Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/ansible@1.6.8%2Bdfsg-1?distro=trixie
Typedeb
Namespacedebian
Nameansible
Version1.6.8+dfsg-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1.7.0+dfsg-1
Latest_non_vulnerable_version13.4.0+dfsg-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-4b5u-b82x-zkc5
vulnerability_id VCID-4b5u-b82x-zkc5
summary Multiple argument injection vulnerabilities in Ansible before 1.6.7 allow remote attackers to execute arbitrary code by leveraging access to an Ansible managed host and providing a crafted fact, as demonstrated by a fact with (1) a trailing " src=" clause, (2) a trailing " temp=" clause, or (3) a trailing " validate=" clause accompanied by a shell command.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-4967
reference_id
reference_type
scores
0
value 0.04747
scoring_system epss
scoring_elements 0.8944
published_at 2026-04-21T12:55:00Z
1
value 0.04747
scoring_system epss
scoring_elements 0.89385
published_at 2026-04-01T12:55:00Z
2
value 0.04747
scoring_system epss
scoring_elements 0.8939
published_at 2026-04-02T12:55:00Z
3
value 0.04747
scoring_system epss
scoring_elements 0.89401
published_at 2026-04-04T12:55:00Z
4
value 0.04747
scoring_system epss
scoring_elements 0.89403
published_at 2026-04-07T12:55:00Z
5
value 0.04747
scoring_system epss
scoring_elements 0.89419
published_at 2026-04-08T12:55:00Z
6
value 0.04747
scoring_system epss
scoring_elements 0.89423
published_at 2026-04-09T12:55:00Z
7
value 0.04747
scoring_system epss
scoring_elements 0.89432
published_at 2026-04-11T12:55:00Z
8
value 0.04747
scoring_system epss
scoring_elements 0.8943
published_at 2026-04-12T12:55:00Z
9
value 0.04747
scoring_system epss
scoring_elements 0.89426
published_at 2026-04-13T12:55:00Z
10
value 0.04747
scoring_system epss
scoring_elements 0.89441
published_at 2026-04-16T12:55:00Z
11
value 0.04747
scoring_system epss
scoring_elements 0.89442
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-4967
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4967
2
reference_url https://github.com/ansible/ansible/commit/62a1295a3e08cb6c3e9f1b2a1e6e5dcaeab32527
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/ansible/ansible/commit/62a1295a3e08cb6c3e9f1b2a1e6e5dcaeab32527
3
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2020-205.yaml
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2020-205.yaml
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-4967
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-4967
5
reference_url http://www.ocert.org/advisories/ocert-2014-004.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://www.ocert.org/advisories/ocert-2014-004.html
6
reference_url https://github.com/advisories/GHSA-64cw-m57j-65xj
reference_id GHSA-64cw-m57j-65xj
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-64cw-m57j-65xj
7
reference_url https://security.gentoo.org/glsa/201411-09
reference_id GLSA-201411-09
reference_type
scores
url https://security.gentoo.org/glsa/201411-09
fixed_packages
0
url pkg:deb/debian/ansible@1.6.8%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/ansible@1.6.8%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@1.6.8%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/ansible@2.10.7%2Bmerged%2Bbase%2B2.10.17%2Bdfsg-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/ansible@2.10.7%2Bmerged%2Bbase%2B2.10.17%2Bdfsg-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@2.10.7%252Bmerged%252Bbase%252B2.10.17%252Bdfsg-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/ansible@7.7.0%2Bdfsg-3%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/ansible@7.7.0%2Bdfsg-3%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@7.7.0%252Bdfsg-3%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/ansible@12.0.0%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/ansible@12.0.0%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@12.0.0%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/ansible@13.4.0%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/ansible@13.4.0%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@13.4.0%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2014-4967, GHSA-64cw-m57j-65xj, PYSEC-2020-205
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4b5u-b82x-zkc5
1
url VCID-8pn7-4k42-6qeb
vulnerability_id VCID-8pn7-4k42-6qeb
summary Ansible before 1.6.7 does not prevent inventory data with "{{" and "lookup" substrings, and does not prevent remote data with "{{" substrings, which allows remote attackers to execute arbitrary code via (1) crafted lookup('pipe') calls or (2) crafted Jinja2 data.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-4966
reference_id
reference_type
scores
0
value 0.04747
scoring_system epss
scoring_elements 0.8944
published_at 2026-04-21T12:55:00Z
1
value 0.04747
scoring_system epss
scoring_elements 0.89385
published_at 2026-04-01T12:55:00Z
2
value 0.04747
scoring_system epss
scoring_elements 0.8939
published_at 2026-04-02T12:55:00Z
3
value 0.04747
scoring_system epss
scoring_elements 0.89401
published_at 2026-04-04T12:55:00Z
4
value 0.04747
scoring_system epss
scoring_elements 0.89403
published_at 2026-04-07T12:55:00Z
5
value 0.04747
scoring_system epss
scoring_elements 0.89419
published_at 2026-04-08T12:55:00Z
6
value 0.04747
scoring_system epss
scoring_elements 0.89423
published_at 2026-04-09T12:55:00Z
7
value 0.04747
scoring_system epss
scoring_elements 0.89432
published_at 2026-04-11T12:55:00Z
8
value 0.04747
scoring_system epss
scoring_elements 0.8943
published_at 2026-04-12T12:55:00Z
9
value 0.04747
scoring_system epss
scoring_elements 0.89426
published_at 2026-04-13T12:55:00Z
10
value 0.04747
scoring_system epss
scoring_elements 0.89441
published_at 2026-04-16T12:55:00Z
11
value 0.04747
scoring_system epss
scoring_elements 0.89442
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-4966
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4966
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4966
2
reference_url https://github.com/ansible/ansible/commit/62a1295a3e08cb6c3e9f1b2a1e6e5dcaeab32527
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/ansible/ansible/commit/62a1295a3e08cb6c3e9f1b2a1e6e5dcaeab32527
3
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2020-204.yaml
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2020-204.yaml
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-4966
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-4966
5
reference_url http://www.ocert.org/advisories/ocert-2014-004.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://www.ocert.org/advisories/ocert-2014-004.html
6
reference_url https://github.com/advisories/GHSA-wqq5-c89p-3wc3
reference_id GHSA-wqq5-c89p-3wc3
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-wqq5-c89p-3wc3
7
reference_url https://security.gentoo.org/glsa/201411-09
reference_id GLSA-201411-09
reference_type
scores
url https://security.gentoo.org/glsa/201411-09
fixed_packages
0
url pkg:deb/debian/ansible@1.6.8%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/ansible@1.6.8%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@1.6.8%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/ansible@2.10.7%2Bmerged%2Bbase%2B2.10.17%2Bdfsg-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/ansible@2.10.7%2Bmerged%2Bbase%2B2.10.17%2Bdfsg-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@2.10.7%252Bmerged%252Bbase%252B2.10.17%252Bdfsg-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/ansible@7.7.0%2Bdfsg-3%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/ansible@7.7.0%2Bdfsg-3%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@7.7.0%252Bdfsg-3%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/ansible@12.0.0%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/ansible@12.0.0%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@12.0.0%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/ansible@13.4.0%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/ansible@13.4.0%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@13.4.0%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2014-4966, GHSA-wqq5-c89p-3wc3, PYSEC-2020-204
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8pn7-4k42-6qeb
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@1.6.8%252Bdfsg-1%3Fdistro=trixie