Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/ansible@1.3.4%2Bdfsg-1?distro=trixie
Typedeb
Namespacedebian
Nameansible
Version1.3.4+dfsg-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1.5.4+dfsg-1
Latest_non_vulnerable_version13.4.0+dfsg-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-2v57-zem6-47hq
vulnerability_id VCID-2v57-zem6-47hq
summary runner/connection_plugins/ssh.py in Ansible before 1.2.3, when using ControlPersist, allows local users to redirect a ssh session via a symlink attack on a socket file with a predictable name in /tmp/.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4259
reference_id
reference_type
scores
0
value 0.00051
scoring_system epss
scoring_elements 0.15855
published_at 2026-04-02T12:55:00Z
1
value 0.00051
scoring_system epss
scoring_elements 0.15729
published_at 2026-04-24T12:55:00Z
2
value 0.00051
scoring_system epss
scoring_elements 0.15713
published_at 2026-04-21T12:55:00Z
3
value 0.00051
scoring_system epss
scoring_elements 0.15666
published_at 2026-04-18T12:55:00Z
4
value 0.00051
scoring_system epss
scoring_elements 0.15842
published_at 2026-04-11T12:55:00Z
5
value 0.00051
scoring_system epss
scoring_elements 0.15865
published_at 2026-04-09T12:55:00Z
6
value 0.00051
scoring_system epss
scoring_elements 0.15804
published_at 2026-04-08T12:55:00Z
7
value 0.00051
scoring_system epss
scoring_elements 0.15719
published_at 2026-04-07T12:55:00Z
8
value 0.00051
scoring_system epss
scoring_elements 0.15919
published_at 2026-04-04T12:55:00Z
9
value 0.00051
scoring_system epss
scoring_elements 0.15789
published_at 2026-04-01T12:55:00Z
10
value 0.00051
scoring_system epss
scoring_elements 0.15657
published_at 2026-04-16T12:55:00Z
11
value 0.00051
scoring_system epss
scoring_elements 0.15735
published_at 2026-04-13T12:55:00Z
12
value 0.00051
scoring_system epss
scoring_elements 0.15805
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4259
1
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=998223
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value 2.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
2
value LOW
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=998223
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4259
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4259
3
reference_url https://github.com/ansible/ansible
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value 2.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
2
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/ansible/ansible
4
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2013-1.yaml
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value 2.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
2
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2013-1.yaml
5
reference_url https://groups.google.com/forum/#%21topic/ansible-project/UVDYW0HGcNg
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value 2.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
2
value LOW
scoring_system generic_textual
scoring_elements
url https://groups.google.com/forum/#%21topic/ansible-project/UVDYW0HGcNg
6
reference_url https://groups.google.com/forum/#!topic/ansible-project/UVDYW0HGcNg
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value 2.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
2
value LOW
scoring_system generic_textual
scoring_elements
url https://groups.google.com/forum/#!topic/ansible-project/UVDYW0HGcNg
7
reference_url http://www.ansible.com/security
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value 2.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
2
value LOW
scoring_system generic_textual
scoring_elements
url http://www.ansible.com/security
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=721766
reference_id 721766
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=721766
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-4259
reference_id CVE-2013-4259
reference_type
scores
0
value 4.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value 2.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
2
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2013-4259
10
reference_url https://github.com/advisories/GHSA-fj24-ghp9-39v3
reference_id GHSA-fj24-ghp9-39v3
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-fj24-ghp9-39v3
fixed_packages
0
url pkg:deb/debian/ansible@1.3.4%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/ansible@1.3.4%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@1.3.4%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/ansible@2.10.7%2Bmerged%2Bbase%2B2.10.17%2Bdfsg-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/ansible@2.10.7%2Bmerged%2Bbase%2B2.10.17%2Bdfsg-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@2.10.7%252Bmerged%252Bbase%252B2.10.17%252Bdfsg-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/ansible@7.7.0%2Bdfsg-3%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/ansible@7.7.0%2Bdfsg-3%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@7.7.0%252Bdfsg-3%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/ansible@12.0.0%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/ansible@12.0.0%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@12.0.0%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/ansible@13.4.0%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/ansible@13.4.0%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@13.4.0%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2013-4259, GHSA-fj24-ghp9-39v3, PYSEC-2013-1
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2v57-zem6-47hq
1
url VCID-b2r5-fb4m-jbcr
vulnerability_id VCID-b2r5-fb4m-jbcr
summary Ansible before 1.2.1 makes it easier for remote attackers to conduct man-in-the-middle attacks by leveraging failure to cache SSH host keys.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2233
reference_id
reference_type
scores
0
value 0.0035
scoring_system epss
scoring_elements 0.57525
published_at 2026-04-09T12:55:00Z
1
value 0.0035
scoring_system epss
scoring_elements 0.57459
published_at 2026-04-24T12:55:00Z
2
value 0.0035
scoring_system epss
scoring_elements 0.57501
published_at 2026-04-21T12:55:00Z
3
value 0.0035
scoring_system epss
scoring_elements 0.57526
published_at 2026-04-16T12:55:00Z
4
value 0.0035
scoring_system epss
scoring_elements 0.57499
published_at 2026-04-13T12:55:00Z
5
value 0.0035
scoring_system epss
scoring_elements 0.57518
published_at 2026-04-12T12:55:00Z
6
value 0.0035
scoring_system epss
scoring_elements 0.57541
published_at 2026-04-11T12:55:00Z
7
value 0.0035
scoring_system epss
scoring_elements 0.57492
published_at 2026-04-04T12:55:00Z
8
value 0.0035
scoring_system epss
scoring_elements 0.57469
published_at 2026-04-07T12:55:00Z
9
value 0.0035
scoring_system epss
scoring_elements 0.57522
published_at 2026-04-18T12:55:00Z
10
value 0.0035
scoring_system epss
scoring_elements 0.57388
published_at 2026-04-01T12:55:00Z
11
value 0.0035
scoring_system epss
scoring_elements 0.57471
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2233
1
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=980821
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value 9.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=980821
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2233
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2233
3
reference_url https://github.com/advisories/GHSA-9x6q-5423-w5v9
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
2
value 9.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
3
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/advisories/GHSA-9x6q-5423-w5v9
4
reference_url https://github.com/ansible/ansible
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value 9.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/ansible/ansible
5
reference_url https://github.com/ansible/ansible/issues/857
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value 9.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/ansible/ansible/issues/857
6
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2018-36.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value 9.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2018-36.yaml
7
reference_url https://www.ansible.com/security
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value 9.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.ansible.com/security
8
reference_url http://www.openwall.com/lists/oss-security/2013/07/01/2
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value 9.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2013/07/01/2
9
reference_url http://www.openwall.com/lists/oss-security/2013/07/02/6
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value 9.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2013/07/02/6
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=714822
reference_id 714822
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=714822
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-2233
reference_id CVE-2013-2233
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
1
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
2
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
3
value 9.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
4
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2013-2233
fixed_packages
0
url pkg:deb/debian/ansible@1.3.4%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/ansible@1.3.4%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@1.3.4%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/ansible@2.10.7%2Bmerged%2Bbase%2B2.10.17%2Bdfsg-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/ansible@2.10.7%2Bmerged%2Bbase%2B2.10.17%2Bdfsg-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@2.10.7%252Bmerged%252Bbase%252B2.10.17%252Bdfsg-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/ansible@7.7.0%2Bdfsg-3%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/ansible@7.7.0%2Bdfsg-3%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@7.7.0%252Bdfsg-3%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/ansible@12.0.0%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/ansible@12.0.0%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@12.0.0%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/ansible@13.4.0%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/ansible@13.4.0%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@13.4.0%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2013-2233, GHSA-9x6q-5423-w5v9, PYSEC-2018-36
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b2r5-fb4m-jbcr
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@1.3.4%252Bdfsg-1%3Fdistro=trixie