerability |
VCID-y91x-2rch-pkar |
|
| 42 |
| vulnerability |
VCID-yeea-n94x-qqch |
|
| 43 |
| vulnerability |
VCID-yur3-am6j-w7ay |
|
| 44 |
| vulnerability |
VCID-zmr4-652z-r3dm |
|
| 45 |
| vulnerability |
VCID-zzzs-scbg-bbe9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@2.2.1.0-2%252Bdeb9u1 |
|
| 1 |
| url |
pkg:deb/debian/ansible@2.7.7%2Bdfsg-1%2Bdeb10u1 |
| purl |
pkg:deb/debian/ansible@2.7.7%2Bdfsg-1%2Bdeb10u1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1wv8-rvwu-nye3 |
|
| 1 |
| vulnerability |
VCID-3jej-4jyp-cqbt |
|
| 2 |
| vulnerability |
VCID-4pht-n5pc-f3gw |
|
| 3 |
| vulnerability |
VCID-682j-e2pu-1uee |
|
| 4 |
| vulnerability |
VCID-a49n-tvnt-p3df |
|
| 5 |
| vulnerability |
VCID-ae1r-yq1g-rkem |
|
| 6 |
| vulnerability |
VCID-atun-stks-4kcb |
|
| 7 |
| vulnerability |
VCID-axc3-wcsk-q3eg |
|
| 8 |
| vulnerability |
VCID-b8zs-br97-57av |
|
| 9 |
| vulnerability |
VCID-d4ka-dk4p-kfhb |
|
| 10 |
| vulnerability |
VCID-dzdx-wae5-8ydy |
|
| 11 |
| vulnerability |
VCID-e3z2-ydhb-gqfg |
|
| 12 |
| vulnerability |
VCID-ezaq-tqd3-4yd1 |
|
| 13 |
| vulnerability |
VCID-ezux-6buh-h7h7 |
|
| 14 |
| vulnerability |
VCID-fj2p-7wkh-1fhq |
|
| 15 |
| vulnerability |
VCID-g2pj-dmae-e3er |
|
| 16 |
| vulnerability |
VCID-geaa-6dxx-tbcw |
|
| 17 |
| vulnerability |
VCID-h1n3-cmte-eugf |
|
| 18 |
| vulnerability |
VCID-hqar-fca3-cbht |
|
| 19 |
| vulnerability |
VCID-jnmu-c8dt-5yb6 |
|
| 20 |
| vulnerability |
VCID-jrxz-b168-7ug4 |
|
| 21 |
| vulnerability |
VCID-kb5h-116p-33b4 |
|
| 22 |
| vulnerability |
VCID-nukv-kkws-xkb1 |
|
| 23 |
| vulnerability |
VCID-rdwq-93d6-c7b4 |
|
| 24 |
| vulnerability |
VCID-rsry-fw45-9yev |
|
| 25 |
| vulnerability |
VCID-swpr-3qae-d7fe |
|
| 26 |
| vulnerability |
VCID-uhg5-zpzt-e3gz |
|
| 27 |
| vulnerability |
VCID-ujbp-cc1r-wfe9 |
|
| 28 |
| vulnerability |
VCID-v3h9-1t69-v7a3 |
|
| 29 |
| vulnerability |
VCID-v6rk-y6ws-dkh9 |
|
| 30 |
| vulnerability |
VCID-w8qm-73f3-rkbm |
|
| 31 |
| vulnerability |
VCID-x5e2-7whc-v3fc |
|
| 32 |
| vulnerability |
VCID-x94k-nxyd-27gs |
|
| 33 |
| vulnerability |
VCID-xg2f-12w4-yqge |
|
| 34 |
| vulnerability |
VCID-xw8r-fn6y-mbhp |
|
| 35 |
| vulnerability |
VCID-yeea-n94x-qqch |
|
| 36 |
| vulnerability |
VCID-yur3-am6j-w7ay |
|
| 37 |
| vulnerability |
VCID-zzzs-scbg-bbe9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@2.7.7%252Bdfsg-1%252Bdeb10u1 |
|
|
| aliases |
CVE-2018-16837, GHSA-hwrm-63v2-42g4, PYSEC-2018-44
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rknj-nkgs-wyg2 |
|
| 34 |
| url |
VCID-rsry-fw45-9yev |
| vulnerability_id |
VCID-rsry-fw45-9yev |
| summary |
A flaw was found in several ansible modules, where parameters containing credentials, such as secrets, were being logged in plain-text on managed nodes, as well as being made visible on the controller node when run in verbose mode. These parameters were not protected by the no_log feature. An attacker can take advantage of this information to steal those credentials, provided when they have access to the log files containing them. The highest threat from this vulnerability is to data confidentiality. This flaw affects Red Hat Ansible Automation Platform in versions before 1.2.2 and Ansible Tower in versions before 3.8.2. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3447 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.21842 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.2187 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.21967 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.21926 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.22007 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.22059 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.21824 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.21899 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.21955 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3447 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3447, PYSEC-2021-107
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rsry-fw45-9yev |
|
| 35 |
| url |
VCID-s1r4-29kw-5kbg |
| vulnerability_id |
VCID-s1r4-29kw-5kbg |
| summary |
The create_script function in the lxc_container module in Ansible before 1.9.6-1 and 2.x before 2.0.2.0 allows local users to write to arbitrary files or gain privileges via a symlink attack on (1) /opt/.lxc-attach-script, (2) the archived container in the archive_path directory, or the (3) lxc-attach-script.log or (4) lxc-attach-script.err files in the temporary directory. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-3096 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.1098 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.11012 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.11009 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.10955 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.1088 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.11056 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.10995 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.10855 |
| published_at |
2026-04-01T12:55:00Z |
|
| 8 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.10957 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-3096 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
| reference_url |
https://github.com/ansible/ansible |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
8.5 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/ansible/ansible |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2016-3096 |
| reference_id |
CVE-2016-3096 |
| reference_type |
|
| scores |
| 0 |
| value |
7.2 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:L/AC:L/Au:N/C:C/I:C/A:C |
|
| 1 |
| value |
7.8 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 2 |
| value |
7.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 3 |
| value |
8.5 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 4 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2016-3096 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/ansible@2.2.1.0-2~bpo8%2B1 |
| purl |
pkg:deb/debian/ansible@2.2.1.0-2~bpo8%2B1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1wv8-rvwu-nye3 |
|
| 1 |
| vulnerability |
VCID-3jej-4jyp-cqbt |
|
| 2 |
| vulnerability |
VCID-4pht-n5pc-f3gw |
|
| 3 |
| vulnerability |
VCID-5hwt-gkgx-jqb4 |
|
| 4 |
| vulnerability |
VCID-682j-e2pu-1uee |
|
| 5 |
| vulnerability |
VCID-a49n-tvnt-p3df |
|
| 6 |
| vulnerability |
VCID-ae1r-yq1g-rkem |
|
| 7 |
| vulnerability |
VCID-atun-stks-4kcb |
|
| 8 |
| vulnerability |
VCID-axc3-wcsk-q3eg |
|
| 9 |
| vulnerability |
VCID-b8zs-br97-57av |
|
| 10 |
| vulnerability |
VCID-c1d7-4rje-ayf9 |
|
| 11 |
| vulnerability |
VCID-d4ka-dk4p-kfhb |
|
| 12 |
| vulnerability |
VCID-drt9-vx5r-akgm |
|
| 13 |
| vulnerability |
VCID-dzdx-wae5-8ydy |
|
| 14 |
| vulnerability |
VCID-e3z2-ydhb-gqfg |
|
| 15 |
| vulnerability |
VCID-ezaq-tqd3-4yd1 |
|
| 16 |
| vulnerability |
VCID-ezux-6buh-h7h7 |
|
| 17 |
| vulnerability |
VCID-fj2p-7wkh-1fhq |
|
| 18 |
| vulnerability |
VCID-g2pj-dmae-e3er |
|
| 19 |
| vulnerability |
VCID-geaa-6dxx-tbcw |
|
| 20 |
| vulnerability |
VCID-h1n3-cmte-eugf |
|
| 21 |
| vulnerability |
VCID-hqar-fca3-cbht |
|
| 22 |
| vulnerability |
VCID-jhxm-379u-subt |
|
| 23 |
| vulnerability |
VCID-jnmu-c8dt-5yb6 |
|
| 24 |
| vulnerability |
VCID-jrxz-b168-7ug4 |
|
| 25 |
| vulnerability |
VCID-kb5h-116p-33b4 |
|
| 26 |
| vulnerability |
VCID-nukv-kkws-xkb1 |
|
| 27 |
| vulnerability |
VCID-puq1-z5h7-pkdg |
|
| 28 |
| vulnerability |
VCID-rdwq-93d6-c7b4 |
|
| 29 |
| vulnerability |
VCID-rknj-nkgs-wyg2 |
|
| 30 |
| vulnerability |
VCID-rsry-fw45-9yev |
|
| 31 |
| vulnerability |
VCID-swpr-3qae-d7fe |
|
| 32 |
| vulnerability |
VCID-uhg5-zpzt-e3gz |
|
| 33 |
| vulnerability |
VCID-ujbp-cc1r-wfe9 |
|
| 34 |
| vulnerability |
VCID-v3h9-1t69-v7a3 |
|
| 35 |
| vulnerability |
VCID-v6rk-y6ws-dkh9 |
|
| 36 |
| vulnerability |
VCID-w8qm-73f3-rkbm |
|
| 37 |
| vulnerability |
VCID-wqm7-2ajr-6ue8 |
|
| 38 |
| vulnerability |
VCID-x5e2-7whc-v3fc |
|
| 39 |
| vulnerability |
VCID-x94k-nxyd-27gs |
|
| 40 |
| vulnerability |
VCID-xg2f-12w4-yqge |
|
| 41 |
| vulnerability |
VCID-xw8r-fn6y-mbhp |
|
| 42 |
| vulnerability |
VCID-y91x-2rch-pkar |
|
| 43 |
| vulnerability |
VCID-yeea-n94x-qqch |
|
| 44 |
| vulnerability |
VCID-yur3-am6j-w7ay |
|
| 45 |
| vulnerability |
VCID-zmr4-652z-r3dm |
|
| 46 |
| vulnerability |
VCID-zzzs-scbg-bbe9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@2.2.1.0-2~bpo8%252B1 |
|
|
| aliases |
CVE-2016-3096, GHSA-rh6x-qvg7-rrmj, PYSEC-2016-1
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-s1r4-29kw-5kbg |
|
| 36 |
| url |
VCID-swpr-3qae-d7fe |
| vulnerability_id |
VCID-swpr-3qae-d7fe |
| summary |
ansible-playbook -k and ansible cli tools, all versions 2.8.x before 2.8.4, all 2.7.x before 2.7.13 and all 2.6.x before 2.6.19, prompt passwords by expanding them from templates as they could contain special characters. Passwords should be wrapped to prevent templates trigger and exposing them. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-10206 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00221 |
| scoring_system |
epss |
| scoring_elements |
0.44719 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00221 |
| scoring_system |
epss |
| scoring_elements |
0.44699 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00221 |
| scoring_system |
epss |
| scoring_elements |
0.44618 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00221 |
| scoring_system |
epss |
| scoring_elements |
0.44697 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00221 |
| scoring_system |
epss |
| scoring_elements |
0.44696 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00221 |
| scoring_system |
epss |
| scoring_elements |
0.44728 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00221 |
| scoring_system |
epss |
| scoring_elements |
0.44711 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00221 |
| scoring_system |
epss |
| scoring_elements |
0.44709 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00221 |
| scoring_system |
epss |
| scoring_elements |
0.44656 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-10206 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
| reference_url |
https://github.com/ansible/ansible |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/ansible/ansible |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2019-10206 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.0 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:L/Au:S/C:P/I:N/A:N |
|
| 1 |
| value |
6.4 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N |
|
| 2 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 3 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 4 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2019-10206 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/ansible@2.7.7%2Bdfsg-1%2Bdeb10u1 |
| purl |
pkg:deb/debian/ansible@2.7.7%2Bdfsg-1%2Bdeb10u1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1wv8-rvwu-nye3 |
|
| 1 |
| vulnerability |
VCID-3jej-4jyp-cqbt |
|
| 2 |
| vulnerability |
VCID-4pht-n5pc-f3gw |
|
| 3 |
| vulnerability |
VCID-682j-e2pu-1uee |
|
| 4 |
| vulnerability |
VCID-a49n-tvnt-p3df |
|
| 5 |
| vulnerability |
VCID-ae1r-yq1g-rkem |
|
| 6 |
| vulnerability |
VCID-atun-stks-4kcb |
|
| 7 |
| vulnerability |
VCID-axc3-wcsk-q3eg |
|
| 8 |
| vulnerability |
VCID-b8zs-br97-57av |
|
| 9 |
| vulnerability |
VCID-d4ka-dk4p-kfhb |
|
| 10 |
| vulnerability |
VCID-dzdx-wae5-8ydy |
|
| 11 |
| vulnerability |
VCID-e3z2-ydhb-gqfg |
|
| 12 |
| vulnerability |
VCID-ezaq-tqd3-4yd1 |
|
| 13 |
| vulnerability |
VCID-ezux-6buh-h7h7 |
|
| 14 |
| vulnerability |
VCID-fj2p-7wkh-1fhq |
|
| 15 |
| vulnerability |
VCID-g2pj-dmae-e3er |
|
| 16 |
| vulnerability |
VCID-geaa-6dxx-tbcw |
|
| 17 |
| vulnerability |
VCID-h1n3-cmte-eugf |
|
| 18 |
| vulnerability |
VCID-hqar-fca3-cbht |
|
| 19 |
| vulnerability |
VCID-jnmu-c8dt-5yb6 |
|
| 20 |
| vulnerability |
VCID-jrxz-b168-7ug4 |
|
| 21 |
| vulnerability |
VCID-kb5h-116p-33b4 |
|
| 22 |
| vulnerability |
VCID-nukv-kkws-xkb1 |
|
| 23 |
| vulnerability |
VCID-rdwq-93d6-c7b4 |
|
| 24 |
| vulnerability |
VCID-rsry-fw45-9yev |
|
| 25 |
| vulnerability |
VCID-swpr-3qae-d7fe |
|
| 26 |
| vulnerability |
VCID-uhg5-zpzt-e3gz |
|
| 27 |
| vulnerability |
VCID-ujbp-cc1r-wfe9 |
|
| 28 |
| vulnerability |
VCID-v3h9-1t69-v7a3 |
|
| 29 |
| vulnerability |
VCID-v6rk-y6ws-dkh9 |
|
| 30 |
| vulnerability |
VCID-w8qm-73f3-rkbm |
|
| 31 |
| vulnerability |
VCID-x5e2-7whc-v3fc |
|
| 32 |
| vulnerability |
VCID-x94k-nxyd-27gs |
|
| 33 |
| vulnerability |
VCID-xg2f-12w4-yqge |
|
| 34 |
| vulnerability |
VCID-xw8r-fn6y-mbhp |
|
| 35 |
| vulnerability |
VCID-yeea-n94x-qqch |
|
| 36 |
| vulnerability |
VCID-yur3-am6j-w7ay |
|
| 37 |
| vulnerability |
VCID-zzzs-scbg-bbe9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@2.7.7%252Bdfsg-1%252Bdeb10u1 |
|
| 1 |
|
|
| aliases |
CVE-2019-10206, GHSA-cqmr-rcpr-cxh3, PYSEC-2019-145
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-swpr-3qae-d7fe |
|
| 37 |
| url |
VCID-uhg5-zpzt-e3gz |
| vulnerability_id |
VCID-uhg5-zpzt-e3gz |
| summary |
Ansible, versions 2.9.x before 2.9.1, 2.8.x before 2.8.7 and Ansible versions 2.7.x before 2.7.15, is not respecting the flag no_log set it to True when Sumologic and Splunk callback plugins are used send tasks results events to collectors. This would discloses and collects any sensitive data. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-14864 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00964 |
| scoring_system |
epss |
| scoring_elements |
0.76568 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.00964 |
| scoring_system |
epss |
| scoring_elements |
0.76542 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00964 |
| scoring_system |
epss |
| scoring_elements |
0.7653 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00964 |
| scoring_system |
epss |
| scoring_elements |
0.76547 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.01015 |
| scoring_system |
epss |
| scoring_elements |
0.77099 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.01015 |
| scoring_system |
epss |
| scoring_elements |
0.77128 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.01015 |
| scoring_system |
epss |
| scoring_elements |
0.77111 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.01015 |
| scoring_system |
epss |
| scoring_elements |
0.77093 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-14864 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/ansible@2.7.7%2Bdfsg-1%2Bdeb10u1 |
| purl |
pkg:deb/debian/ansible@2.7.7%2Bdfsg-1%2Bdeb10u1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1wv8-rvwu-nye3 |
|
| 1 |
| vulnerability |
VCID-3jej-4jyp-cqbt |
|
| 2 |
| vulnerability |
VCID-4pht-n5pc-f3gw |
|
| 3 |
| vulnerability |
VCID-682j-e2pu-1uee |
|
| 4 |
| vulnerability |
VCID-a49n-tvnt-p3df |
|
| 5 |
| vulnerability |
VCID-ae1r-yq1g-rkem |
|
| 6 |
| vulnerability |
VCID-atun-stks-4kcb |
|
| 7 |
| vulnerability |
VCID-axc3-wcsk-q3eg |
|
| 8 |
| vulnerability |
VCID-b8zs-br97-57av |
|
| 9 |
| vulnerability |
VCID-d4ka-dk4p-kfhb |
|
| 10 |
| vulnerability |
VCID-dzdx-wae5-8ydy |
|
| 11 |
| vulnerability |
VCID-e3z2-ydhb-gqfg |
|
| 12 |
| vulnerability |
VCID-ezaq-tqd3-4yd1 |
|
| 13 |
| vulnerability |
VCID-ezux-6buh-h7h7 |
|
| 14 |
| vulnerability |
VCID-fj2p-7wkh-1fhq |
|
| 15 |
| vulnerability |
VCID-g2pj-dmae-e3er |
|
| 16 |
| vulnerability |
VCID-geaa-6dxx-tbcw |
|
| 17 |
| vulnerability |
VCID-h1n3-cmte-eugf |
|
| 18 |
| vulnerability |
VCID-hqar-fca3-cbht |
|
| 19 |
| vulnerability |
VCID-jnmu-c8dt-5yb6 |
|
| 20 |
| vulnerability |
VCID-jrxz-b168-7ug4 |
|
| 21 |
| vulnerability |
VCID-kb5h-116p-33b4 |
|
| 22 |
| vulnerability |
VCID-nukv-kkws-xkb1 |
|
| 23 |
| vulnerability |
VCID-rdwq-93d6-c7b4 |
|
| 24 |
| vulnerability |
VCID-rsry-fw45-9yev |
|
| 25 |
| vulnerability |
VCID-swpr-3qae-d7fe |
|
| 26 |
| vulnerability |
VCID-uhg5-zpzt-e3gz |
|
| 27 |
| vulnerability |
VCID-ujbp-cc1r-wfe9 |
|
| 28 |
| vulnerability |
VCID-v3h9-1t69-v7a3 |
|
| 29 |
| vulnerability |
VCID-v6rk-y6ws-dkh9 |
|
| 30 |
| vulnerability |
VCID-w8qm-73f3-rkbm |
|
| 31 |
| vulnerability |
VCID-x5e2-7whc-v3fc |
|
| 32 |
| vulnerability |
VCID-x94k-nxyd-27gs |
|
| 33 |
| vulnerability |
VCID-xg2f-12w4-yqge |
|
| 34 |
| vulnerability |
VCID-xw8r-fn6y-mbhp |
|
| 35 |
| vulnerability |
VCID-yeea-n94x-qqch |
|
| 36 |
| vulnerability |
VCID-yur3-am6j-w7ay |
|
| 37 |
| vulnerability |
VCID-zzzs-scbg-bbe9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@2.7.7%252Bdfsg-1%252Bdeb10u1 |
|
| 1 |
|
|
| aliases |
CVE-2019-14864, GHSA-3m93-m4q6-mc6v, PYSEC-2020-160
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-uhg5-zpzt-e3gz |
|
| 38 |
| url |
VCID-ujbp-cc1r-wfe9 |
| vulnerability_id |
VCID-ujbp-cc1r-wfe9 |
| summary |
Ansible symlink attack vulnerability
An absolute path traversal attack exists in the Ansible automation platform. This flaw allows an attacker to craft a malicious Ansible role and make the victim execute the role. A symlink can be used to overwrite a file outside of the extraction path. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-5115 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00716 |
| scoring_system |
epss |
| scoring_elements |
0.72353 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00716 |
| scoring_system |
epss |
| scoring_elements |
0.72376 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00716 |
| scoring_system |
epss |
| scoring_elements |
0.72388 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00716 |
| scoring_system |
epss |
| scoring_elements |
0.72404 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00716 |
| scoring_system |
epss |
| scoring_elements |
0.72381 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00716 |
| scoring_system |
epss |
| scoring_elements |
0.7233 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00716 |
| scoring_system |
epss |
| scoring_elements |
0.72335 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00716 |
| scoring_system |
epss |
| scoring_elements |
0.72369 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-5115 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-5115, GHSA-jpvw-p8pr-9g2x
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ujbp-cc1r-wfe9 |
|
| 39 |
| url |
VCID-v3h9-1t69-v7a3 |
| vulnerability_id |
VCID-v3h9-1t69-v7a3 |
| summary |
An Improper Output Neutralization for Logs flaw was found in Ansible when using the uri module, where sensitive data is exposed to content and json output. This flaw allows an attacker to access the logs or outputs of performed tasks to read keys used in playbooks from other users within the uri module. The highest threat from this vulnerability is to data confidentiality. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-14330 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.32894 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.32919 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.32957 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.32955 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.32878 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.33048 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.33015 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.32884 |
| published_at |
2026-04-01T12:55:00Z |
|
| 8 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.32925 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-14330 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
| reference_url |
https://github.com/advisories/GHSA-785x-qw4v-6872 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
MODERATE |
| scoring_system |
cvssv3.1_qr |
| scoring_elements |
|
|
| 2 |
| value |
6.8 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/advisories/GHSA-785x-qw4v-6872 |
|
| 23 |
| reference_url |
https://github.com/ansible/ansible |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
6.8 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/ansible/ansible |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/ansible@2.7.7%2Bdfsg-1%2Bdeb10u1 |
| purl |
pkg:deb/debian/ansible@2.7.7%2Bdfsg-1%2Bdeb10u1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1wv8-rvwu-nye3 |
|
| 1 |
| vulnerability |
VCID-3jej-4jyp-cqbt |
|
| 2 |
| vulnerability |
VCID-4pht-n5pc-f3gw |
|
| 3 |
| vulnerability |
VCID-682j-e2pu-1uee |
|
| 4 |
| vulnerability |
VCID-a49n-tvnt-p3df |
|
| 5 |
| vulnerability |
VCID-ae1r-yq1g-rkem |
|
| 6 |
| vulnerability |
VCID-atun-stks-4kcb |
|
| 7 |
| vulnerability |
VCID-axc3-wcsk-q3eg |
|
| 8 |
| vulnerability |
VCID-b8zs-br97-57av |
|
| 9 |
| vulnerability |
VCID-d4ka-dk4p-kfhb |
|
| 10 |
| vulnerability |
VCID-dzdx-wae5-8ydy |
|
| 11 |
| vulnerability |
VCID-e3z2-ydhb-gqfg |
|
| 12 |
| vulnerability |
VCID-ezaq-tqd3-4yd1 |
|
| 13 |
| vulnerability |
VCID-ezux-6buh-h7h7 |
|
| 14 |
| vulnerability |
VCID-fj2p-7wkh-1fhq |
|
| 15 |
| vulnerability |
VCID-g2pj-dmae-e3er |
|
| 16 |
| vulnerability |
VCID-geaa-6dxx-tbcw |
|
| 17 |
| vulnerability |
VCID-h1n3-cmte-eugf |
|
| 18 |
| vulnerability |
VCID-hqar-fca3-cbht |
|
| 19 |
| vulnerability |
VCID-jnmu-c8dt-5yb6 |
|
| 20 |
| vulnerability |
VCID-jrxz-b168-7ug4 |
|
| 21 |
| vulnerability |
VCID-kb5h-116p-33b4 |
|
| 22 |
| vulnerability |
VCID-nukv-kkws-xkb1 |
|
| 23 |
| vulnerability |
VCID-rdwq-93d6-c7b4 |
|
| 24 |
| vulnerability |
VCID-rsry-fw45-9yev |
|
| 25 |
| vulnerability |
VCID-swpr-3qae-d7fe |
|
| 26 |
| vulnerability |
VCID-uhg5-zpzt-e3gz |
|
| 27 |
| vulnerability |
VCID-ujbp-cc1r-wfe9 |
|
| 28 |
| vulnerability |
VCID-v3h9-1t69-v7a3 |
|
| 29 |
| vulnerability |
VCID-v6rk-y6ws-dkh9 |
|
| 30 |
| vulnerability |
VCID-w8qm-73f3-rkbm |
|
| 31 |
| vulnerability |
VCID-x5e2-7whc-v3fc |
|
| 32 |
| vulnerability |
VCID-x94k-nxyd-27gs |
|
| 33 |
| vulnerability |
VCID-xg2f-12w4-yqge |
|
| 34 |
| vulnerability |
VCID-xw8r-fn6y-mbhp |
|
| 35 |
| vulnerability |
VCID-yeea-n94x-qqch |
|
| 36 |
| vulnerability |
VCID-yur3-am6j-w7ay |
|
| 37 |
| vulnerability |
VCID-zzzs-scbg-bbe9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@2.7.7%252Bdfsg-1%252Bdeb10u1 |
|
| 1 |
|
|
| aliases |
CVE-2020-14330, GHSA-785x-qw4v-6872, PYSEC-2020-3
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-v3h9-1t69-v7a3 |
|
| 40 |
| url |
VCID-v6rk-y6ws-dkh9 |
| vulnerability_id |
VCID-v6rk-y6ws-dkh9 |
| summary |
Ansible-Core vulnerable to content protections bypass
A flaw was found in Ansible-Core. This vulnerability allows attackers to bypass unsafe content protections using the hostvars object to reference and execute templated content. This issue can lead to arbitrary code execution if remote data or module outputs are improperly templated within playbooks. |
| references |
| 0 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:10770 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L |
|
| 1 |
| value |
1.2 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L/E:P |
|
| 2 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-12T14:41:52Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:10770 |
|
| 1 |
| reference_url |
https://access.redhat.com/errata/RHSA-2024:11145 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L |
|
| 1 |
| value |
1.2 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L/E:P |
|
| 2 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-12T14:41:52Z/ |
|
|
| url |
https://access.redhat.com/errata/RHSA-2024:11145 |
|
| 2 |
|
| 3 |
| reference_url |
https://access.redhat.com/security/cve/CVE-2024-11079 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L |
|
| 1 |
| value |
1.2 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L/E:P |
|
| 2 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-12T14:41:52Z/ |
|
|
| url |
https://access.redhat.com/security/cve/CVE-2024-11079 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-11079 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19813 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19772 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.20045 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19986 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19905 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19915 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19871 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19851 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-11079 |
|
| 5 |
| reference_url |
https://bugzilla.redhat.com/show_bug.cgi?id=2325171 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L |
|
| 1 |
| value |
1.2 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L/E:P |
|
| 2 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-12T14:41:52Z/ |
|
|
| url |
https://bugzilla.redhat.com/show_bug.cgi?id=2325171 |
|
| 6 |
|
| 7 |
|
| 8 |
| reference_url |
https://github.com/ansible/ansible |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L |
|
| 1 |
| value |
1.2 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L/E:P |
|
| 2 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/ansible/ansible |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-11079, GHSA-99w6-3xph-cx78
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-v6rk-y6ws-dkh9 |
|
| 41 |
| url |
VCID-w8qm-73f3-rkbm |
| vulnerability_id |
VCID-w8qm-73f3-rkbm |
| summary |
Ansible may expose private key
A flaw was found in the Ansible Automation Platform. When creating a new keypair, the ec2_key module prints out the private key directly to the standard output. This flaw allows an attacker to fetch those keys from the log files, compromising the system's confidentiality, integrity, and availability. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-4237 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.21913 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.21826 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.21883 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.21962 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.22015 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.2178 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.21857 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.21924 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-4237 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-4237, GHSA-ww3m-ffrm-qvqv
|
| risk_score |
3.3 |
| exploitability |
0.5 |
| weighted_severity |
6.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-w8qm-73f3-rkbm |
|
| 42 |
| url |
VCID-wqm7-2ajr-6ue8 |
| vulnerability_id |
VCID-wqm7-2ajr-6ue8 |
| summary |
In ansible it was found that inventory variables are loaded from current working directory when running ad-hoc command which are under attacker's control, allowing to run arbitrary code as a result. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-10874 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14406 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14348 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14404 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14441 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14492 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14437 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14354 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14546 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14476 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-10874 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
| reference_url |
https://github.com/ansible/ansible |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
8.5 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/ansible/ansible |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
| reference_url |
https://usn.ubuntu.com/4072-1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
8.5 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://usn.ubuntu.com/4072-1 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2018-10874 |
| reference_id |
CVE-2018-10874 |
| reference_type |
|
| scores |
| 0 |
| value |
4.6 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:L/AC:L/Au:N/C:P/I:P/A:P |
|
| 1 |
| value |
7.8 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 2 |
| value |
7.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 3 |
| value |
8.5 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 4 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2018-10874 |
|
| 35 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/ansible@2.7.7%2Bdfsg-1%2Bdeb10u1 |
| purl |
pkg:deb/debian/ansible@2.7.7%2Bdfsg-1%2Bdeb10u1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1wv8-rvwu-nye3 |
|
| 1 |
| vulnerability |
VCID-3jej-4jyp-cqbt |
|
| 2 |
| vulnerability |
VCID-4pht-n5pc-f3gw |
|
| 3 |
| vulnerability |
VCID-682j-e2pu-1uee |
|
| 4 |
| vulnerability |
VCID-a49n-tvnt-p3df |
|
| 5 |
| vulnerability |
VCID-ae1r-yq1g-rkem |
|
| 6 |
| vulnerability |
VCID-atun-stks-4kcb |
|
| 7 |
| vulnerability |
VCID-axc3-wcsk-q3eg |
|
| 8 |
| vulnerability |
VCID-b8zs-br97-57av |
|
| 9 |
| vulnerability |
VCID-d4ka-dk4p-kfhb |
|
| 10 |
| vulnerability |
VCID-dzdx-wae5-8ydy |
|
| 11 |
| vulnerability |
VCID-e3z2-ydhb-gqfg |
|
| 12 |
| vulnerability |
VCID-ezaq-tqd3-4yd1 |
|
| 13 |
| vulnerability |
VCID-ezux-6buh-h7h7 |
|
| 14 |
| vulnerability |
VCID-fj2p-7wkh-1fhq |
|
| 15 |
| vulnerability |
VCID-g2pj-dmae-e3er |
|
| 16 |
| vulnerability |
VCID-geaa-6dxx-tbcw |
|
| 17 |
| vulnerability |
VCID-h1n3-cmte-eugf |
|
| 18 |
| vulnerability |
VCID-hqar-fca3-cbht |
|
| 19 |
| vulnerability |
VCID-jnmu-c8dt-5yb6 |
|
| 20 |
| vulnerability |
VCID-jrxz-b168-7ug4 |
|
| 21 |
| vulnerability |
VCID-kb5h-116p-33b4 |
|
| 22 |
| vulnerability |
VCID-nukv-kkws-xkb1 |
|
| 23 |
| vulnerability |
VCID-rdwq-93d6-c7b4 |
|
| 24 |
| vulnerability |
VCID-rsry-fw45-9yev |
|
| 25 |
| vulnerability |
VCID-swpr-3qae-d7fe |
|
| 26 |
| vulnerability |
VCID-uhg5-zpzt-e3gz |
|
| 27 |
| vulnerability |
VCID-ujbp-cc1r-wfe9 |
|
| 28 |
| vulnerability |
VCID-v3h9-1t69-v7a3 |
|
| 29 |
| vulnerability |
VCID-v6rk-y6ws-dkh9 |
|
| 30 |
| vulnerability |
VCID-w8qm-73f3-rkbm |
|
| 31 |
| vulnerability |
VCID-x5e2-7whc-v3fc |
|
| 32 |
| vulnerability |
VCID-x94k-nxyd-27gs |
|
| 33 |
| vulnerability |
VCID-xg2f-12w4-yqge |
|
| 34 |
| vulnerability |
VCID-xw8r-fn6y-mbhp |
|
| 35 |
| vulnerability |
VCID-yeea-n94x-qqch |
|
| 36 |
| vulnerability |
VCID-yur3-am6j-w7ay |
|
| 37 |
| vulnerability |
VCID-zzzs-scbg-bbe9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@2.7.7%252Bdfsg-1%252Bdeb10u1 |
|
|
| aliases |
CVE-2018-10874, GHSA-3xvg-x47j-x75w, PYSEC-2018-81
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wqm7-2ajr-6ue8 |
|
| 43 |
| url |
VCID-x5e2-7whc-v3fc |
| vulnerability_id |
VCID-x5e2-7whc-v3fc |
| summary |
A flaw was discovered in the way Ansible templating was implemented in versions before 2.6.18, 2.7.12 and 2.8.2, causing the possibility of information disclosure through unexpected variable substitution. By taking advantage of unintended variable substitution the content of any variable may be disclosed. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-10156 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.005 |
| scoring_system |
epss |
| scoring_elements |
0.65949 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00653 |
| scoring_system |
epss |
| scoring_elements |
0.70844 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00653 |
| scoring_system |
epss |
| scoring_elements |
0.7083 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00653 |
| scoring_system |
epss |
| scoring_elements |
0.70837 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00653 |
| scoring_system |
epss |
| scoring_elements |
0.70862 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00653 |
| scoring_system |
epss |
| scoring_elements |
0.70881 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00653 |
| scoring_system |
epss |
| scoring_elements |
0.70896 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00653 |
| scoring_system |
epss |
| scoring_elements |
0.70919 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00653 |
| scoring_system |
epss |
| scoring_elements |
0.70904 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-10156 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
| reference_url |
https://github.com/advisories/GHSA-grgm-pph5-j5h7 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.4 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N |
|
| 1 |
| value |
MODERATE |
| scoring_system |
cvssv3.1_qr |
| scoring_elements |
|
|
| 2 |
| value |
5.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/advisories/GHSA-grgm-pph5-j5h7 |
|
| 25 |
| reference_url |
https://github.com/ansible/ansible |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.4 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N |
|
| 1 |
| value |
5.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/ansible/ansible |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/ansible@2.7.7%2Bdfsg-1%2Bdeb10u1 |
| purl |
pkg:deb/debian/ansible@2.7.7%2Bdfsg-1%2Bdeb10u1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1wv8-rvwu-nye3 |
|
| 1 |
| vulnerability |
VCID-3jej-4jyp-cqbt |
|
| 2 |
| vulnerability |
VCID-4pht-n5pc-f3gw |
|
| 3 |
| vulnerability |
VCID-682j-e2pu-1uee |
|
| 4 |
| vulnerability |
VCID-a49n-tvnt-p3df |
|
| 5 |
| vulnerability |
VCID-ae1r-yq1g-rkem |
|
| 6 |
| vulnerability |
VCID-atun-stks-4kcb |
|
| 7 |
| vulnerability |
VCID-axc3-wcsk-q3eg |
|
| 8 |
| vulnerability |
VCID-b8zs-br97-57av |
|
| 9 |
| vulnerability |
VCID-d4ka-dk4p-kfhb |
|
| 10 |
| vulnerability |
VCID-dzdx-wae5-8ydy |
|
| 11 |
| vulnerability |
VCID-e3z2-ydhb-gqfg |
|
| 12 |
| vulnerability |
VCID-ezaq-tqd3-4yd1 |
|
| 13 |
| vulnerability |
VCID-ezux-6buh-h7h7 |
|
| 14 |
| vulnerability |
VCID-fj2p-7wkh-1fhq |
|
| 15 |
| vulnerability |
VCID-g2pj-dmae-e3er |
|
| 16 |
| vulnerability |
VCID-geaa-6dxx-tbcw |
|
| 17 |
| vulnerability |
VCID-h1n3-cmte-eugf |
|
| 18 |
| vulnerability |
VCID-hqar-fca3-cbht |
|
| 19 |
| vulnerability |
VCID-jnmu-c8dt-5yb6 |
|
| 20 |
| vulnerability |
VCID-jrxz-b168-7ug4 |
|
| 21 |
| vulnerability |
VCID-kb5h-116p-33b4 |
|
| 22 |
| vulnerability |
VCID-nukv-kkws-xkb1 |
|
| 23 |
| vulnerability |
VCID-rdwq-93d6-c7b4 |
|
| 24 |
| vulnerability |
VCID-rsry-fw45-9yev |
|
| 25 |
| vulnerability |
VCID-swpr-3qae-d7fe |
|
| 26 |
| vulnerability |
VCID-uhg5-zpzt-e3gz |
|
| 27 |
| vulnerability |
VCID-ujbp-cc1r-wfe9 |
|
| 28 |
| vulnerability |
VCID-v3h9-1t69-v7a3 |
|
| 29 |
| vulnerability |
VCID-v6rk-y6ws-dkh9 |
|
| 30 |
| vulnerability |
VCID-w8qm-73f3-rkbm |
|
| 31 |
| vulnerability |
VCID-x5e2-7whc-v3fc |
|
| 32 |
| vulnerability |
VCID-x94k-nxyd-27gs |
|
| 33 |
| vulnerability |
VCID-xg2f-12w4-yqge |
|
| 34 |
| vulnerability |
VCID-xw8r-fn6y-mbhp |
|
| 35 |
| vulnerability |
VCID-yeea-n94x-qqch |
|
| 36 |
| vulnerability |
VCID-yur3-am6j-w7ay |
|
| 37 |
| vulnerability |
VCID-zzzs-scbg-bbe9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@2.7.7%252Bdfsg-1%252Bdeb10u1 |
|
| 1 |
|
|
| aliases |
CVE-2019-10156, GHSA-grgm-pph5-j5h7, PYSEC-2019-2
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-x5e2-7whc-v3fc |
|
| 44 |
| url |
VCID-x94k-nxyd-27gs |
| vulnerability_id |
VCID-x94k-nxyd-27gs |
| summary |
A flaw was found in the use of insufficiently random values in Ansible. Two random password lookups of the same length generate the equal value as the template caching action for the same file since no re-evaluation happens. The highest threat from this vulnerability would be that all passwords are exposed at once for the file. This flaw affects Ansible Engine versions before 2.9.6. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10729 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00079 |
| scoring_system |
epss |
| scoring_elements |
0.23336 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00079 |
| scoring_system |
epss |
| scoring_elements |
0.2329 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00079 |
| scoring_system |
epss |
| scoring_elements |
0.2339 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00079 |
| scoring_system |
epss |
| scoring_elements |
0.23427 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00079 |
| scoring_system |
epss |
| scoring_elements |
0.23408 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00079 |
| scoring_system |
epss |
| scoring_elements |
0.23358 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00079 |
| scoring_system |
epss |
| scoring_elements |
0.23285 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00079 |
| scoring_system |
epss |
| scoring_elements |
0.23464 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00079 |
| scoring_system |
epss |
| scoring_elements |
0.23501 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10729 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
| reference_url |
https://github.com/advisories/GHSA-r6h7-5pq2-j77h |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.0 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
MODERATE |
| scoring_system |
cvssv3.1_qr |
| scoring_elements |
|
|
| 2 |
| value |
5.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/advisories/GHSA-r6h7-5pq2-j77h |
|
| 23 |
| reference_url |
https://github.com/ansible/ansible |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.0 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
5.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/ansible/ansible |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/ansible@2.7.7%2Bdfsg-1%2Bdeb10u1 |
| purl |
pkg:deb/debian/ansible@2.7.7%2Bdfsg-1%2Bdeb10u1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1wv8-rvwu-nye3 |
|
| 1 |
| vulnerability |
VCID-3jej-4jyp-cqbt |
|
| 2 |
| vulnerability |
VCID-4pht-n5pc-f3gw |
|
| 3 |
| vulnerability |
VCID-682j-e2pu-1uee |
|
| 4 |
| vulnerability |
VCID-a49n-tvnt-p3df |
|
| 5 |
| vulnerability |
VCID-ae1r-yq1g-rkem |
|
| 6 |
| vulnerability |
VCID-atun-stks-4kcb |
|
| 7 |
| vulnerability |
VCID-axc3-wcsk-q3eg |
|
| 8 |
| vulnerability |
VCID-b8zs-br97-57av |
|
| 9 |
| vulnerability |
VCID-d4ka-dk4p-kfhb |
|
| 10 |
| vulnerability |
VCID-dzdx-wae5-8ydy |
|
| 11 |
| vulnerability |
VCID-e3z2-ydhb-gqfg |
|
| 12 |
| vulnerability |
VCID-ezaq-tqd3-4yd1 |
|
| 13 |
| vulnerability |
VCID-ezux-6buh-h7h7 |
|
| 14 |
| vulnerability |
VCID-fj2p-7wkh-1fhq |
|
| 15 |
| vulnerability |
VCID-g2pj-dmae-e3er |
|
| 16 |
| vulnerability |
VCID-geaa-6dxx-tbcw |
|
| 17 |
| vulnerability |
VCID-h1n3-cmte-eugf |
|
| 18 |
| vulnerability |
VCID-hqar-fca3-cbht |
|
| 19 |
| vulnerability |
VCID-jnmu-c8dt-5yb6 |
|
| 20 |
| vulnerability |
VCID-jrxz-b168-7ug4 |
|
| 21 |
| vulnerability |
VCID-kb5h-116p-33b4 |
|
| 22 |
| vulnerability |
VCID-nukv-kkws-xkb1 |
|
| 23 |
| vulnerability |
VCID-rdwq-93d6-c7b4 |
|
| 24 |
| vulnerability |
VCID-rsry-fw45-9yev |
|
| 25 |
| vulnerability |
VCID-swpr-3qae-d7fe |
|
| 26 |
| vulnerability |
VCID-uhg5-zpzt-e3gz |
|
| 27 |
| vulnerability |
VCID-ujbp-cc1r-wfe9 |
|
| 28 |
| vulnerability |
VCID-v3h9-1t69-v7a3 |
|
| 29 |
| vulnerability |
VCID-v6rk-y6ws-dkh9 |
|
| 30 |
| vulnerability |
VCID-w8qm-73f3-rkbm |
|
| 31 |
| vulnerability |
VCID-x5e2-7whc-v3fc |
|
| 32 |
| vulnerability |
VCID-x94k-nxyd-27gs |
|
| 33 |
| vulnerability |
VCID-xg2f-12w4-yqge |
|
| 34 |
| vulnerability |
VCID-xw8r-fn6y-mbhp |
|
| 35 |
| vulnerability |
VCID-yeea-n94x-qqch |
|
| 36 |
| vulnerability |
VCID-yur3-am6j-w7ay |
|
| 37 |
| vulnerability |
VCID-zzzs-scbg-bbe9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@2.7.7%252Bdfsg-1%252Bdeb10u1 |
|
| 1 |
|
|
| aliases |
CVE-2020-10729, GHSA-r6h7-5pq2-j77h, PYSEC-2021-105
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-x94k-nxyd-27gs |
|
| 45 |
| url |
VCID-xg2f-12w4-yqge |
| vulnerability_id |
VCID-xg2f-12w4-yqge |
| summary |
A flaw was found in Ansible Engine, all versions 2.7.x, 2.8.x and 2.9.x prior to 2.7.17, 2.8.9 and 2.9.6 respectively, when using ansible_facts as a subkey of itself and promoting it to a variable when inject is enabled, overwriting the ansible_facts after the clean. An attacker could take advantage of this by altering the ansible_facts, such as ansible_hosts, users and any other key data which would lead into privilege escalation or code injection. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10684 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06525 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06432 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06398 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06535 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06542 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06547 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06506 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06456 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06467 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10684 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
| reference_url |
https://github.com/advisories/GHSA-p62g-jhg6-v3rq |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
|
| 1 |
| value |
MODERATE |
| scoring_system |
cvssv3.1_qr |
| scoring_elements |
|
|
| 2 |
| value |
6.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/advisories/GHSA-p62g-jhg6-v3rq |
|
| 23 |
| reference_url |
https://github.com/ansible/ansible |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
|
| 1 |
| value |
6.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/ansible/ansible |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2020-10684 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
3.6 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:L/AC:L/Au:N/C:N/I:P/A:P |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
|
| 2 |
| value |
7.9 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:H |
|
| 3 |
| value |
6.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 4 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2020-10684 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/ansible@2.7.7%2Bdfsg-1%2Bdeb10u1 |
| purl |
pkg:deb/debian/ansible@2.7.7%2Bdfsg-1%2Bdeb10u1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1wv8-rvwu-nye3 |
|
| 1 |
| vulnerability |
VCID-3jej-4jyp-cqbt |
|
| 2 |
| vulnerability |
VCID-4pht-n5pc-f3gw |
|
| 3 |
| vulnerability |
VCID-682j-e2pu-1uee |
|
| 4 |
| vulnerability |
VCID-a49n-tvnt-p3df |
|
| 5 |
| vulnerability |
VCID-ae1r-yq1g-rkem |
|
| 6 |
| vulnerability |
VCID-atun-stks-4kcb |
|
| 7 |
| vulnerability |
VCID-axc3-wcsk-q3eg |
|
| 8 |
| vulnerability |
VCID-b8zs-br97-57av |
|
| 9 |
| vulnerability |
VCID-d4ka-dk4p-kfhb |
|
| 10 |
| vulnerability |
VCID-dzdx-wae5-8ydy |
|
| 11 |
| vulnerability |
VCID-e3z2-ydhb-gqfg |
|
| 12 |
| vulnerability |
VCID-ezaq-tqd3-4yd1 |
|
| 13 |
| vulnerability |
VCID-ezux-6buh-h7h7 |
|
| 14 |
| vulnerability |
VCID-fj2p-7wkh-1fhq |
|
| 15 |
| vulnerability |
VCID-g2pj-dmae-e3er |
|
| 16 |
| vulnerability |
VCID-geaa-6dxx-tbcw |
|
| 17 |
| vulnerability |
VCID-h1n3-cmte-eugf |
|
| 18 |
| vulnerability |
VCID-hqar-fca3-cbht |
|
| 19 |
| vulnerability |
VCID-jnmu-c8dt-5yb6 |
|
| 20 |
| vulnerability |
VCID-jrxz-b168-7ug4 |
|
| 21 |
| vulnerability |
VCID-kb5h-116p-33b4 |
|
| 22 |
| vulnerability |
VCID-nukv-kkws-xkb1 |
|
| 23 |
| vulnerability |
VCID-rdwq-93d6-c7b4 |
|
| 24 |
| vulnerability |
VCID-rsry-fw45-9yev |
|
| 25 |
| vulnerability |
VCID-swpr-3qae-d7fe |
|
| 26 |
| vulnerability |
VCID-uhg5-zpzt-e3gz |
|
| 27 |
| vulnerability |
VCID-ujbp-cc1r-wfe9 |
|
| 28 |
| vulnerability |
VCID-v3h9-1t69-v7a3 |
|
| 29 |
| vulnerability |
VCID-v6rk-y6ws-dkh9 |
|
| 30 |
| vulnerability |
VCID-w8qm-73f3-rkbm |
|
| 31 |
| vulnerability |
VCID-x5e2-7whc-v3fc |
|
| 32 |
| vulnerability |
VCID-x94k-nxyd-27gs |
|
| 33 |
| vulnerability |
VCID-xg2f-12w4-yqge |
|
| 34 |
| vulnerability |
VCID-xw8r-fn6y-mbhp |
|
| 35 |
| vulnerability |
VCID-yeea-n94x-qqch |
|
| 36 |
| vulnerability |
VCID-yur3-am6j-w7ay |
|
| 37 |
| vulnerability |
VCID-zzzs-scbg-bbe9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@2.7.7%252Bdfsg-1%252Bdeb10u1 |
|
| 1 |
|
|
| aliases |
CVE-2020-10684, GHSA-p62g-jhg6-v3rq, PYSEC-2020-207
|
| risk_score |
3.5 |
| exploitability |
0.5 |
| weighted_severity |
7.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xg2f-12w4-yqge |
|
| 46 |
| url |
VCID-xw8r-fn6y-mbhp |
| vulnerability_id |
VCID-xw8r-fn6y-mbhp |
| summary |
A flaw was found in ansible. Credentials, such as secrets, are being disclosed in console log by default and not protected by no_log feature when using those modules. An attacker can take advantage of this information to steal those credentials. The highest threat from this vulnerability is to data confidentiality. Versions before ansible 2.9.18 are affected. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-20191 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.11217 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.11266 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.1121 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.11131 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.11315 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.11255 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.11108 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.11243 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.11277 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-20191 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-20191, GHSA-8f4m-hccc-8qph, PYSEC-2021-124
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xw8r-fn6y-mbhp |
|
| 47 |
| url |
VCID-y91x-2rch-pkar |
| vulnerability_id |
VCID-y91x-2rch-pkar |
| summary |
A flaw was found in ansible. ansible.cfg is read from the current working directory which can be altered to make it point to a plugin or a module path under the control of an attacker, thus allowing the attacker to execute arbitrary code. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-10875 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13325 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13206 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13233 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13255 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13293 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13334 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13397 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13194 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13274 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-10875 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
| reference_url |
https://github.com/ansible/ansible |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
8.5 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/ansible/ansible |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
| reference_url |
https://usn.ubuntu.com/4072-1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
8.5 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://usn.ubuntu.com/4072-1 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2018-10875 |
| reference_id |
CVE-2018-10875 |
| reference_type |
|
| scores |
| 0 |
| value |
4.6 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:L/AC:L/Au:N/C:P/I:P/A:P |
|
| 1 |
| value |
7.8 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 2 |
| value |
7.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 3 |
| value |
8.5 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 4 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2018-10875 |
|
| 54 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/ansible@2.2.1.0-2%2Bdeb9u1 |
| purl |
pkg:deb/debian/ansible@2.2.1.0-2%2Bdeb9u1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1wv8-rvwu-nye3 |
|
| 1 |
| vulnerability |
VCID-3jej-4jyp-cqbt |
|
| 2 |
| vulnerability |
VCID-4pht-n5pc-f3gw |
|
| 3 |
| vulnerability |
VCID-5hwt-gkgx-jqb4 |
|
| 4 |
| vulnerability |
VCID-682j-e2pu-1uee |
|
| 5 |
| vulnerability |
VCID-a49n-tvnt-p3df |
|
| 6 |
| vulnerability |
VCID-ae1r-yq1g-rkem |
|
| 7 |
| vulnerability |
VCID-atun-stks-4kcb |
|
| 8 |
| vulnerability |
VCID-axc3-wcsk-q3eg |
|
| 9 |
| vulnerability |
VCID-b8zs-br97-57av |
|
| 10 |
| vulnerability |
VCID-c1d7-4rje-ayf9 |
|
| 11 |
| vulnerability |
VCID-d4ka-dk4p-kfhb |
|
| 12 |
| vulnerability |
VCID-drt9-vx5r-akgm |
|
| 13 |
| vulnerability |
VCID-dzdx-wae5-8ydy |
|
| 14 |
| vulnerability |
VCID-e3z2-ydhb-gqfg |
|
| 15 |
| vulnerability |
VCID-ezaq-tqd3-4yd1 |
|
| 16 |
| vulnerability |
VCID-ezux-6buh-h7h7 |
|
| 17 |
| vulnerability |
VCID-fj2p-7wkh-1fhq |
|
| 18 |
| vulnerability |
VCID-g2pj-dmae-e3er |
|
| 19 |
| vulnerability |
VCID-geaa-6dxx-tbcw |
|
| 20 |
| vulnerability |
VCID-h1n3-cmte-eugf |
|
| 21 |
| vulnerability |
VCID-hqar-fca3-cbht |
|
| 22 |
| vulnerability |
VCID-jnmu-c8dt-5yb6 |
|
| 23 |
| vulnerability |
VCID-jrxz-b168-7ug4 |
|
| 24 |
| vulnerability |
VCID-kb5h-116p-33b4 |
|
| 25 |
| vulnerability |
VCID-nukv-kkws-xkb1 |
|
| 26 |
| vulnerability |
VCID-puq1-z5h7-pkdg |
|
| 27 |
| vulnerability |
VCID-rdwq-93d6-c7b4 |
|
| 28 |
| vulnerability |
VCID-rknj-nkgs-wyg2 |
|
| 29 |
| vulnerability |
VCID-rsry-fw45-9yev |
|
| 30 |
| vulnerability |
VCID-swpr-3qae-d7fe |
|
| 31 |
| vulnerability |
VCID-uhg5-zpzt-e3gz |
|
| 32 |
| vulnerability |
VCID-ujbp-cc1r-wfe9 |
|
| 33 |
| vulnerability |
VCID-v3h9-1t69-v7a3 |
|
| 34 |
| vulnerability |
VCID-v6rk-y6ws-dkh9 |
|
| 35 |
| vulnerability |
VCID-w8qm-73f3-rkbm |
|
| 36 |
| vulnerability |
VCID-wqm7-2ajr-6ue8 |
|
| 37 |
| vulnerability |
VCID-x5e2-7whc-v3fc |
|
| 38 |
| vulnerability |
VCID-x94k-nxyd-27gs |
|
| 39 |
| vulnerability |
VCID-xg2f-12w4-yqge |
|
| 40 |
| vulnerability |
VCID-xw8r-fn6y-mbhp |
|
| 41 |
| vulnerability |
VCID-y91x-2rch-pkar |
|
| 42 |
| vulnerability |
VCID-yeea-n94x-qqch |
|
| 43 |
| vulnerability |
VCID-yur3-am6j-w7ay |
|
| 44 |
| vulnerability |
VCID-zmr4-652z-r3dm |
|
| 45 |
| vulnerability |
VCID-zzzs-scbg-bbe9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@2.2.1.0-2%252Bdeb9u1 |
|
| 1 |
| url |
pkg:deb/debian/ansible@2.7.7%2Bdfsg-1%2Bdeb10u1 |
| purl |
pkg:deb/debian/ansible@2.7.7%2Bdfsg-1%2Bdeb10u1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1wv8-rvwu-nye3 |
|
| 1 |
| vulnerability |
VCID-3jej-4jyp-cqbt |
|
| 2 |
| vulnerability |
VCID-4pht-n5pc-f3gw |
|
| 3 |
| vulnerability |
VCID-682j-e2pu-1uee |
|
| 4 |
| vulnerability |
VCID-a49n-tvnt-p3df |
|
| 5 |
| vulnerability |
VCID-ae1r-yq1g-rkem |
|
| 6 |
| vulnerability |
VCID-atun-stks-4kcb |
|
| 7 |
| vulnerability |
VCID-axc3-wcsk-q3eg |
|
| 8 |
| vulnerability |
VCID-b8zs-br97-57av |
|
| 9 |
| vulnerability |
VCID-d4ka-dk4p-kfhb |
|
| 10 |
| vulnerability |
VCID-dzdx-wae5-8ydy |
|
| 11 |
| vulnerability |
VCID-e3z2-ydhb-gqfg |
|
| 12 |
| vulnerability |
VCID-ezaq-tqd3-4yd1 |
|
| 13 |
| vulnerability |
VCID-ezux-6buh-h7h7 |
|
| 14 |
| vulnerability |
VCID-fj2p-7wkh-1fhq |
|
| 15 |
| vulnerability |
VCID-g2pj-dmae-e3er |
|
| 16 |
| vulnerability |
VCID-geaa-6dxx-tbcw |
|
| 17 |
| vulnerability |
VCID-h1n3-cmte-eugf |
|
| 18 |
| vulnerability |
VCID-hqar-fca3-cbht |
|
| 19 |
| vulnerability |
VCID-jnmu-c8dt-5yb6 |
|
| 20 |
| vulnerability |
VCID-jrxz-b168-7ug4 |
|
| 21 |
| vulnerability |
VCID-kb5h-116p-33b4 |
|
| 22 |
| vulnerability |
VCID-nukv-kkws-xkb1 |
|
| 23 |
| vulnerability |
VCID-rdwq-93d6-c7b4 |
|
| 24 |
| vulnerability |
VCID-rsry-fw45-9yev |
|
| 25 |
| vulnerability |
VCID-swpr-3qae-d7fe |
|
| 26 |
| vulnerability |
VCID-uhg5-zpzt-e3gz |
|
| 27 |
| vulnerability |
VCID-ujbp-cc1r-wfe9 |
|
| 28 |
| vulnerability |
VCID-v3h9-1t69-v7a3 |
|
| 29 |
| vulnerability |
VCID-v6rk-y6ws-dkh9 |
|
| 30 |
| vulnerability |
VCID-w8qm-73f3-rkbm |
|
| 31 |
| vulnerability |
VCID-x5e2-7whc-v3fc |
|
| 32 |
| vulnerability |
VCID-x94k-nxyd-27gs |
|
| 33 |
| vulnerability |
VCID-xg2f-12w4-yqge |
|
| 34 |
| vulnerability |
VCID-xw8r-fn6y-mbhp |
|
| 35 |
| vulnerability |
VCID-yeea-n94x-qqch |
|
| 36 |
| vulnerability |
VCID-yur3-am6j-w7ay |
|
| 37 |
| vulnerability |
VCID-zzzs-scbg-bbe9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@2.7.7%252Bdfsg-1%252Bdeb10u1 |
|
|
| aliases |
CVE-2018-10875, GHSA-fc4h-467w-46rh, PYSEC-2018-43
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-y91x-2rch-pkar |
|
| 48 |
| url |
VCID-yc8n-wxb4-1uaz |
| vulnerability_id |
VCID-yc8n-wxb4-1uaz |
| summary |
Ansible before versions 2.1.4, 2.2.1 is vulnerable to an improper input validation in Ansible's handling of data sent from client systems. An attacker with control over a client system being managed by Ansible and the ability to send facts back to the Ansible server could use this flaw to execute arbitrary code on the Ansible server using the Ansible server privileges. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-9587 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.04078 |
| scoring_system |
epss |
| scoring_elements |
0.88554 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.04078 |
| scoring_system |
epss |
| scoring_elements |
0.8855 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.04078 |
| scoring_system |
epss |
| scoring_elements |
0.88545 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.04078 |
| scoring_system |
epss |
| scoring_elements |
0.88527 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.04078 |
| scoring_system |
epss |
| scoring_elements |
0.88523 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.04078 |
| scoring_system |
epss |
| scoring_elements |
0.88506 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.04078 |
| scoring_system |
epss |
| scoring_elements |
0.88499 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.04078 |
| scoring_system |
epss |
| scoring_elements |
0.88561 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-9587 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
| reference_url |
https://github.com/advisories/GHSA-m956-frf4-m2wr |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
CRITICAL |
| scoring_system |
cvssv3.1_qr |
| scoring_elements |
|
|
| 2 |
| value |
9.2 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 3 |
| value |
CRITICAL |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/advisories/GHSA-m956-frf4-m2wr |
|
| 11 |
| reference_url |
https://github.com/ansible/ansible |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
9.2 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
CRITICAL |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/ansible/ansible |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
| reference_url |
https://www.exploit-db.com/exploits/41013 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
9.2 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
CRITICAL |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://www.exploit-db.com/exploits/41013 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2016-9587 |
| reference_id |
CVE-2016-9587 |
| reference_type |
|
| scores |
| 0 |
| value |
9.3 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:N/C:C/I:C/A:C |
|
| 1 |
| value |
6.6 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H |
|
| 2 |
| value |
8.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 3 |
| value |
9.2 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 4 |
| value |
CRITICAL |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2016-9587 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/ansible@2.2.1.0-2~bpo8%2B1 |
| purl |
pkg:deb/debian/ansible@2.2.1.0-2~bpo8%2B1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1wv8-rvwu-nye3 |
|
| 1 |
| vulnerability |
VCID-3jej-4jyp-cqbt |
|
| 2 |
| vulnerability |
VCID-4pht-n5pc-f3gw |
|
| 3 |
| vulnerability |
VCID-5hwt-gkgx-jqb4 |
|
| 4 |
| vulnerability |
VCID-682j-e2pu-1uee |
|
| 5 |
| vulnerability |
VCID-a49n-tvnt-p3df |
|
| 6 |
| vulnerability |
VCID-ae1r-yq1g-rkem |
|
| 7 |
| vulnerability |
VCID-atun-stks-4kcb |
|
| 8 |
| vulnerability |
VCID-axc3-wcsk-q3eg |
|
| 9 |
| vulnerability |
VCID-b8zs-br97-57av |
|
| 10 |
| vulnerability |
VCID-c1d7-4rje-ayf9 |
|
| 11 |
| vulnerability |
VCID-d4ka-dk4p-kfhb |
|
| 12 |
| vulnerability |
VCID-drt9-vx5r-akgm |
|
| 13 |
| vulnerability |
VCID-dzdx-wae5-8ydy |
|
| 14 |
| vulnerability |
VCID-e3z2-ydhb-gqfg |
|
| 15 |
| vulnerability |
VCID-ezaq-tqd3-4yd1 |
|
| 16 |
| vulnerability |
VCID-ezux-6buh-h7h7 |
|
| 17 |
| vulnerability |
VCID-fj2p-7wkh-1fhq |
|
| 18 |
| vulnerability |
VCID-g2pj-dmae-e3er |
|
| 19 |
| vulnerability |
VCID-geaa-6dxx-tbcw |
|
| 20 |
| vulnerability |
VCID-h1n3-cmte-eugf |
|
| 21 |
| vulnerability |
VCID-hqar-fca3-cbht |
|
| 22 |
| vulnerability |
VCID-jhxm-379u-subt |
|
| 23 |
| vulnerability |
VCID-jnmu-c8dt-5yb6 |
|
| 24 |
| vulnerability |
VCID-jrxz-b168-7ug4 |
|
| 25 |
| vulnerability |
VCID-kb5h-116p-33b4 |
|
| 26 |
| vulnerability |
VCID-nukv-kkws-xkb1 |
|
| 27 |
| vulnerability |
VCID-puq1-z5h7-pkdg |
|
| 28 |
| vulnerability |
VCID-rdwq-93d6-c7b4 |
|
| 29 |
| vulnerability |
VCID-rknj-nkgs-wyg2 |
|
| 30 |
| vulnerability |
VCID-rsry-fw45-9yev |
|
| 31 |
| vulnerability |
VCID-swpr-3qae-d7fe |
|
| 32 |
| vulnerability |
VCID-uhg5-zpzt-e3gz |
|
| 33 |
| vulnerability |
VCID-ujbp-cc1r-wfe9 |
|
| 34 |
| vulnerability |
VCID-v3h9-1t69-v7a3 |
|
| 35 |
| vulnerability |
VCID-v6rk-y6ws-dkh9 |
|
| 36 |
| vulnerability |
VCID-w8qm-73f3-rkbm |
|
| 37 |
| vulnerability |
VCID-wqm7-2ajr-6ue8 |
|
| 38 |
| vulnerability |
VCID-x5e2-7whc-v3fc |
|
| 39 |
| vulnerability |
VCID-x94k-nxyd-27gs |
|
| 40 |
| vulnerability |
VCID-xg2f-12w4-yqge |
|
| 41 |
| vulnerability |
VCID-xw8r-fn6y-mbhp |
|
| 42 |
| vulnerability |
VCID-y91x-2rch-pkar |
|
| 43 |
| vulnerability |
VCID-yeea-n94x-qqch |
|
| 44 |
| vulnerability |
VCID-yur3-am6j-w7ay |
|
| 45 |
| vulnerability |
VCID-zmr4-652z-r3dm |
|
| 46 |
| vulnerability |
VCID-zzzs-scbg-bbe9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@2.2.1.0-2~bpo8%252B1 |
|
|
| aliases |
CVE-2016-9587, GHSA-m956-frf4-m2wr, PYSEC-2018-39
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yc8n-wxb4-1uaz |
|
| 49 |
| url |
VCID-yeea-n94x-qqch |
| vulnerability_id |
VCID-yeea-n94x-qqch |
| summary |
A flaw was found in the Ansible Engine when using module_args. Tasks executed with check mode (--check-mode) do not properly neutralize sensitive data exposed in the event data. This flaw allows unauthorized users to read this data. The highest threat from this vulnerability is to confidentiality. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-14332 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35362 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35384 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.3542 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35419 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35394 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35348 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35465 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.3544 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35239 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-14332 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
| reference_url |
https://github.com/advisories/GHSA-j667-c2hm-f2wp |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
MODERATE |
| scoring_system |
cvssv3.1_qr |
| scoring_elements |
|
|
| 2 |
| value |
6.8 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/advisories/GHSA-j667-c2hm-f2wp |
|
| 23 |
| reference_url |
https://github.com/ansible/ansible |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
6.8 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/ansible/ansible |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/ansible@2.7.7%2Bdfsg-1%2Bdeb10u1 |
| purl |
pkg:deb/debian/ansible@2.7.7%2Bdfsg-1%2Bdeb10u1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1wv8-rvwu-nye3 |
|
| 1 |
| vulnerability |
VCID-3jej-4jyp-cqbt |
|
| 2 |
| vulnerability |
VCID-4pht-n5pc-f3gw |
|
| 3 |
| vulnerability |
VCID-682j-e2pu-1uee |
|
| 4 |
| vulnerability |
VCID-a49n-tvnt-p3df |
|
| 5 |
| vulnerability |
VCID-ae1r-yq1g-rkem |
|
| 6 |
| vulnerability |
VCID-atun-stks-4kcb |
|
| 7 |
| vulnerability |
VCID-axc3-wcsk-q3eg |
|
| 8 |
| vulnerability |
VCID-b8zs-br97-57av |
|
| 9 |
| vulnerability |
VCID-d4ka-dk4p-kfhb |
|
| 10 |
| vulnerability |
VCID-dzdx-wae5-8ydy |
|
| 11 |
| vulnerability |
VCID-e3z2-ydhb-gqfg |
|
| 12 |
| vulnerability |
VCID-ezaq-tqd3-4yd1 |
|
| 13 |
| vulnerability |
VCID-ezux-6buh-h7h7 |
|
| 14 |
| vulnerability |
VCID-fj2p-7wkh-1fhq |
|
| 15 |
| vulnerability |
VCID-g2pj-dmae-e3er |
|
| 16 |
| vulnerability |
VCID-geaa-6dxx-tbcw |
|
| 17 |
| vulnerability |
VCID-h1n3-cmte-eugf |
|
| 18 |
| vulnerability |
VCID-hqar-fca3-cbht |
|
| 19 |
| vulnerability |
VCID-jnmu-c8dt-5yb6 |
|
| 20 |
| vulnerability |
VCID-jrxz-b168-7ug4 |
|
| 21 |
| vulnerability |
VCID-kb5h-116p-33b4 |
|
| 22 |
| vulnerability |
VCID-nukv-kkws-xkb1 |
|
| 23 |
| vulnerability |
VCID-rdwq-93d6-c7b4 |
|
| 24 |
| vulnerability |
VCID-rsry-fw45-9yev |
|
| 25 |
| vulnerability |
VCID-swpr-3qae-d7fe |
|
| 26 |
| vulnerability |
VCID-uhg5-zpzt-e3gz |
|
| 27 |
| vulnerability |
VCID-ujbp-cc1r-wfe9 |
|
| 28 |
| vulnerability |
VCID-v3h9-1t69-v7a3 |
|
| 29 |
| vulnerability |
VCID-v6rk-y6ws-dkh9 |
|
| 30 |
| vulnerability |
VCID-w8qm-73f3-rkbm |
|
| 31 |
| vulnerability |
VCID-x5e2-7whc-v3fc |
|
| 32 |
| vulnerability |
VCID-x94k-nxyd-27gs |
|
| 33 |
| vulnerability |
VCID-xg2f-12w4-yqge |
|
| 34 |
| vulnerability |
VCID-xw8r-fn6y-mbhp |
|
| 35 |
| vulnerability |
VCID-yeea-n94x-qqch |
|
| 36 |
| vulnerability |
VCID-yur3-am6j-w7ay |
|
| 37 |
| vulnerability |
VCID-zzzs-scbg-bbe9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@2.7.7%252Bdfsg-1%252Bdeb10u1 |
|
| 1 |
|
|
| aliases |
CVE-2020-14332, GHSA-j667-c2hm-f2wp, PYSEC-2020-4
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yeea-n94x-qqch |
|
| 50 |
| url |
VCID-ynmp-3yfy-sfc1 |
| vulnerability_id |
VCID-ynmp-3yfy-sfc1 |
| summary |
The chroot, jail, and zone connection plugins in ansible before 1.9.2 allow local users to escape a restricted environment via a symlink attack. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-6240 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.0823 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08218 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08116 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08175 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08235 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08255 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08263 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08244 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.0818 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-6240 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://github.com/ansible/ansible |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
8.5 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/ansible/ansible |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/ansible@2.2.1.0-2~bpo8%2B1 |
| purl |
pkg:deb/debian/ansible@2.2.1.0-2~bpo8%2B1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1wv8-rvwu-nye3 |
|
| 1 |
| vulnerability |
VCID-3jej-4jyp-cqbt |
|
| 2 |
| vulnerability |
VCID-4pht-n5pc-f3gw |
|
| 3 |
| vulnerability |
VCID-5hwt-gkgx-jqb4 |
|
| 4 |
| vulnerability |
VCID-682j-e2pu-1uee |
|
| 5 |
| vulnerability |
VCID-a49n-tvnt-p3df |
|
| 6 |
| vulnerability |
VCID-ae1r-yq1g-rkem |
|
| 7 |
| vulnerability |
VCID-atun-stks-4kcb |
|
| 8 |
| vulnerability |
VCID-axc3-wcsk-q3eg |
|
| 9 |
| vulnerability |
VCID-b8zs-br97-57av |
|
| 10 |
| vulnerability |
VCID-c1d7-4rje-ayf9 |
|
| 11 |
| vulnerability |
VCID-d4ka-dk4p-kfhb |
|
| 12 |
| vulnerability |
VCID-drt9-vx5r-akgm |
|
| 13 |
| vulnerability |
VCID-dzdx-wae5-8ydy |
|
| 14 |
| vulnerability |
VCID-e3z2-ydhb-gqfg |
|
| 15 |
| vulnerability |
VCID-ezaq-tqd3-4yd1 |
|
| 16 |
| vulnerability |
VCID-ezux-6buh-h7h7 |
|
| 17 |
| vulnerability |
VCID-fj2p-7wkh-1fhq |
|
| 18 |
| vulnerability |
VCID-g2pj-dmae-e3er |
|
| 19 |
| vulnerability |
VCID-geaa-6dxx-tbcw |
|
| 20 |
| vulnerability |
VCID-h1n3-cmte-eugf |
|
| 21 |
| vulnerability |
VCID-hqar-fca3-cbht |
|
| 22 |
| vulnerability |
VCID-jhxm-379u-subt |
|
| 23 |
| vulnerability |
VCID-jnmu-c8dt-5yb6 |
|
| 24 |
| vulnerability |
VCID-jrxz-b168-7ug4 |
|
| 25 |
| vulnerability |
VCID-kb5h-116p-33b4 |
|
| 26 |
| vulnerability |
VCID-nukv-kkws-xkb1 |
|
| 27 |
| vulnerability |
VCID-puq1-z5h7-pkdg |
|
| 28 |
| vulnerability |
VCID-rdwq-93d6-c7b4 |
|
| 29 |
| vulnerability |
VCID-rknj-nkgs-wyg2 |
|
| 30 |
| vulnerability |
VCID-rsry-fw45-9yev |
|
| 31 |
| vulnerability |
VCID-swpr-3qae-d7fe |
|
| 32 |
| vulnerability |
VCID-uhg5-zpzt-e3gz |
|
| 33 |
| vulnerability |
VCID-ujbp-cc1r-wfe9 |
|
| 34 |
| vulnerability |
VCID-v3h9-1t69-v7a3 |
|
| 35 |
| vulnerability |
VCID-v6rk-y6ws-dkh9 |
|
| 36 |
| vulnerability |
VCID-w8qm-73f3-rkbm |
|
| 37 |
| vulnerability |
VCID-wqm7-2ajr-6ue8 |
|
| 38 |
| vulnerability |
VCID-x5e2-7whc-v3fc |
|
| 39 |
| vulnerability |
VCID-x94k-nxyd-27gs |
|
| 40 |
| vulnerability |
VCID-xg2f-12w4-yqge |
|
| 41 |
| vulnerability |
VCID-xw8r-fn6y-mbhp |
|
| 42 |
| vulnerability |
VCID-y91x-2rch-pkar |
|
| 43 |
| vulnerability |
VCID-yeea-n94x-qqch |
|
| 44 |
| vulnerability |
VCID-yur3-am6j-w7ay |
|
| 45 |
| vulnerability |
VCID-zmr4-652z-r3dm |
|
| 46 |
| vulnerability |
VCID-zzzs-scbg-bbe9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@2.2.1.0-2~bpo8%252B1 |
|
|
| aliases |
CVE-2015-6240, GHSA-wwwh-47wp-m522, PYSEC-2017-3
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ynmp-3yfy-sfc1 |
|
| 51 |
| url |
VCID-yur3-am6j-w7ay |
| vulnerability_id |
VCID-yur3-am6j-w7ay |
| summary |
A flaw was found in Ansible Engine when using Ansible Vault for editing encrypted files. When a user executes "ansible-vault edit", another user on the same computer can read the old and new secret, as it is created in a temporary file with mkstemp and the returned file descriptor is closed and the method write_data is called to write the existing secret in the file. This method will delete the file before recreating it insecurely. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-1740 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08182 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.082 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08221 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08229 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08212 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08059 |
| published_at |
2026-04-01T12:55:00Z |
|
| 6 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08196 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08149 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08143 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-1740 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
| reference_url |
https://github.com/advisories/GHSA-vcg8-98q8-g7mj |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.7 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
MODERATE |
| scoring_system |
cvssv3.1_qr |
| scoring_elements |
|
|
| 2 |
| value |
5.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/advisories/GHSA-vcg8-98q8-g7mj |
|
| 23 |
| reference_url |
https://github.com/ansible/ansible |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.7 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
5.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/ansible/ansible |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2020-1740 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
1.9 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:L/AC:M/Au:N/C:P/I:N/A:N |
|
| 1 |
| value |
3.9 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N |
|
| 2 |
| value |
4.7 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 3 |
| value |
5.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 4 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2020-1740 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/ansible@2.7.7%2Bdfsg-1%2Bdeb10u1 |
| purl |
pkg:deb/debian/ansible@2.7.7%2Bdfsg-1%2Bdeb10u1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1wv8-rvwu-nye3 |
|
| 1 |
| vulnerability |
VCID-3jej-4jyp-cqbt |
|
| 2 |
| vulnerability |
VCID-4pht-n5pc-f3gw |
|
| 3 |
| vulnerability |
VCID-682j-e2pu-1uee |
|
| 4 |
| vulnerability |
VCID-a49n-tvnt-p3df |
|
| 5 |
| vulnerability |
VCID-ae1r-yq1g-rkem |
|
| 6 |
| vulnerability |
VCID-atun-stks-4kcb |
|
| 7 |
| vulnerability |
VCID-axc3-wcsk-q3eg |
|
| 8 |
| vulnerability |
VCID-b8zs-br97-57av |
|
| 9 |
| vulnerability |
VCID-d4ka-dk4p-kfhb |
|
| 10 |
| vulnerability |
VCID-dzdx-wae5-8ydy |
|
| 11 |
| vulnerability |
VCID-e3z2-ydhb-gqfg |
|
| 12 |
| vulnerability |
VCID-ezaq-tqd3-4yd1 |
|
| 13 |
| vulnerability |
VCID-ezux-6buh-h7h7 |
|
| 14 |
| vulnerability |
VCID-fj2p-7wkh-1fhq |
|
| 15 |
| vulnerability |
VCID-g2pj-dmae-e3er |
|
| 16 |
| vulnerability |
VCID-geaa-6dxx-tbcw |
|
| 17 |
| vulnerability |
VCID-h1n3-cmte-eugf |
|
| 18 |
| vulnerability |
VCID-hqar-fca3-cbht |
|
| 19 |
| vulnerability |
VCID-jnmu-c8dt-5yb6 |
|
| 20 |
| vulnerability |
VCID-jrxz-b168-7ug4 |
|
| 21 |
| vulnerability |
VCID-kb5h-116p-33b4 |
|
| 22 |
| vulnerability |
VCID-nukv-kkws-xkb1 |
|
| 23 |
| vulnerability |
VCID-rdwq-93d6-c7b4 |
|
| 24 |
| vulnerability |
VCID-rsry-fw45-9yev |
|
| 25 |
| vulnerability |
VCID-swpr-3qae-d7fe |
|
| 26 |
| vulnerability |
VCID-uhg5-zpzt-e3gz |
|
| 27 |
| vulnerability |
VCID-ujbp-cc1r-wfe9 |
|
| 28 |
| vulnerability |
VCID-v3h9-1t69-v7a3 |
|
| 29 |
| vulnerability |
VCID-v6rk-y6ws-dkh9 |
|
| 30 |
| vulnerability |
VCID-w8qm-73f3-rkbm |
|
| 31 |
| vulnerability |
VCID-x5e2-7whc-v3fc |
|
| 32 |
| vulnerability |
VCID-x94k-nxyd-27gs |
|
| 33 |
| vulnerability |
VCID-xg2f-12w4-yqge |
|
| 34 |
| vulnerability |
VCID-xw8r-fn6y-mbhp |
|
| 35 |
| vulnerability |
VCID-yeea-n94x-qqch |
|
| 36 |
| vulnerability |
VCID-yur3-am6j-w7ay |
|
| 37 |
| vulnerability |
VCID-zzzs-scbg-bbe9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@2.7.7%252Bdfsg-1%252Bdeb10u1 |
|
| 1 |
|
|
| aliases |
CVE-2020-1740, GHSA-vcg8-98q8-g7mj, PYSEC-2020-12
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yur3-am6j-w7ay |
|
| 52 |
| url |
VCID-zmr4-652z-r3dm |
| vulnerability_id |
VCID-zmr4-652z-r3dm |
| summary |
Ansible before versions 2.3.1.0 and 2.4.0.0 fails to properly mark lookup-plugin results as unsafe. If an attacker could control the results of lookup() calls, they could inject Unicode strings to be parsed by the jinja2 templating system, resulting in code execution. By default, the jinja2 templating language is now marked as 'unsafe' and is not evaluated. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7481 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01923 |
| scoring_system |
epss |
| scoring_elements |
0.83292 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01923 |
| scoring_system |
epss |
| scoring_elements |
0.83348 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.01923 |
| scoring_system |
epss |
| scoring_elements |
0.83357 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.01923 |
| scoring_system |
epss |
| scoring_elements |
0.83372 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.01923 |
| scoring_system |
epss |
| scoring_elements |
0.83366 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.01923 |
| scoring_system |
epss |
| scoring_elements |
0.83324 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.01923 |
| scoring_system |
epss |
| scoring_elements |
0.83308 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.03507 |
| scoring_system |
epss |
| scoring_elements |
0.87622 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7481 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
| reference_url |
https://github.com/ansible/ansible |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
9.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
CRITICAL |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/ansible/ansible |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
| reference_url |
https://usn.ubuntu.com/4072-1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
9.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
CRITICAL |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://usn.ubuntu.com/4072-1 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2017-7481 |
| reference_id |
CVE-2017-7481 |
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:L/Au:N/C:P/I:P/A:P |
|
| 1 |
| value |
5.3 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N |
|
| 2 |
| value |
9.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 3 |
| value |
9.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 4 |
| value |
CRITICAL |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2017-7481 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/ansible@2.7.7%2Bdfsg-1%2Bdeb10u1 |
| purl |
pkg:deb/debian/ansible@2.7.7%2Bdfsg-1%2Bdeb10u1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1wv8-rvwu-nye3 |
|
| 1 |
| vulnerability |
VCID-3jej-4jyp-cqbt |
|
| 2 |
| vulnerability |
VCID-4pht-n5pc-f3gw |
|
| 3 |
| vulnerability |
VCID-682j-e2pu-1uee |
|
| 4 |
| vulnerability |
VCID-a49n-tvnt-p3df |
|
| 5 |
| vulnerability |
VCID-ae1r-yq1g-rkem |
|
| 6 |
| vulnerability |
VCID-atun-stks-4kcb |
|
| 7 |
| vulnerability |
VCID-axc3-wcsk-q3eg |
|
| 8 |
| vulnerability |
VCID-b8zs-br97-57av |
|
| 9 |
| vulnerability |
VCID-d4ka-dk4p-kfhb |
|
| 10 |
| vulnerability |
VCID-dzdx-wae5-8ydy |
|
| 11 |
| vulnerability |
VCID-e3z2-ydhb-gqfg |
|
| 12 |
| vulnerability |
VCID-ezaq-tqd3-4yd1 |
|
| 13 |
| vulnerability |
VCID-ezux-6buh-h7h7 |
|
| 14 |
| vulnerability |
VCID-fj2p-7wkh-1fhq |
|
| 15 |
| vulnerability |
VCID-g2pj-dmae-e3er |
|
| 16 |
| vulnerability |
VCID-geaa-6dxx-tbcw |
|
| 17 |
| vulnerability |
VCID-h1n3-cmte-eugf |
|
| 18 |
| vulnerability |
VCID-hqar-fca3-cbht |
|
| 19 |
| vulnerability |
VCID-jnmu-c8dt-5yb6 |
|
| 20 |
| vulnerability |
VCID-jrxz-b168-7ug4 |
|
| 21 |
| vulnerability |
VCID-kb5h-116p-33b4 |
|
| 22 |
| vulnerability |
VCID-nukv-kkws-xkb1 |
|
| 23 |
| vulnerability |
VCID-rdwq-93d6-c7b4 |
|
| 24 |
| vulnerability |
VCID-rsry-fw45-9yev |
|
| 25 |
| vulnerability |
VCID-swpr-3qae-d7fe |
|
| 26 |
| vulnerability |
VCID-uhg5-zpzt-e3gz |
|
| 27 |
| vulnerability |
VCID-ujbp-cc1r-wfe9 |
|
| 28 |
| vulnerability |
VCID-v3h9-1t69-v7a3 |
|
| 29 |
| vulnerability |
VCID-v6rk-y6ws-dkh9 |
|
| 30 |
| vulnerability |
VCID-w8qm-73f3-rkbm |
|
| 31 |
| vulnerability |
VCID-x5e2-7whc-v3fc |
|
| 32 |
| vulnerability |
VCID-x94k-nxyd-27gs |
|
| 33 |
| vulnerability |
VCID-xg2f-12w4-yqge |
|
| 34 |
| vulnerability |
VCID-xw8r-fn6y-mbhp |
|
| 35 |
| vulnerability |
VCID-yeea-n94x-qqch |
|
| 36 |
| vulnerability |
VCID-yur3-am6j-w7ay |
|
| 37 |
| vulnerability |
VCID-zzzs-scbg-bbe9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@2.7.7%252Bdfsg-1%252Bdeb10u1 |
|
|
| aliases |
CVE-2017-7481, GHSA-w578-j992-554x, PYSEC-2018-41
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zmr4-652z-r3dm |
|
| 53 |
| url |
VCID-zzzs-scbg-bbe9 |
| vulnerability_id |
VCID-zzzs-scbg-bbe9 |
| summary |
A flaw was found in the Ansible Engine when the fetch module is used. An attacker could intercept the module, inject a new path, and then choose a new destination path on the controller node. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-1735 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00155 |
| scoring_system |
epss |
| scoring_elements |
0.36287 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00155 |
| scoring_system |
epss |
| scoring_elements |
0.36308 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00155 |
| scoring_system |
epss |
| scoring_elements |
0.36344 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00155 |
| scoring_system |
epss |
| scoring_elements |
0.36338 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00155 |
| scoring_system |
epss |
| scoring_elements |
0.36206 |
| published_at |
2026-04-01T12:55:00Z |
|
| 5 |
| value |
0.00155 |
| scoring_system |
epss |
| scoring_elements |
0.36268 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00155 |
| scoring_system |
epss |
| scoring_elements |
0.36433 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00155 |
| scoring_system |
epss |
| scoring_elements |
0.364 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00155 |
| scoring_system |
epss |
| scoring_elements |
0.36316 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-1735 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
| reference_url |
https://github.com/advisories/GHSA-gfr2-qpxh-qj9m |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.6 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N |
|
| 1 |
| value |
MODERATE |
| scoring_system |
cvssv3.1_qr |
| scoring_elements |
|
|
| 2 |
| value |
4.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/advisories/GHSA-gfr2-qpxh-qj9m |
|
| 23 |
| reference_url |
https://github.com/ansible/ansible |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.6 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N |
|
| 1 |
| value |
4.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/ansible/ansible |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2020-1735 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
3.6 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:L/AC:L/Au:N/C:P/I:P/A:N |
|
| 1 |
| value |
4.2 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N |
|
| 2 |
| value |
4.6 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N |
|
| 3 |
| value |
4.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N |
|
| 4 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2020-1735 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/ansible@2.7.7%2Bdfsg-1%2Bdeb10u1 |
| purl |
pkg:deb/debian/ansible@2.7.7%2Bdfsg-1%2Bdeb10u1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1wv8-rvwu-nye3 |
|
| 1 |
| vulnerability |
VCID-3jej-4jyp-cqbt |
|
| 2 |
| vulnerability |
VCID-4pht-n5pc-f3gw |
|
| 3 |
| vulnerability |
VCID-682j-e2pu-1uee |
|
| 4 |
| vulnerability |
VCID-a49n-tvnt-p3df |
|
| 5 |
| vulnerability |
VCID-ae1r-yq1g-rkem |
|
| 6 |
| vulnerability |
VCID-atun-stks-4kcb |
|
| 7 |
| vulnerability |
VCID-axc3-wcsk-q3eg |
|
| 8 |
| vulnerability |
VCID-b8zs-br97-57av |
|
| 9 |
| vulnerability |
VCID-d4ka-dk4p-kfhb |
|
| 10 |
| vulnerability |
VCID-dzdx-wae5-8ydy |
|
| 11 |
| vulnerability |
VCID-e3z2-ydhb-gqfg |
|
| 12 |
| vulnerability |
VCID-ezaq-tqd3-4yd1 |
|
| 13 |
| vulnerability |
VCID-ezux-6buh-h7h7 |
|
| 14 |
| vulnerability |
VCID-fj2p-7wkh-1fhq |
|
| 15 |
| vulnerability |
VCID-g2pj-dmae-e3er |
|
| 16 |
| vulnerability |
VCID-geaa-6dxx-tbcw |
|
| 17 |
| vulnerability |
VCID-h1n3-cmte-eugf |
|
| 18 |
| vulnerability |
VCID-hqar-fca3-cbht |
|
| 19 |
| vulnerability |
VCID-jnmu-c8dt-5yb6 |
|
| 20 |
| vulnerability |
VCID-jrxz-b168-7ug4 |
|
| 21 |
| vulnerability |
VCID-kb5h-116p-33b4 |
|
| 22 |
| vulnerability |
VCID-nukv-kkws-xkb1 |
|
| 23 |
| vulnerability |
VCID-rdwq-93d6-c7b4 |
|
| 24 |
| vulnerability |
VCID-rsry-fw45-9yev |
|
| 25 |
| vulnerability |
VCID-swpr-3qae-d7fe |
|
| 26 |
| vulnerability |
VCID-uhg5-zpzt-e3gz |
|
| 27 |
| vulnerability |
VCID-ujbp-cc1r-wfe9 |
|
| 28 |
| vulnerability |
VCID-v3h9-1t69-v7a3 |
|
| 29 |
| vulnerability |
VCID-v6rk-y6ws-dkh9 |
|
| 30 |
| vulnerability |
VCID-w8qm-73f3-rkbm |
|
| 31 |
| vulnerability |
VCID-x5e2-7whc-v3fc |
|
| 32 |
| vulnerability |
VCID-x94k-nxyd-27gs |
|
| 33 |
| vulnerability |
VCID-xg2f-12w4-yqge |
|
| 34 |
| vulnerability |
VCID-xw8r-fn6y-mbhp |
|
| 35 |
| vulnerability |
VCID-yeea-n94x-qqch |
|
| 36 |
| vulnerability |
VCID-yur3-am6j-w7ay |
|
| 37 |
| vulnerability |
VCID-zzzs-scbg-bbe9 |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@2.7.7%252Bdfsg-1%252Bdeb10u1 |
|
| 1 |
|
|
| aliases |
CVE-2020-1735, GHSA-gfr2-qpxh-qj9m, PYSEC-2020-7
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zzzs-scbg-bbe9 |
|