Lookup for vulnerable packages by Package URL.

GET /api/packages/13288?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/13288?format=api",
    "purl": "pkg:pypi/ansible@2.8.18rc1",
    "type": "pypi",
    "namespace": "",
    "name": "ansible",
    "version": "2.8.18rc1",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": "12.0.0",
    "latest_non_vulnerable_version": "12.2.0",
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/6475?format=api",
            "vulnerability_id": "VCID-4yvf-k192-9fca",
            "summary": "A flaw was found in Ansible if an ansible user sets ANSIBLE_ASYNC_DIR to a subdirectory of a world writable directory. When this occurs, there is a race condition on the managed machine. A malicious, non-privileged account on the remote machine can exploit the race condition to access the async result data. This flaw affects Ansible Tower 3.7 and Ansible Automation Platform 1.2.",
            "references": [
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956477",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956477"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2056",
                    "reference_id": "AVG-2056",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2056"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3533",
                    "reference_id": "CVE-2021-3533",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3533"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/17555?format=api",
                    "purl": "pkg:pypi/ansible@3.0.0",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-qbdk-hxhg-wbh4"
                        },
                        {
                            "vulnerability": "VCID-ujbp-cc1r-wfe9"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/ansible@3.0.0"
                }
            ],
            "aliases": [
                "CVE-2021-3533",
                "PYSEC-2021-126"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4yvf-k192-9fca"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/20186?format=api",
            "vulnerability_id": "VCID-682j-e2pu-1uee",
            "summary": "Improper Neutralization of Special Elements Used in a Template Engine\nA template injection flaw was found in Ansible where a user's controller internal templating operations may remove the unsafe designation from template data. This issue could allow an attacker to use a specially crafted file to introduce code injection when supplying templating data.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7773",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-19T03:55:28Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7773"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5764.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5764.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5764",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2163",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21687",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21801",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21552",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21699",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21746",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2166",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21603",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5764"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2247629",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-19T03:55:28Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2247629"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5764",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5764"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible/commit/270b39f6ff02511a2199505161218cbd1a5ae34f",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible/commit/270b39f6ff02511a2199505161218cbd1a5ae34f"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible/commit/7239d2d371bc6e274cbb7314e01431adce6ae25a",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible/commit/7239d2d371bc6e274cbb7314e01431adce6ae25a"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible/commit/fea130480d261ea5bf6fcd5cf19a348f1686ceb1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible/commit/fea130480d261ea5bf6fcd5cf19a348f1686ceb1"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X7Q6CHPVCHMZS5M7V22GOKFSXZAQ24EU",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X7Q6CHPVCHMZS5M7V22GOKFSXZAQ24EU"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X7Q6CHPVCHMZS5M7V22GOKFSXZAQ24EU/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X7Q6CHPVCHMZS5M7V22GOKFSXZAQ24EU/"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1057427",
                    "reference_id": "1057427",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1057427"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ansible_automation_platform:2.4::el8",
                    "reference_id": "cpe:/a:redhat:ansible_automation_platform:2.4::el8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ansible_automation_platform:2.4::el8"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ansible_automation_platform:2.4::el9",
                    "reference_id": "cpe:/a:redhat:ansible_automation_platform:2.4::el9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ansible_automation_platform:2.4::el9"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ansible_automation_platform_developer:2.4::el8",
                    "reference_id": "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ansible_automation_platform_developer:2.4::el8"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ansible_automation_platform_developer:2.4::el9",
                    "reference_id": "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ansible_automation_platform_developer:2.4::el9"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ansible_automation_platform_inside:2.4::el8",
                    "reference_id": "cpe:/a:redhat:ansible_automation_platform_inside:2.4::el8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ansible_automation_platform_inside:2.4::el8"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ansible_automation_platform_inside:2.4::el9",
                    "reference_id": "cpe:/a:redhat:ansible_automation_platform_inside:2.4::el9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ansible_automation_platform_inside:2.4::el9"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2023-5764",
                    "reference_id": "CVE-2023-5764",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-19T03:55:28Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2023-5764"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5764",
                    "reference_id": "CVE-2023-5764",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5764"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-7j69-qfc3-2fq9",
                    "reference_id": "GHSA-7j69-qfc3-2fq9",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-7j69-qfc3-2fq9"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6846-1/",
                    "reference_id": "USN-6846-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6846-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/17553?format=api",
                    "purl": "pkg:pypi/ansible@3.0.0b1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4yvf-k192-9fca"
                        },
                        {
                            "vulnerability": "VCID-qbdk-hxhg-wbh4"
                        },
                        {
                            "vulnerability": "VCID-ujbp-cc1r-wfe9"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/ansible@3.0.0b1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/17555?format=api",
                    "purl": "pkg:pypi/ansible@3.0.0",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-qbdk-hxhg-wbh4"
                        },
                        {
                            "vulnerability": "VCID-ujbp-cc1r-wfe9"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/ansible@3.0.0"
                }
            ],
            "aliases": [
                "CVE-2023-5764",
                "GHSA-7j69-qfc3-2fq9"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-682j-e2pu-1uee"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/13372?format=api",
            "vulnerability_id": "VCID-atun-stks-4kcb",
            "summary": "Insertion of Sensitive Information into Log File\nA flaw was found in ansible module where credentials are disclosed in the console log by default and not protected by the security feature when using the bitbucket_pipeline_variable module. This flaw allows an attacker to steal bitbucket_pipeline credentials. The highest threat from this vulnerability is to confidentiality.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20180.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20180.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-20180",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11284",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11312",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11345",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11339",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11285",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11204",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11412",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11355",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11208",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-20180"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1915808",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1915808"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20180",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20180"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible/blob/v2.8.19/changelogs/CHANGELOG-v2.8.rst",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible/blob/v2.8.19/changelogs/CHANGELOG-v2.8.rst"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible/blob/v2.9.18/changelogs/CHANGELOG-v2.9.rst",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible/blob/v2.9.18/changelogs/CHANGELOG-v2.9.rst"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible/pull/73242",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible/pull/73242"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible/pull/73243",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible/pull/73243"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible/tree/v2.7.18/lib/ansible/modules/source_control",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible/tree/v2.7.18/lib/ansible/modules/source_control"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible/tree/v2.8.0a1/lib/ansible/modules/source_control",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible/tree/v2.8.0a1/lib/ansible/modules/source_control"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985753",
                    "reference_id": "985753",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985753"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202102-9",
                    "reference_id": "ASA-202102-9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202102-9"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1437",
                    "reference_id": "AVG-1437",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1437"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20180",
                    "reference_id": "CVE-2021-20180",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20180"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-fh5v-5f35-2rv2",
                    "reference_id": "GHSA-fh5v-5f35-2rv2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-fh5v-5f35-2rv2"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0663",
                    "reference_id": "RHSA-2021:0663",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0663"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0664",
                    "reference_id": "RHSA-2021:0664",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0664"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1079",
                    "reference_id": "RHSA-2021:1079",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1079"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2180",
                    "reference_id": "RHSA-2021:2180",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2180"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/13291?format=api",
                    "purl": "pkg:pypi/ansible@2.8.19",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4yvf-k192-9fca"
                        },
                        {
                            "vulnerability": "VCID-682j-e2pu-1uee"
                        },
                        {
                            "vulnerability": "VCID-atun-stks-4kcb"
                        },
                        {
                            "vulnerability": "VCID-axc3-wcsk-q3eg"
                        },
                        {
                            "vulnerability": "VCID-c1xg-s3kx-gkft"
                        },
                        {
                            "vulnerability": "VCID-dzdx-wae5-8ydy"
                        },
                        {
                            "vulnerability": "VCID-e3z2-ydhb-gqfg"
                        },
                        {
                            "vulnerability": "VCID-fj2p-7wkh-1fhq"
                        },
                        {
                            "vulnerability": "VCID-geaa-6dxx-tbcw"
                        },
                        {
                            "vulnerability": "VCID-js7k-ptm9-2yh1"
                        },
                        {
                            "vulnerability": "VCID-qbdk-hxhg-wbh4"
                        },
                        {
                            "vulnerability": "VCID-rdwq-93d6-c7b4"
                        },
                        {
                            "vulnerability": "VCID-rg5d-st3d-nbah"
                        },
                        {
                            "vulnerability": "VCID-ujbp-cc1r-wfe9"
                        },
                        {
                            "vulnerability": "VCID-v3h9-1t69-v7a3"
                        },
                        {
                            "vulnerability": "VCID-x94k-nxyd-27gs"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/ansible@2.8.19"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/13310?format=api",
                    "purl": "pkg:pypi/ansible@2.9.18",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4yvf-k192-9fca"
                        },
                        {
                            "vulnerability": "VCID-682j-e2pu-1uee"
                        },
                        {
                            "vulnerability": "VCID-axc3-wcsk-q3eg"
                        },
                        {
                            "vulnerability": "VCID-c1xg-s3kx-gkft"
                        },
                        {
                            "vulnerability": "VCID-dzdx-wae5-8ydy"
                        },
                        {
                            "vulnerability": "VCID-e3z2-ydhb-gqfg"
                        },
                        {
                            "vulnerability": "VCID-geaa-6dxx-tbcw"
                        },
                        {
                            "vulnerability": "VCID-qbdk-hxhg-wbh4"
                        },
                        {
                            "vulnerability": "VCID-rg5d-st3d-nbah"
                        },
                        {
                            "vulnerability": "VCID-ujbp-cc1r-wfe9"
                        },
                        {
                            "vulnerability": "VCID-v3h9-1t69-v7a3"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/ansible@2.9.18"
                }
            ],
            "aliases": [
                "CVE-2021-20180",
                "GHSA-fh5v-5f35-2rv2"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-atun-stks-4kcb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/6601?format=api",
            "vulnerability_id": "VCID-axc3-wcsk-q3eg",
            "summary": "A flaw was found in Ansible, where a user's controller is vulnerable to template injection. This issue can occur through facts used in the template if the user is trying to put templates in multi-line YAML strings and the facts being handled do not routinely include special template characters. This flaw allows attackers to perform command injection, which discloses sensitive information. The highest threat from this vulnerability is to confidentiality and integrity.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3583.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3583.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3583",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5489",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54913",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54931",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54919",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54804",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5487",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54901",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54875",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5492",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3583"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1968412",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1968412"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3583",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3583"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-2pfh-q76x-gwvm",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-2pfh-q76x-gwvm"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible/commit/03aff644cc1c00e1f7551195c68fbd0d13a39e6e",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible/commit/03aff644cc1c00e1f7551195c68fbd0d13a39e6e"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible/commit/8aa850e3573e48c9a2f12aef84e8a3a6f5ba4847",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible/commit/8aa850e3573e48c9a2f12aef84e8a3a6f5ba4847"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible/commit/8b17e5b9229ffaecfe10a4881bc3f87dd2c184e1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible/commit/8b17e5b9229ffaecfe10a4881bc3f87dd2c184e1"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible/pull/74960",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible/pull/74960"
                },
                {
                    "reference_url": "https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2021-358.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2021-358.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00018.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00018.html"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2260",
                    "reference_id": "AVG-2260",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2260"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3583",
                    "reference_id": "CVE-2021-3583",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2663",
                    "reference_id": "RHSA-2021:2663",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2663"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2664",
                    "reference_id": "RHSA-2021:2664",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2664"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/USN-5315-1/",
                    "reference_id": "USN-USN-5315-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/USN-5315-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/13319?format=api",
                    "purl": "pkg:pypi/ansible@2.9.23rc1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4yvf-k192-9fca"
                        },
                        {
                            "vulnerability": "VCID-682j-e2pu-1uee"
                        },
                        {
                            "vulnerability": "VCID-axc3-wcsk-q3eg"
                        },
                        {
                            "vulnerability": "VCID-c1xg-s3kx-gkft"
                        },
                        {
                            "vulnerability": "VCID-dzdx-wae5-8ydy"
                        },
                        {
                            "vulnerability": "VCID-geaa-6dxx-tbcw"
                        },
                        {
                            "vulnerability": "VCID-qbdk-hxhg-wbh4"
                        },
                        {
                            "vulnerability": "VCID-rg5d-st3d-nbah"
                        },
                        {
                            "vulnerability": "VCID-ujbp-cc1r-wfe9"
                        },
                        {
                            "vulnerability": "VCID-v3h9-1t69-v7a3"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/ansible@2.9.23rc1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/13320?format=api",
                    "purl": "pkg:pypi/ansible@2.9.23",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4yvf-k192-9fca"
                        },
                        {
                            "vulnerability": "VCID-682j-e2pu-1uee"
                        },
                        {
                            "vulnerability": "VCID-c1xg-s3kx-gkft"
                        },
                        {
                            "vulnerability": "VCID-dzdx-wae5-8ydy"
                        },
                        {
                            "vulnerability": "VCID-geaa-6dxx-tbcw"
                        },
                        {
                            "vulnerability": "VCID-qbdk-hxhg-wbh4"
                        },
                        {
                            "vulnerability": "VCID-rg5d-st3d-nbah"
                        },
                        {
                            "vulnerability": "VCID-ujbp-cc1r-wfe9"
                        },
                        {
                            "vulnerability": "VCID-v3h9-1t69-v7a3"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/ansible@2.9.23"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74280?format=api",
                    "purl": "pkg:pypi/ansible@2.10.11rc1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/ansible@2.10.11rc1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74281?format=api",
                    "purl": "pkg:pypi/ansible@2.11.2rc1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/ansible@2.11.2rc1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/17553?format=api",
                    "purl": "pkg:pypi/ansible@3.0.0b1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4yvf-k192-9fca"
                        },
                        {
                            "vulnerability": "VCID-qbdk-hxhg-wbh4"
                        },
                        {
                            "vulnerability": "VCID-ujbp-cc1r-wfe9"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/ansible@3.0.0b1"
                }
            ],
            "aliases": [
                "CVE-2021-3583",
                "GHSA-2pfh-q76x-gwvm",
                "PYSEC-2021-358"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-axc3-wcsk-q3eg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/6056?format=api",
            "vulnerability_id": "VCID-c1xg-s3kx-gkft",
            "summary": "A flaw was found in Ansible Engine when a file is moved using atomic_move primitive as the file mode cannot be specified. This sets the destination files world-readable if the destination file does not exist and if the file exists, the file could be changed to have less restrictive permissions before the move. This could lead to the disclosure of sensitive data. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1736.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1736.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-1736",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12221",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12184",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12383",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0004",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12337",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13875",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13918",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13791",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13866",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13839",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-1736"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1736",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1736"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1736",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1736"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-x7jh-595q-wq82",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-x7jh-595q-wq82"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible/issues/67794",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible/issues/67794"
                },
                {
                    "reference_url": "https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2020-8.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2020-8.yaml"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2NYYQP2XJB2TTRP6AKWVMBSPB2DFJNKD/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2NYYQP2XJB2TTRP6AKWVMBSPB2DFJNKD/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BPNZWBAUP4ZHUR6PO7U6ZXEKNCX62KZ7/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BPNZWBAUP4ZHUR6PO7U6ZXEKNCX62KZ7/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2NYYQP2XJB2TTRP6AKWVMBSPB2DFJNKD",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2NYYQP2XJB2TTRP6AKWVMBSPB2DFJNKD"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2NYYQP2XJB2TTRP6AKWVMBSPB2DFJNKD/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2NYYQP2XJB2TTRP6AKWVMBSPB2DFJNKD/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPNZWBAUP4ZHUR6PO7U6ZXEKNCX62KZ7",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPNZWBAUP4ZHUR6PO7U6ZXEKNCX62KZ7"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPNZWBAUP4ZHUR6PO7U6ZXEKNCX62KZ7/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPNZWBAUP4ZHUR6PO7U6ZXEKNCX62KZ7/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202006-11",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202006-11"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802124",
                    "reference_id": "1802124",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1802124"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=966663",
                    "reference_id": "966663",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=966663"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:cloudforms_management_engine:5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:cloudforms_management_engine:5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:cloudforms_management_engine:5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1736",
                    "reference_id": "CVE-2020-1736",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:N/A:N"
                        },
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1736"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3600",
                    "reference_id": "RHSA-2020:3600",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3600"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/10051?format=api",
                    "purl": "pkg:pypi/ansible@2.9.6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3jej-4jyp-cqbt"
                        },
                        {
                            "vulnerability": "VCID-4yvf-k192-9fca"
                        },
                        {
                            "vulnerability": "VCID-682j-e2pu-1uee"
                        },
                        {
                            "vulnerability": "VCID-atun-stks-4kcb"
                        },
                        {
                            "vulnerability": "VCID-axc3-wcsk-q3eg"
                        },
                        {
                            "vulnerability": "VCID-b8zs-br97-57av"
                        },
                        {
                            "vulnerability": "VCID-c1xg-s3kx-gkft"
                        },
                        {
                            "vulnerability": "VCID-d7ez-s7qb-p3ay"
                        },
                        {
                            "vulnerability": "VCID-dzdx-wae5-8ydy"
                        },
                        {
                            "vulnerability": "VCID-e3z2-ydhb-gqfg"
                        },
                        {
                            "vulnerability": "VCID-ezaq-tqd3-4yd1"
                        },
                        {
                            "vulnerability": "VCID-ezux-6buh-h7h7"
                        },
                        {
                            "vulnerability": "VCID-fj2p-7wkh-1fhq"
                        },
                        {
                            "vulnerability": "VCID-geaa-6dxx-tbcw"
                        },
                        {
                            "vulnerability": "VCID-h1n3-cmte-eugf"
                        },
                        {
                            "vulnerability": "VCID-hqar-fca3-cbht"
                        },
                        {
                            "vulnerability": "VCID-jrxz-b168-7ug4"
                        },
                        {
                            "vulnerability": "VCID-js7k-ptm9-2yh1"
                        },
                        {
                            "vulnerability": "VCID-qbdk-hxhg-wbh4"
                        },
                        {
                            "vulnerability": "VCID-rdwq-93d6-c7b4"
                        },
                        {
                            "vulnerability": "VCID-rg5d-st3d-nbah"
                        },
                        {
                            "vulnerability": "VCID-ujbp-cc1r-wfe9"
                        },
                        {
                            "vulnerability": "VCID-v3h9-1t69-v7a3"
                        },
                        {
                            "vulnerability": "VCID-whyk-3ynn-zyf4"
                        },
                        {
                            "vulnerability": "VCID-xg2f-12w4-yqge"
                        },
                        {
                            "vulnerability": "VCID-xw8r-fn6y-mbhp"
                        },
                        {
                            "vulnerability": "VCID-yeea-n94x-qqch"
                        },
                        {
                            "vulnerability": "VCID-yur3-am6j-w7ay"
                        },
                        {
                            "vulnerability": "VCID-zzzs-scbg-bbe9"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/ansible@2.9.6"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/13575?format=api",
                    "purl": "pkg:pypi/ansible@2.10.1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2jy6-eqpn-wbce"
                        },
                        {
                            "vulnerability": "VCID-4yvf-k192-9fca"
                        },
                        {
                            "vulnerability": "VCID-682j-e2pu-1uee"
                        },
                        {
                            "vulnerability": "VCID-axc3-wcsk-q3eg"
                        },
                        {
                            "vulnerability": "VCID-e3z2-ydhb-gqfg"
                        },
                        {
                            "vulnerability": "VCID-qbdk-hxhg-wbh4"
                        },
                        {
                            "vulnerability": "VCID-ujbp-cc1r-wfe9"
                        },
                        {
                            "vulnerability": "VCID-xw8r-fn6y-mbhp"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/ansible@2.10.1"
                }
            ],
            "aliases": [
                "CVE-2020-1736",
                "GHSA-x7jh-595q-wq82",
                "PYSEC-2020-8"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c1xg-s3kx-gkft"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51637?format=api",
            "vulnerability_id": "VCID-dzdx-wae5-8ydy",
            "summary": "Ansible leaks password to logs\nA flaw was found in Ansible in the amazon.aws collection when using the `tower_callback` parameter from the `amazon.aws.ec2_instance` module. This flaw allows an attacker to take advantage of this issue as the module is handling the parameter insecurely, leading to the password leaking in the logs.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3697.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3697.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3697",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00191",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41039",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00191",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41008",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44224",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44207",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44203",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44152",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44192",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44191",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3697"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3697",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3697"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible/pull/35749",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible/pull/35749"
                },
                {
                    "reference_url": "https://github.com/ansible-collections/amazon.aws/pull/1199",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible-collections/amazon.aws/pull/1199"
                },
                {
                    "reference_url": "https://github.com/ansible-community/ansible-build-data/blob/main/6/CHANGELOG-v6.rst",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible-community/ansible-build-data/blob/main/6/CHANGELOG-v6.rst"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00018.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00018.html"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3697",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3697"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137664",
                    "reference_id": "2137664",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137664"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-cpx3-93w7-457x",
                    "reference_id": "GHSA-cpx3-93w7-457x",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-cpx3-93w7-457x"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6846-1/",
                    "reference_id": "USN-6846-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6846-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/13341?format=api",
                    "purl": "pkg:pypi/ansible@2.10.0",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4yvf-k192-9fca"
                        },
                        {
                            "vulnerability": "VCID-682j-e2pu-1uee"
                        },
                        {
                            "vulnerability": "VCID-axc3-wcsk-q3eg"
                        },
                        {
                            "vulnerability": "VCID-c1xg-s3kx-gkft"
                        },
                        {
                            "vulnerability": "VCID-e3z2-ydhb-gqfg"
                        },
                        {
                            "vulnerability": "VCID-qbdk-hxhg-wbh4"
                        },
                        {
                            "vulnerability": "VCID-rg5d-st3d-nbah"
                        },
                        {
                            "vulnerability": "VCID-ujbp-cc1r-wfe9"
                        },
                        {
                            "vulnerability": "VCID-xw8r-fn6y-mbhp"
                        },
                        {
                            "vulnerability": "VCID-yeea-n94x-qqch"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/ansible@2.10.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79287?format=api",
                    "purl": "pkg:pypi/ansible@7.0.0",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-qbdk-hxhg-wbh4"
                        },
                        {
                            "vulnerability": "VCID-ujbp-cc1r-wfe9"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/ansible@7.0.0"
                }
            ],
            "aliases": [
                "CVE-2022-3697",
                "GHSA-cpx3-93w7-457x"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dzdx-wae5-8ydy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/6324?format=api",
            "vulnerability_id": "VCID-e3z2-ydhb-gqfg",
            "summary": "A flaw was found in the Ansible Engine 2.9.18, where sensitive info is not masked by default and is not protected by the no_log feature when using the sub-option feature of the basic.py module. This flaw allows an attacker to obtain sensitive information. The highest threat from this vulnerability is to confidentiality.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20228.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20228.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-20228",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35396",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3542",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35463",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35454",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35429",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35383",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.355",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35276",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35475",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-20228"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1925002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1925002"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10156",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10156"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10206",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10206"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14846",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14846"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14864",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14864"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14904",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14904"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10684",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10684"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10685",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10685"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10729",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10729"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14330",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14330"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14332",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14332"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14365"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1733",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1733"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1735",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1735"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1739",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1739"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1740",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1740"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1746",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1746"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1753",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1753"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20228",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20228"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-5rrg-rr89-x9mv",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-5rrg-rr89-x9mv"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible/commit/49ebd509df9de1c1fc1bcee00e79a835dd00662c",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible/commit/49ebd509df9de1c1fc1bcee00e79a835dd00662c"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible/commit/e41d1f0a3fd6c466192e7e24accd3d1c6501111b",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible/commit/e41d1f0a3fd6c466192e7e24accd3d1c6501111b"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible/commit/f8ff395d817c3eddc050f809919c15dfb5796120",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible/commit/f8ff395d817c3eddc050f809919c15dfb5796120"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible/pull/73487",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible/pull/73487"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible/pull/73492",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible/pull/73492"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible/pull/73493",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible/pull/73493"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible/pull/73494",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible/pull/73494"
                },
                {
                    "reference_url": "https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2021-1.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2021-1.yaml"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20228",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20228"
                },
                {
                    "reference_url": "https://www.debian.org/security/2021/dsa-4950",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.debian.org/security/2021/dsa-4950"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0663",
                    "reference_id": "RHSA-2021:0663",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0663"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0664",
                    "reference_id": "RHSA-2021:0664",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0664"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1079",
                    "reference_id": "RHSA-2021:1079",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1079"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2180",
                    "reference_id": "RHSA-2021:2180",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2180"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/13290?format=api",
                    "purl": "pkg:pypi/ansible@2.8.19rc1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4yvf-k192-9fca"
                        },
                        {
                            "vulnerability": "VCID-682j-e2pu-1uee"
                        },
                        {
                            "vulnerability": "VCID-atun-stks-4kcb"
                        },
                        {
                            "vulnerability": "VCID-axc3-wcsk-q3eg"
                        },
                        {
                            "vulnerability": "VCID-c1xg-s3kx-gkft"
                        },
                        {
                            "vulnerability": "VCID-dzdx-wae5-8ydy"
                        },
                        {
                            "vulnerability": "VCID-e3z2-ydhb-gqfg"
                        },
                        {
                            "vulnerability": "VCID-fj2p-7wkh-1fhq"
                        },
                        {
                            "vulnerability": "VCID-geaa-6dxx-tbcw"
                        },
                        {
                            "vulnerability": "VCID-js7k-ptm9-2yh1"
                        },
                        {
                            "vulnerability": "VCID-qbdk-hxhg-wbh4"
                        },
                        {
                            "vulnerability": "VCID-rdwq-93d6-c7b4"
                        },
                        {
                            "vulnerability": "VCID-rg5d-st3d-nbah"
                        },
                        {
                            "vulnerability": "VCID-ujbp-cc1r-wfe9"
                        },
                        {
                            "vulnerability": "VCID-v3h9-1t69-v7a3"
                        },
                        {
                            "vulnerability": "VCID-x94k-nxyd-27gs"
                        },
                        {
                            "vulnerability": "VCID-xw8r-fn6y-mbhp"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/ansible@2.8.19rc1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/9833?format=api",
                    "purl": "pkg:pypi/ansible@2.9.1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3jej-4jyp-cqbt"
                        },
                        {
                            "vulnerability": "VCID-4yvf-k192-9fca"
                        },
                        {
                            "vulnerability": "VCID-682j-e2pu-1uee"
                        },
                        {
                            "vulnerability": "VCID-a49n-tvnt-p3df"
                        },
                        {
                            "vulnerability": "VCID-ae1r-yq1g-rkem"
                        },
                        {
                            "vulnerability": "VCID-atun-stks-4kcb"
                        },
                        {
                            "vulnerability": "VCID-axc3-wcsk-q3eg"
                        },
                        {
                            "vulnerability": "VCID-b8zs-br97-57av"
                        },
                        {
                            "vulnerability": "VCID-c1xg-s3kx-gkft"
                        },
                        {
                            "vulnerability": "VCID-d4ka-dk4p-kfhb"
                        },
                        {
                            "vulnerability": "VCID-d7ez-s7qb-p3ay"
                        },
                        {
                            "vulnerability": "VCID-dzdx-wae5-8ydy"
                        },
                        {
                            "vulnerability": "VCID-e3z2-ydhb-gqfg"
                        },
                        {
                            "vulnerability": "VCID-ezaq-tqd3-4yd1"
                        },
                        {
                            "vulnerability": "VCID-ezux-6buh-h7h7"
                        },
                        {
                            "vulnerability": "VCID-fj2p-7wkh-1fhq"
                        },
                        {
                            "vulnerability": "VCID-geaa-6dxx-tbcw"
                        },
                        {
                            "vulnerability": "VCID-h1n3-cmte-eugf"
                        },
                        {
                            "vulnerability": "VCID-hqar-fca3-cbht"
                        },
                        {
                            "vulnerability": "VCID-jrxz-b168-7ug4"
                        },
                        {
                            "vulnerability": "VCID-js7k-ptm9-2yh1"
                        },
                        {
                            "vulnerability": "VCID-qbdk-hxhg-wbh4"
                        },
                        {
                            "vulnerability": "VCID-rdwq-93d6-c7b4"
                        },
                        {
                            "vulnerability": "VCID-rg5d-st3d-nbah"
                        },
                        {
                            "vulnerability": "VCID-tdp4-h4ht-pqhs"
                        },
                        {
                            "vulnerability": "VCID-uhg5-zpzt-e3gz"
                        },
                        {
                            "vulnerability": "VCID-ujbp-cc1r-wfe9"
                        },
                        {
                            "vulnerability": "VCID-v3h9-1t69-v7a3"
                        },
                        {
                            "vulnerability": "VCID-whyk-3ynn-zyf4"
                        },
                        {
                            "vulnerability": "VCID-x94k-nxyd-27gs"
                        },
                        {
                            "vulnerability": "VCID-xg2f-12w4-yqge"
                        },
                        {
                            "vulnerability": "VCID-xw8r-fn6y-mbhp"
                        },
                        {
                            "vulnerability": "VCID-yeea-n94x-qqch"
                        },
                        {
                            "vulnerability": "VCID-yur3-am6j-w7ay"
                        },
                        {
                            "vulnerability": "VCID-zzzs-scbg-bbe9"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/ansible@2.9.1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/13309?format=api",
                    "purl": "pkg:pypi/ansible@2.9.18rc1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4yvf-k192-9fca"
                        },
                        {
                            "vulnerability": "VCID-682j-e2pu-1uee"
                        },
                        {
                            "vulnerability": "VCID-atun-stks-4kcb"
                        },
                        {
                            "vulnerability": "VCID-axc3-wcsk-q3eg"
                        },
                        {
                            "vulnerability": "VCID-c1xg-s3kx-gkft"
                        },
                        {
                            "vulnerability": "VCID-dzdx-wae5-8ydy"
                        },
                        {
                            "vulnerability": "VCID-e3z2-ydhb-gqfg"
                        },
                        {
                            "vulnerability": "VCID-fj2p-7wkh-1fhq"
                        },
                        {
                            "vulnerability": "VCID-geaa-6dxx-tbcw"
                        },
                        {
                            "vulnerability": "VCID-js7k-ptm9-2yh1"
                        },
                        {
                            "vulnerability": "VCID-qbdk-hxhg-wbh4"
                        },
                        {
                            "vulnerability": "VCID-rg5d-st3d-nbah"
                        },
                        {
                            "vulnerability": "VCID-ujbp-cc1r-wfe9"
                        },
                        {
                            "vulnerability": "VCID-v3h9-1t69-v7a3"
                        },
                        {
                            "vulnerability": "VCID-xw8r-fn6y-mbhp"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/ansible@2.9.18rc1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/13311?format=api",
                    "purl": "pkg:pypi/ansible@2.9.19rc1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4yvf-k192-9fca"
                        },
                        {
                            "vulnerability": "VCID-682j-e2pu-1uee"
                        },
                        {
                            "vulnerability": "VCID-axc3-wcsk-q3eg"
                        },
                        {
                            "vulnerability": "VCID-c1xg-s3kx-gkft"
                        },
                        {
                            "vulnerability": "VCID-dzdx-wae5-8ydy"
                        },
                        {
                            "vulnerability": "VCID-e3z2-ydhb-gqfg"
                        },
                        {
                            "vulnerability": "VCID-geaa-6dxx-tbcw"
                        },
                        {
                            "vulnerability": "VCID-qbdk-hxhg-wbh4"
                        },
                        {
                            "vulnerability": "VCID-rg5d-st3d-nbah"
                        },
                        {
                            "vulnerability": "VCID-ujbp-cc1r-wfe9"
                        },
                        {
                            "vulnerability": "VCID-v3h9-1t69-v7a3"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/ansible@2.9.19rc1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/13312?format=api",
                    "purl": "pkg:pypi/ansible@2.9.19",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4yvf-k192-9fca"
                        },
                        {
                            "vulnerability": "VCID-682j-e2pu-1uee"
                        },
                        {
                            "vulnerability": "VCID-axc3-wcsk-q3eg"
                        },
                        {
                            "vulnerability": "VCID-c1xg-s3kx-gkft"
                        },
                        {
                            "vulnerability": "VCID-dzdx-wae5-8ydy"
                        },
                        {
                            "vulnerability": "VCID-geaa-6dxx-tbcw"
                        },
                        {
                            "vulnerability": "VCID-qbdk-hxhg-wbh4"
                        },
                        {
                            "vulnerability": "VCID-rg5d-st3d-nbah"
                        },
                        {
                            "vulnerability": "VCID-ujbp-cc1r-wfe9"
                        },
                        {
                            "vulnerability": "VCID-v3h9-1t69-v7a3"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/ansible@2.9.19"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/82205?format=api",
                    "purl": "pkg:pypi/ansible@2.10.6rc1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/ansible@2.10.6rc1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/17134?format=api",
                    "purl": "pkg:pypi/ansible@2.10.6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4yvf-k192-9fca"
                        },
                        {
                            "vulnerability": "VCID-682j-e2pu-1uee"
                        },
                        {
                            "vulnerability": "VCID-axc3-wcsk-q3eg"
                        },
                        {
                            "vulnerability": "VCID-qbdk-hxhg-wbh4"
                        },
                        {
                            "vulnerability": "VCID-ujbp-cc1r-wfe9"
                        },
                        {
                            "vulnerability": "VCID-xw8r-fn6y-mbhp"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/ansible@2.10.6"
                }
            ],
            "aliases": [
                "CVE-2021-20228",
                "GHSA-5rrg-rr89-x9mv",
                "PYSEC-2021-1"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e3z2-ydhb-gqfg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/6457?format=api",
            "vulnerability_id": "VCID-fj2p-7wkh-1fhq",
            "summary": "A flaw was found in ansible module where credentials are disclosed in the console log by default and not protected by the security feature when using the bitbucket_pipeline_variable module. This flaw allows an attacker to steal bitbucket_pipeline credentials. The highest threat from this vulnerability is to confidentiality.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20178.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20178.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-20178",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13388",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13435",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13471",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13411",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13498",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13448",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13367",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13571",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1351",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-20178"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1914774",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1914774"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20178",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20178"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-wv5p-gmmv-wh9v",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-wv5p-gmmv-wh9v"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible/blob/v2.9.18/changelogs/CHANGELOG-v2.9.rst#security-fixes",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible/blob/v2.9.18/changelogs/CHANGELOG-v2.9.rst#security-fixes"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible/blob/v2.9.18/changelogs/CHANGELOG-v2.9.rst#security-fixes,",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible/blob/v2.9.18/changelogs/CHANGELOG-v2.9.rst#security-fixes,"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible/blob/v2.9.18/changelogs/CHANGELOG-v2.9.rst#security-fixes%2C",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible/blob/v2.9.18/changelogs/CHANGELOG-v2.9.rst#security-fixes%2C"
                },
                {
                    "reference_url": "https://github.com/ansible-collections/community.general/commit/1d0c5e2ba47724c31a18d7b08b9daf13df8829dc",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible-collections/community.general/commit/1d0c5e2ba47724c31a18d7b08b9daf13df8829dc"
                },
                {
                    "reference_url": "https://github.com/ansible-collections/community.general/pull/1635",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible-collections/community.general/pull/1635"
                },
                {
                    "reference_url": "https://github.com/ansible-collections/community.general/pull/1635,",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/ansible-collections/community.general/pull/1635,"
                },
                {
                    "reference_url": "https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2021-106.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2021-106.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00018.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00018.html"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FUQ2QKAQA5OW2TY3ACZZMFIAJ2EQTG37",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FUQ2QKAQA5OW2TY3ACZZMFIAJ2EQTG37"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HIU7QZUV73U6ZQ65VJWSFBTCALVXLH55",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HIU7QZUV73U6ZQ65VJWSFBTCALVXLH55"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FUQ2QKAQA5OW2TY3ACZZMFIAJ2EQTG37",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FUQ2QKAQA5OW2TY3ACZZMFIAJ2EQTG37"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FUQ2QKAQA5OW2TY3ACZZMFIAJ2EQTG37/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FUQ2QKAQA5OW2TY3ACZZMFIAJ2EQTG37/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIU7QZUV73U6ZQ65VJWSFBTCALVXLH55",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIU7QZUV73U6ZQ65VJWSFBTCALVXLH55"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIU7QZUV73U6ZQ65VJWSFBTCALVXLH55/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIU7QZUV73U6ZQ65VJWSFBTCALVXLH55/"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20178",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20178"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985753",
                    "reference_id": "985753",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985753"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202102-9",
                    "reference_id": "ASA-202102-9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202102-9"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1437",
                    "reference_id": "AVG-1437",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1437"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0663",
                    "reference_id": "RHSA-2021:0663",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0663"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0664",
                    "reference_id": "RHSA-2021:0664",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0664"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1079",
                    "reference_id": "RHSA-2021:1079",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1079"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2180",
                    "reference_id": "RHSA-2021:2180",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2180"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/13310?format=api",
                    "purl": "pkg:pypi/ansible@2.9.18",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4yvf-k192-9fca"
                        },
                        {
                            "vulnerability": "VCID-682j-e2pu-1uee"
                        },
                        {
                            "vulnerability": "VCID-axc3-wcsk-q3eg"
                        },
                        {
                            "vulnerability": "VCID-c1xg-s3kx-gkft"
                        },
                        {
                            "vulnerability": "VCID-dzdx-wae5-8ydy"
                        },
                        {
                            "vulnerability": "VCID-e3z2-ydhb-gqfg"
                        },
                        {
                            "vulnerability": "VCID-geaa-6dxx-tbcw"
                        },
                        {
                            "vulnerability": "VCID-qbdk-hxhg-wbh4"
                        },
                        {
                            "vulnerability": "VCID-rg5d-st3d-nbah"
                        },
                        {
                            "vulnerability": "VCID-ujbp-cc1r-wfe9"
                        },
                        {
                            "vulnerability": "VCID-v3h9-1t69-v7a3"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/ansible@2.9.18"
                }
            ],
            "aliases": [
                "CVE-2021-20178",
                "GHSA-wv5p-gmmv-wh9v",
                "PYSEC-2021-106"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fj2p-7wkh-1fhq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/8498?format=api",
            "vulnerability_id": "VCID-geaa-6dxx-tbcw",
            "summary": "A flaw was found in Ansible Engine's ansible-connection module, where sensitive information such as the Ansible user credentials is disclosed by default in the traceback error message. The highest threat from this vulnerability is to confidentiality.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3871",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3871"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3872",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3872"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3874",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3874"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4703",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4703"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4750",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4750"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3620.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3620.json"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2021-3620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2021-3620"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52409",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52437",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52402",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52455",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52364",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.525",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52484",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52468",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52449",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3620"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975767",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:25Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975767"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3620"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-4r65-35qq-ch8j",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-4r65-35qq-ch8j"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible/blob/stable-2.9/changelogs/CHANGELOG-v2.9.rst#security-fixes",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:25Z/"
                        }
                    ],
                    "url": "https://github.com/ansible/ansible/blob/stable-2.9/changelogs/CHANGELOG-v2.9.rst#security-fixes"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible/commit/fe28767970c8ec62aabe493c46b53a5de1e5fac0",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:25Z/"
                        }
                    ],
                    "url": "https://github.com/ansible/ansible/commit/fe28767970c8ec62aabe493c46b53a5de1e5fac0"
                },
                {
                    "reference_url": "https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2022-164.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2022-164.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00018.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:25Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00018.html"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1941",
                    "reference_id": "AVG-1941",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1941"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3620",
                    "reference_id": "CVE-2021-3620",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3620"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/USN-5315-1/",
                    "reference_id": "USN-USN-5315-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/USN-5315-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/13328?format=api",
                    "purl": "pkg:pypi/ansible@2.9.27",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4yvf-k192-9fca"
                        },
                        {
                            "vulnerability": "VCID-682j-e2pu-1uee"
                        },
                        {
                            "vulnerability": "VCID-c1xg-s3kx-gkft"
                        },
                        {
                            "vulnerability": "VCID-dzdx-wae5-8ydy"
                        },
                        {
                            "vulnerability": "VCID-qbdk-hxhg-wbh4"
                        },
                        {
                            "vulnerability": "VCID-rg5d-st3d-nbah"
                        },
                        {
                            "vulnerability": "VCID-ujbp-cc1r-wfe9"
                        },
                        {
                            "vulnerability": "VCID-v3h9-1t69-v7a3"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/ansible@2.9.27"
                }
            ],
            "aliases": [
                "CVE-2021-3620",
                "GHSA-4r65-35qq-ch8j",
                "PYSEC-2022-164"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-geaa-6dxx-tbcw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/221223?format=api",
            "vulnerability_id": "VCID-js7k-ptm9-2yh1",
            "summary": "Ethereum 0xe933c0cd9784414d5f278c114904f5a84b396919#code.sol latest version is affected by a denial of service vulnerability in the affected payout function. Once the length of this array is too long, it will result in an exception. Attackers can make attacks by creating a series of account addresses.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-20178",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59975",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59852",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59928",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59954",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59924",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59974",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59987",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60008",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00389",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59993",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-20178"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1914774",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1914774"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-20178",
                    "reference_id": "CVE-2020-20178",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-20178"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/13310?format=api",
                    "purl": "pkg:pypi/ansible@2.9.18",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4yvf-k192-9fca"
                        },
                        {
                            "vulnerability": "VCID-682j-e2pu-1uee"
                        },
                        {
                            "vulnerability": "VCID-axc3-wcsk-q3eg"
                        },
                        {
                            "vulnerability": "VCID-c1xg-s3kx-gkft"
                        },
                        {
                            "vulnerability": "VCID-dzdx-wae5-8ydy"
                        },
                        {
                            "vulnerability": "VCID-e3z2-ydhb-gqfg"
                        },
                        {
                            "vulnerability": "VCID-geaa-6dxx-tbcw"
                        },
                        {
                            "vulnerability": "VCID-qbdk-hxhg-wbh4"
                        },
                        {
                            "vulnerability": "VCID-rg5d-st3d-nbah"
                        },
                        {
                            "vulnerability": "VCID-ujbp-cc1r-wfe9"
                        },
                        {
                            "vulnerability": "VCID-v3h9-1t69-v7a3"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/ansible@2.9.18"
                }
            ],
            "aliases": [
                "CVE-2020-20178"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-js7k-ptm9-2yh1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/23740?format=api",
            "vulnerability_id": "VCID-qbdk-hxhg-wbh4",
            "summary": "Ansible Community General Collection is vulnerable to exposure of sensitive information\nA flaw was found in ansible-collection-community-general. This vulnerability allows for information exposure (IE) of sensitive credentials, specifically plaintext passwords, via verbose output when running Ansible with debug modes. Attackers with access to logs could retrieve these secrets and potentially compromise Keycloak accounts or administrative access.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14010.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14010.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-14010",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03045",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03031",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0471",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04677",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04694",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04671",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04705",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04717",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-14010"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418774",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-05T17:22:53Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418774"
                },
                {
                    "reference_url": "https://github.com/ansible-collections/community.general",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible-collections/community.general"
                },
                {
                    "reference_url": "https://github.com/ansible-collections/community.general/commit/08e56bbb9b57740a879d3057d84cdb02a162b840",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible-collections/community.general/commit/08e56bbb9b57740a879d3057d84cdb02a162b840"
                },
                {
                    "reference_url": "https://github.com/ansible-collections/community.general/commit/54af64ad363efe280b34102d2637fe272c1f7320",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/ansible-collections/community.general/commit/54af64ad363efe280b34102d2637fe272c1f7320"
                },
                {
                    "reference_url": "https://github.com/ansible-collections/community.general/issues/11000",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible-collections/community.general/issues/11000"
                },
                {
                    "reference_url": "https://github.com/ansible-collections/community.general/pull/11005",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/ansible-collections/community.general/pull/11005"
                },
                {
                    "reference_url": "https://github.com/ansible-community/ansible-build-data/blob/12.2.0/12/CHANGELOG-v12.md#security-fixes",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible-community/ansible-build-data/blob/12.2.0/12/CHANGELOG-v12.md#security-fixes"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121951",
                    "reference_id": "1121951",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121951"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:5",
                    "reference_id": "cpe:/a:redhat:ceph_storage:5",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:5"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:6",
                    "reference_id": "cpe:/a:redhat:ceph_storage:6",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:6"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:7",
                    "reference_id": "cpe:/a:redhat:ceph_storage:7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:7"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:8",
                    "reference_id": "cpe:/a:redhat:ceph_storage:8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:8"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openstack:17.1",
                    "reference_id": "cpe:/a:redhat:openstack:17.1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openstack:17.1"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openstack:18.0",
                    "reference_id": "cpe:/a:redhat:openstack:18.0",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openstack:18.0"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2025-14010",
                    "reference_id": "CVE-2025-14010",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-05T17:22:53Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2025-14010"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14010",
                    "reference_id": "CVE-2025-14010",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14010"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-8ggh-xwr9-3373",
                    "reference_id": "GHSA-8ggh-xwr9-3373",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-8ggh-xwr9-3373"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/66749?format=api",
                    "purl": "pkg:pypi/ansible@12.0.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/ansible@12.0.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/69360?format=api",
                    "purl": "pkg:pypi/ansible@12.2.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/ansible@12.2.0"
                }
            ],
            "aliases": [
                "CVE-2025-14010",
                "GHSA-8ggh-xwr9-3373"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qbdk-hxhg-wbh4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/6083?format=api",
            "vulnerability_id": "VCID-rdwq-93d6-c7b4",
            "summary": "An incomplete fix was found for the fix of the flaw CVE-2020-1733 ansible: insecure temporary directory when running become_user from become directive. The provided fix is insufficient to prevent the race condition on systems using ACLs and FUSE filesystems. Ansible Engine 2.7.18, 2.8.12, and 2.9.9 as well as previous versions are affected and Ansible Tower 3.4.5, 3.5.6 and 3.6.4 as well as previous versions are affected.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10744.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10744.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-10744",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11545",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1157",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11597",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11537",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11452",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11664",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11607",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1148",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-10744"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10744",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L"
                        },
                        {
                            "value": "2.0",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10744"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10744",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10744"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-vp9j-rghq-8jhh",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "2.0",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-vp9j-rghq-8jhh"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L"
                        },
                        {
                            "value": "2.0",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible/commit/77d0effcc5b2da1ef23e4ba32986a9759c27c10d",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L"
                        },
                        {
                            "value": "2.0",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible/commit/77d0effcc5b2da1ef23e4ba32986a9759c27c10d"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible/commit/84afa8e90cd168ff13208c8eae3e533ce7e21e1f",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L"
                        },
                        {
                            "value": "2.0",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible/commit/84afa8e90cd168ff13208c8eae3e533ce7e21e1f"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible/commit/ffd3757fc35468a97791e452e7f2d14c3e3fcb80",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L"
                        },
                        {
                            "value": "2.0",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible/commit/ffd3757fc35468a97791e452e7f2d14c3e3fcb80"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible/issues/69782",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L"
                        },
                        {
                            "value": "2.0",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible/issues/69782"
                },
                {
                    "reference_url": "https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2020-208.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L"
                        },
                        {
                            "value": "2.0",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2020-208.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1835566",
                    "reference_id": "1835566",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1835566"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=966660",
                    "reference_id": "966660",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=966660"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10744",
                    "reference_id": "CVE-2020-10744",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L"
                        },
                        {
                            "value": "2.0",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10744"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/USN-5315-1/",
                    "reference_id": "USN-USN-5315-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/USN-5315-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/10625?format=api",
                    "purl": "pkg:pypi/ansible@2.9.10",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4yvf-k192-9fca"
                        },
                        {
                            "vulnerability": "VCID-682j-e2pu-1uee"
                        },
                        {
                            "vulnerability": "VCID-atun-stks-4kcb"
                        },
                        {
                            "vulnerability": "VCID-axc3-wcsk-q3eg"
                        },
                        {
                            "vulnerability": "VCID-c1xg-s3kx-gkft"
                        },
                        {
                            "vulnerability": "VCID-dzdx-wae5-8ydy"
                        },
                        {
                            "vulnerability": "VCID-e3z2-ydhb-gqfg"
                        },
                        {
                            "vulnerability": "VCID-fj2p-7wkh-1fhq"
                        },
                        {
                            "vulnerability": "VCID-geaa-6dxx-tbcw"
                        },
                        {
                            "vulnerability": "VCID-jrxz-b168-7ug4"
                        },
                        {
                            "vulnerability": "VCID-js7k-ptm9-2yh1"
                        },
                        {
                            "vulnerability": "VCID-qbdk-hxhg-wbh4"
                        },
                        {
                            "vulnerability": "VCID-rdwq-93d6-c7b4"
                        },
                        {
                            "vulnerability": "VCID-rg5d-st3d-nbah"
                        },
                        {
                            "vulnerability": "VCID-ujbp-cc1r-wfe9"
                        },
                        {
                            "vulnerability": "VCID-v3h9-1t69-v7a3"
                        },
                        {
                            "vulnerability": "VCID-whyk-3ynn-zyf4"
                        },
                        {
                            "vulnerability": "VCID-xw8r-fn6y-mbhp"
                        },
                        {
                            "vulnerability": "VCID-yeea-n94x-qqch"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/ansible@2.9.10"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/13282?format=api",
                    "purl": "pkg:pypi/ansible@2.9.12",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4yvf-k192-9fca"
                        },
                        {
                            "vulnerability": "VCID-682j-e2pu-1uee"
                        },
                        {
                            "vulnerability": "VCID-atun-stks-4kcb"
                        },
                        {
                            "vulnerability": "VCID-axc3-wcsk-q3eg"
                        },
                        {
                            "vulnerability": "VCID-c1xg-s3kx-gkft"
                        },
                        {
                            "vulnerability": "VCID-dzdx-wae5-8ydy"
                        },
                        {
                            "vulnerability": "VCID-e3z2-ydhb-gqfg"
                        },
                        {
                            "vulnerability": "VCID-fj2p-7wkh-1fhq"
                        },
                        {
                            "vulnerability": "VCID-geaa-6dxx-tbcw"
                        },
                        {
                            "vulnerability": "VCID-jrxz-b168-7ug4"
                        },
                        {
                            "vulnerability": "VCID-js7k-ptm9-2yh1"
                        },
                        {
                            "vulnerability": "VCID-qbdk-hxhg-wbh4"
                        },
                        {
                            "vulnerability": "VCID-rg5d-st3d-nbah"
                        },
                        {
                            "vulnerability": "VCID-ujbp-cc1r-wfe9"
                        },
                        {
                            "vulnerability": "VCID-v3h9-1t69-v7a3"
                        },
                        {
                            "vulnerability": "VCID-xw8r-fn6y-mbhp"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/ansible@2.9.12"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/13340?format=api",
                    "purl": "pkg:pypi/ansible@2.10.0rc1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4yvf-k192-9fca"
                        },
                        {
                            "vulnerability": "VCID-682j-e2pu-1uee"
                        },
                        {
                            "vulnerability": "VCID-axc3-wcsk-q3eg"
                        },
                        {
                            "vulnerability": "VCID-c1xg-s3kx-gkft"
                        },
                        {
                            "vulnerability": "VCID-dzdx-wae5-8ydy"
                        },
                        {
                            "vulnerability": "VCID-e3z2-ydhb-gqfg"
                        },
                        {
                            "vulnerability": "VCID-qbdk-hxhg-wbh4"
                        },
                        {
                            "vulnerability": "VCID-rg5d-st3d-nbah"
                        },
                        {
                            "vulnerability": "VCID-ujbp-cc1r-wfe9"
                        },
                        {
                            "vulnerability": "VCID-v3h9-1t69-v7a3"
                        },
                        {
                            "vulnerability": "VCID-xw8r-fn6y-mbhp"
                        },
                        {
                            "vulnerability": "VCID-yeea-n94x-qqch"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/ansible@2.10.0rc1"
                }
            ],
            "aliases": [
                "CVE-2020-10744",
                "GHSA-vp9j-rghq-8jhh",
                "PYSEC-2020-208"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rdwq-93d6-c7b4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/6177?format=api",
            "vulnerability_id": "VCID-rg5d-st3d-nbah",
            "summary": "A flaw was found in Ansible Base when using the aws_ssm connection plugin as garbage collector is not happening after playbook run is completed. Files would remain in the bucket exposing the data. This issue affects directly data confidentiality.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25635.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25635.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25635",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25003",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25057",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25098",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25083",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25039",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25199",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2497",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25158",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25073",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25635"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25635",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25635"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible"
                },
                {
                    "reference_url": "https://github.com/ansible-collections/community.aws/issues/222",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible-collections/community.aws/issues/222"
                },
                {
                    "reference_url": "https://github.com/ansible-collections/community.aws/pull/237#issuecomment-1468591094",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible-collections/community.aws/pull/237#issuecomment-1468591094"
                },
                {
                    "reference_url": "https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2020-220.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2020-220.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1880275",
                    "reference_id": "1880275",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1880275"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25635",
                    "reference_id": "CVE-2020-25635",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25635"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-f556-49jc-4rvc",
                    "reference_id": "GHSA-f556-49jc-4rvc",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-f556-49jc-4rvc"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/13575?format=api",
                    "purl": "pkg:pypi/ansible@2.10.1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2jy6-eqpn-wbce"
                        },
                        {
                            "vulnerability": "VCID-4yvf-k192-9fca"
                        },
                        {
                            "vulnerability": "VCID-682j-e2pu-1uee"
                        },
                        {
                            "vulnerability": "VCID-axc3-wcsk-q3eg"
                        },
                        {
                            "vulnerability": "VCID-e3z2-ydhb-gqfg"
                        },
                        {
                            "vulnerability": "VCID-qbdk-hxhg-wbh4"
                        },
                        {
                            "vulnerability": "VCID-ujbp-cc1r-wfe9"
                        },
                        {
                            "vulnerability": "VCID-xw8r-fn6y-mbhp"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/ansible@2.10.1"
                }
            ],
            "aliases": [
                "CVE-2020-25635",
                "GHSA-f556-49jc-4rvc",
                "PYSEC-2020-220"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rg5d-st3d-nbah"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/20488?format=api",
            "vulnerability_id": "VCID-ujbp-cc1r-wfe9",
            "summary": "Ansible symlink attack vulnerability\nAn absolute path traversal attack exists in the Ansible automation platform. This flaw allows an attacker to craft a malicious Ansible role and make the victim execute the role. A symlink can be used to overwrite a file outside of the extraction path.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5701",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5701"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5758",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5758"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5115.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5115.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5115",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72353",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72376",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72388",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72404",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72381",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7233",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72335",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00716",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72369",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5115"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2233810",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2233810"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5115",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5115"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible/commit/1e930684bc0a76ec3d094cd326738ad26416541c",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible/commit/1e930684bc0a76ec3d094cd326738ad26416541c"
                },
                {
                    "reference_url": "https://github.com/ansible-community/ansible-build-data/blob/16d36538b96c65d9e0e28d89781361b69857ac0e/8/CHANGELOG-v8.rst#L221",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible-community/ansible-build-data/blob/16d36538b96c65d9e0e28d89781361b69857ac0e/8/CHANGELOG-v8.rst#L221"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00018.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00018.html"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053693",
                    "reference_id": "1053693",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053693"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2023-5115",
                    "reference_id": "CVE-2023-5115",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2023-5115"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5115",
                    "reference_id": "CVE-2023-5115",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5115"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-jpvw-p8pr-9g2x",
                    "reference_id": "GHSA-jpvw-p8pr-9g2x",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-jpvw-p8pr-9g2x"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/62082?format=api",
                    "purl": "pkg:pypi/ansible@8.5.0",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-qbdk-hxhg-wbh4"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/ansible@8.5.0"
                }
            ],
            "aliases": [
                "CVE-2023-5115",
                "GHSA-jpvw-p8pr-9g2x"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ujbp-cc1r-wfe9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/6141?format=api",
            "vulnerability_id": "VCID-v3h9-1t69-v7a3",
            "summary": "An Improper Output Neutralization for Logs flaw was found in Ansible when using the uri module, where sensitive data is exposed to content and json output. This flaw allows an attacker to access the logs or outputs of performed tasks to read keys used in playbooks from other users within the uri module. The highest threat from this vulnerability is to data confidentiality.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14330.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14330.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14330",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32894",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32919",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32957",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32955",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32878",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33048",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33015",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32884",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32925",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14330"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14330",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14330"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10156",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10156"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10206",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10206"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14846",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14846"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14864",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14864"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14904",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14904"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10684",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10684"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10685",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10685"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10729",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10729"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14330",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14330"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14332",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14332"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14365"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1733",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1733"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1735",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1735"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1739",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1739"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1740",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1740"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1746",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1746"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1753",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1753"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20228",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20228"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-785x-qw4v-6872",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-785x-qw4v-6872"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible/commit/e0f25a2b1f9e6c21f751ba0ed2dc2eee2152983e",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible/commit/e0f25a2b1f9e6c21f751ba0ed2dc2eee2152983e"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible/issues/68400",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible/issues/68400"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible/pull/69653",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible/pull/69653"
                },
                {
                    "reference_url": "https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2020-3.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2020-3.yaml"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14330",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14330"
                },
                {
                    "reference_url": "https://www.debian.org/security/2021/dsa-4950",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.debian.org/security/2021/dsa-4950"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856815",
                    "reference_id": "1856815",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856815"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3600",
                    "reference_id": "RHSA-2020:3600",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3600"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/13282?format=api",
                    "purl": "pkg:pypi/ansible@2.9.12",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4yvf-k192-9fca"
                        },
                        {
                            "vulnerability": "VCID-682j-e2pu-1uee"
                        },
                        {
                            "vulnerability": "VCID-atun-stks-4kcb"
                        },
                        {
                            "vulnerability": "VCID-axc3-wcsk-q3eg"
                        },
                        {
                            "vulnerability": "VCID-c1xg-s3kx-gkft"
                        },
                        {
                            "vulnerability": "VCID-dzdx-wae5-8ydy"
                        },
                        {
                            "vulnerability": "VCID-e3z2-ydhb-gqfg"
                        },
                        {
                            "vulnerability": "VCID-fj2p-7wkh-1fhq"
                        },
                        {
                            "vulnerability": "VCID-geaa-6dxx-tbcw"
                        },
                        {
                            "vulnerability": "VCID-jrxz-b168-7ug4"
                        },
                        {
                            "vulnerability": "VCID-js7k-ptm9-2yh1"
                        },
                        {
                            "vulnerability": "VCID-qbdk-hxhg-wbh4"
                        },
                        {
                            "vulnerability": "VCID-rg5d-st3d-nbah"
                        },
                        {
                            "vulnerability": "VCID-ujbp-cc1r-wfe9"
                        },
                        {
                            "vulnerability": "VCID-v3h9-1t69-v7a3"
                        },
                        {
                            "vulnerability": "VCID-xw8r-fn6y-mbhp"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/ansible@2.9.12"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/13341?format=api",
                    "purl": "pkg:pypi/ansible@2.10.0",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4yvf-k192-9fca"
                        },
                        {
                            "vulnerability": "VCID-682j-e2pu-1uee"
                        },
                        {
                            "vulnerability": "VCID-axc3-wcsk-q3eg"
                        },
                        {
                            "vulnerability": "VCID-c1xg-s3kx-gkft"
                        },
                        {
                            "vulnerability": "VCID-e3z2-ydhb-gqfg"
                        },
                        {
                            "vulnerability": "VCID-qbdk-hxhg-wbh4"
                        },
                        {
                            "vulnerability": "VCID-rg5d-st3d-nbah"
                        },
                        {
                            "vulnerability": "VCID-ujbp-cc1r-wfe9"
                        },
                        {
                            "vulnerability": "VCID-xw8r-fn6y-mbhp"
                        },
                        {
                            "vulnerability": "VCID-yeea-n94x-qqch"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/ansible@2.10.0"
                }
            ],
            "aliases": [
                "CVE-2020-14330",
                "GHSA-785x-qw4v-6872",
                "PYSEC-2020-3"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v3h9-1t69-v7a3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/6461?format=api",
            "vulnerability_id": "VCID-x94k-nxyd-27gs",
            "summary": "A flaw was found in the use of insufficiently random values in Ansible. Two random password lookups of the same length generate the equal value as the template caching action for the same file since no re-evaluation happens. The highest threat from this vulnerability would be that all passwords are exposed at once for the file. This flaw affects Ansible Engine versions before 2.9.6.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10729.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10729.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-10729",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23336",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2329",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2339",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23427",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23408",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23358",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23285",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23464",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23501",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-10729"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831089",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831089"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10156",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10156"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10206",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10206"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14846",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14846"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14864",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14864"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14904",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14904"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10684",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10684"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10685",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10685"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10729",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10729"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14330",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14330"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14332",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14332"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14365"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1733",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1733"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1735",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1735"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1739",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1739"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1740",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1740"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1746",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1746"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1753",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1753"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20228",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20228"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-r6h7-5pq2-j77h",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-r6h7-5pq2-j77h"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible/blob/v2.9.6/changelogs/CHANGELOG-v2.9.rst",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible/blob/v2.9.6/changelogs/CHANGELOG-v2.9.rst"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible/commit/c520d70bf4748c8ee6718a7d0d0254051ba1c2e9",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible/commit/c520d70bf4748c8ee6718a7d0d0254051ba1c2e9"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible/issues/34144",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible/issues/34144"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible/pull/67429",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible/pull/67429"
                },
                {
                    "reference_url": "https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2021-105.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2021-105.yaml"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10729",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10729"
                },
                {
                    "reference_url": "https://www.debian.org/security/2021/dsa-4950",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.debian.org/security/2021/dsa-4950"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7330-1/",
                    "reference_id": "USN-7330-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7330-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/10051?format=api",
                    "purl": "pkg:pypi/ansible@2.9.6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3jej-4jyp-cqbt"
                        },
                        {
                            "vulnerability": "VCID-4yvf-k192-9fca"
                        },
                        {
                            "vulnerability": "VCID-682j-e2pu-1uee"
                        },
                        {
                            "vulnerability": "VCID-atun-stks-4kcb"
                        },
                        {
                            "vulnerability": "VCID-axc3-wcsk-q3eg"
                        },
                        {
                            "vulnerability": "VCID-b8zs-br97-57av"
                        },
                        {
                            "vulnerability": "VCID-c1xg-s3kx-gkft"
                        },
                        {
                            "vulnerability": "VCID-d7ez-s7qb-p3ay"
                        },
                        {
                            "vulnerability": "VCID-dzdx-wae5-8ydy"
                        },
                        {
                            "vulnerability": "VCID-e3z2-ydhb-gqfg"
                        },
                        {
                            "vulnerability": "VCID-ezaq-tqd3-4yd1"
                        },
                        {
                            "vulnerability": "VCID-ezux-6buh-h7h7"
                        },
                        {
                            "vulnerability": "VCID-fj2p-7wkh-1fhq"
                        },
                        {
                            "vulnerability": "VCID-geaa-6dxx-tbcw"
                        },
                        {
                            "vulnerability": "VCID-h1n3-cmte-eugf"
                        },
                        {
                            "vulnerability": "VCID-hqar-fca3-cbht"
                        },
                        {
                            "vulnerability": "VCID-jrxz-b168-7ug4"
                        },
                        {
                            "vulnerability": "VCID-js7k-ptm9-2yh1"
                        },
                        {
                            "vulnerability": "VCID-qbdk-hxhg-wbh4"
                        },
                        {
                            "vulnerability": "VCID-rdwq-93d6-c7b4"
                        },
                        {
                            "vulnerability": "VCID-rg5d-st3d-nbah"
                        },
                        {
                            "vulnerability": "VCID-ujbp-cc1r-wfe9"
                        },
                        {
                            "vulnerability": "VCID-v3h9-1t69-v7a3"
                        },
                        {
                            "vulnerability": "VCID-whyk-3ynn-zyf4"
                        },
                        {
                            "vulnerability": "VCID-xg2f-12w4-yqge"
                        },
                        {
                            "vulnerability": "VCID-xw8r-fn6y-mbhp"
                        },
                        {
                            "vulnerability": "VCID-yeea-n94x-qqch"
                        },
                        {
                            "vulnerability": "VCID-yur3-am6j-w7ay"
                        },
                        {
                            "vulnerability": "VCID-zzzs-scbg-bbe9"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/ansible@2.9.6"
                }
            ],
            "aliases": [
                "CVE-2020-10729",
                "GHSA-r6h7-5pq2-j77h",
                "PYSEC-2021-105"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x94k-nxyd-27gs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/6459?format=api",
            "vulnerability_id": "VCID-xw8r-fn6y-mbhp",
            "summary": "A flaw was found in ansible. Credentials, such as secrets, are being disclosed in console log by default and not protected by no_log feature when using those modules. An attacker can take advantage of this information to steal those credentials. The highest threat from this vulnerability is to data confidentiality. Versions before ansible 2.9.18 are affected.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20191.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20191.json"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/cve-2021-20191",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/cve-2021-20191"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-20191",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11217",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11266",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1121",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11131",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11315",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11255",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11108",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11243",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11277",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-20191"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1916813",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1916813"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20191",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20191"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-8f4m-hccc-8qph",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-8f4m-hccc-8qph"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible/commit/cc82d986c40328d4ae81298a9d287c95a6326bb0",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible/commit/cc82d986c40328d4ae81298a9d287c95a6326bb0"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible/commit/d74a1b1d1325af2a24848044cf2858987f5a3ecc",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible/commit/d74a1b1d1325af2a24848044cf2858987f5a3ecc"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible/pull/73488",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible/pull/73488"
                },
                {
                    "reference_url": "https://github.com/ansible/ansible/pull/73489",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/ansible/ansible/pull/73489"
                },
                {
                    "reference_url": "https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2021-124.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2021-124.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00018.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00018.html"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20191",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20191"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985753",
                    "reference_id": "985753",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985753"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202102-9",
                    "reference_id": "ASA-202102-9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202102-9"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1437",
                    "reference_id": "AVG-1437",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1437"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0663",
                    "reference_id": "RHSA-2021:0663",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0663"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0664",
                    "reference_id": "RHSA-2021:0664",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0664"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1079",
                    "reference_id": "RHSA-2021:1079",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1079"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2180",
                    "reference_id": "RHSA-2021:2180",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2180"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/13290?format=api",
                    "purl": "pkg:pypi/ansible@2.8.19rc1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4yvf-k192-9fca"
                        },
                        {
                            "vulnerability": "VCID-682j-e2pu-1uee"
                        },
                        {
                            "vulnerability": "VCID-atun-stks-4kcb"
                        },
                        {
                            "vulnerability": "VCID-axc3-wcsk-q3eg"
                        },
                        {
                            "vulnerability": "VCID-c1xg-s3kx-gkft"
                        },
                        {
                            "vulnerability": "VCID-dzdx-wae5-8ydy"
                        },
                        {
                            "vulnerability": "VCID-e3z2-ydhb-gqfg"
                        },
                        {
                            "vulnerability": "VCID-fj2p-7wkh-1fhq"
                        },
                        {
                            "vulnerability": "VCID-geaa-6dxx-tbcw"
                        },
                        {
                            "vulnerability": "VCID-js7k-ptm9-2yh1"
                        },
                        {
                            "vulnerability": "VCID-qbdk-hxhg-wbh4"
                        },
                        {
                            "vulnerability": "VCID-rdwq-93d6-c7b4"
                        },
                        {
                            "vulnerability": "VCID-rg5d-st3d-nbah"
                        },
                        {
                            "vulnerability": "VCID-ujbp-cc1r-wfe9"
                        },
                        {
                            "vulnerability": "VCID-v3h9-1t69-v7a3"
                        },
                        {
                            "vulnerability": "VCID-x94k-nxyd-27gs"
                        },
                        {
                            "vulnerability": "VCID-xw8r-fn6y-mbhp"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/ansible@2.8.19rc1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/13291?format=api",
                    "purl": "pkg:pypi/ansible@2.8.19",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4yvf-k192-9fca"
                        },
                        {
                            "vulnerability": "VCID-682j-e2pu-1uee"
                        },
                        {
                            "vulnerability": "VCID-atun-stks-4kcb"
                        },
                        {
                            "vulnerability": "VCID-axc3-wcsk-q3eg"
                        },
                        {
                            "vulnerability": "VCID-c1xg-s3kx-gkft"
                        },
                        {
                            "vulnerability": "VCID-dzdx-wae5-8ydy"
                        },
                        {
                            "vulnerability": "VCID-e3z2-ydhb-gqfg"
                        },
                        {
                            "vulnerability": "VCID-fj2p-7wkh-1fhq"
                        },
                        {
                            "vulnerability": "VCID-geaa-6dxx-tbcw"
                        },
                        {
                            "vulnerability": "VCID-js7k-ptm9-2yh1"
                        },
                        {
                            "vulnerability": "VCID-qbdk-hxhg-wbh4"
                        },
                        {
                            "vulnerability": "VCID-rdwq-93d6-c7b4"
                        },
                        {
                            "vulnerability": "VCID-rg5d-st3d-nbah"
                        },
                        {
                            "vulnerability": "VCID-ujbp-cc1r-wfe9"
                        },
                        {
                            "vulnerability": "VCID-v3h9-1t69-v7a3"
                        },
                        {
                            "vulnerability": "VCID-x94k-nxyd-27gs"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/ansible@2.8.19"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/13309?format=api",
                    "purl": "pkg:pypi/ansible@2.9.18rc1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4yvf-k192-9fca"
                        },
                        {
                            "vulnerability": "VCID-682j-e2pu-1uee"
                        },
                        {
                            "vulnerability": "VCID-atun-stks-4kcb"
                        },
                        {
                            "vulnerability": "VCID-axc3-wcsk-q3eg"
                        },
                        {
                            "vulnerability": "VCID-c1xg-s3kx-gkft"
                        },
                        {
                            "vulnerability": "VCID-dzdx-wae5-8ydy"
                        },
                        {
                            "vulnerability": "VCID-e3z2-ydhb-gqfg"
                        },
                        {
                            "vulnerability": "VCID-fj2p-7wkh-1fhq"
                        },
                        {
                            "vulnerability": "VCID-geaa-6dxx-tbcw"
                        },
                        {
                            "vulnerability": "VCID-js7k-ptm9-2yh1"
                        },
                        {
                            "vulnerability": "VCID-qbdk-hxhg-wbh4"
                        },
                        {
                            "vulnerability": "VCID-rg5d-st3d-nbah"
                        },
                        {
                            "vulnerability": "VCID-ujbp-cc1r-wfe9"
                        },
                        {
                            "vulnerability": "VCID-v3h9-1t69-v7a3"
                        },
                        {
                            "vulnerability": "VCID-xw8r-fn6y-mbhp"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/ansible@2.9.18rc1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/13310?format=api",
                    "purl": "pkg:pypi/ansible@2.9.18",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4yvf-k192-9fca"
                        },
                        {
                            "vulnerability": "VCID-682j-e2pu-1uee"
                        },
                        {
                            "vulnerability": "VCID-axc3-wcsk-q3eg"
                        },
                        {
                            "vulnerability": "VCID-c1xg-s3kx-gkft"
                        },
                        {
                            "vulnerability": "VCID-dzdx-wae5-8ydy"
                        },
                        {
                            "vulnerability": "VCID-e3z2-ydhb-gqfg"
                        },
                        {
                            "vulnerability": "VCID-geaa-6dxx-tbcw"
                        },
                        {
                            "vulnerability": "VCID-qbdk-hxhg-wbh4"
                        },
                        {
                            "vulnerability": "VCID-rg5d-st3d-nbah"
                        },
                        {
                            "vulnerability": "VCID-ujbp-cc1r-wfe9"
                        },
                        {
                            "vulnerability": "VCID-v3h9-1t69-v7a3"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/ansible@2.9.18"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/17135?format=api",
                    "purl": "pkg:pypi/ansible@2.10.7",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4yvf-k192-9fca"
                        },
                        {
                            "vulnerability": "VCID-682j-e2pu-1uee"
                        },
                        {
                            "vulnerability": "VCID-axc3-wcsk-q3eg"
                        },
                        {
                            "vulnerability": "VCID-qbdk-hxhg-wbh4"
                        },
                        {
                            "vulnerability": "VCID-ujbp-cc1r-wfe9"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/ansible@2.10.7"
                }
            ],
            "aliases": [
                "CVE-2021-20191",
                "GHSA-8f4m-hccc-8qph",
                "PYSEC-2021-124"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xw8r-fn6y-mbhp"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "4.0",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/ansible@2.8.18rc1"
}