Lookup for vulnerable packages by Package URL.

Purlpkg:alpm/archlinux/ansible@3.1.0-1
Typealpm
Namespacearchlinux
Nameansible
Version3.1.0-1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-rsry-fw45-9yev
vulnerability_id VCID-rsry-fw45-9yev
summary A flaw was found in several ansible modules, where parameters containing credentials, such as secrets, were being logged in plain-text on managed nodes, as well as being made visible on the controller node when run in verbose mode. These parameters were not protected by the no_log feature. An attacker can take advantage of this information to steal those credentials, provided when they have access to the log files containing them. The highest threat from this vulnerability is to data confidentiality. This flaw affects Red Hat Ansible Automation Platform in versions before 1.2.2 and Ansible Tower in versions before 3.8.2.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3447.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3447.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3447
reference_id
reference_type
scores
0
value 0.00072
scoring_system epss
scoring_elements 0.21842
published_at 2026-04-01T12:55:00Z
1
value 0.00072
scoring_system epss
scoring_elements 0.21879
published_at 2026-04-18T12:55:00Z
2
value 0.00072
scoring_system epss
scoring_elements 0.2187
published_at 2026-04-13T12:55:00Z
3
value 0.00072
scoring_system epss
scoring_elements 0.21872
published_at 2026-04-16T12:55:00Z
4
value 0.00072
scoring_system epss
scoring_elements 0.22007
published_at 2026-04-02T12:55:00Z
5
value 0.00072
scoring_system epss
scoring_elements 0.22059
published_at 2026-04-04T12:55:00Z
6
value 0.00072
scoring_system epss
scoring_elements 0.21824
published_at 2026-04-07T12:55:00Z
7
value 0.00072
scoring_system epss
scoring_elements 0.21899
published_at 2026-04-08T12:55:00Z
8
value 0.00072
scoring_system epss
scoring_elements 0.21955
published_at 2026-04-09T12:55:00Z
9
value 0.00072
scoring_system epss
scoring_elements 0.21967
published_at 2026-04-11T12:55:00Z
10
value 0.00072
scoring_system epss
scoring_elements 0.21926
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3447
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1939349
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1939349
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3447
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3447
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MS4VPUYVLGSAKOX26IT52BSMEZRZ3KS/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MS4VPUYVLGSAKOX26IT52BSMEZRZ3KS/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JBZ75MAMVQVZROPYHMRDQKPPVASP63DG/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JBZ75MAMVQVZROPYHMRDQKPPVASP63DG/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RUTGO4RS4ZXZSPBU2CHVPT75IAFVTTL3/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RUTGO4RS4ZXZSPBU2CHVPT75IAFVTTL3/
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014721
reference_id 1014721
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014721
9
reference_url https://security.archlinux.org/AVG-1702
reference_id AVG-1702
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1702
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-3447
reference_id CVE-2021-3447
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2021-3447
11
reference_url https://access.redhat.com/errata/RHSA-2021:1079
reference_id RHSA-2021:1079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1079
12
reference_url https://access.redhat.com/errata/RHSA-2021:1342
reference_id RHSA-2021:1342
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1342
13
reference_url https://access.redhat.com/errata/RHSA-2021:1343
reference_id RHSA-2021:1343
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1343
14
reference_url https://access.redhat.com/errata/RHSA-2021:2736
reference_id RHSA-2021:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2736
15
reference_url https://access.redhat.com/errata/RHSA-2021:2866
reference_id RHSA-2021:2866
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2866
fixed_packages
aliases CVE-2021-3447, PYSEC-2021-107
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rsry-fw45-9yev
Fixing_vulnerabilities
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/ansible@3.1.0-1