Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-2jy6-eqpn-wbce
SummaryA flaw was found in Ansible Base when using the aws_ssm connection plugin as there is no namespace separation for file transfers. Files are written directly to the root bucket, making possible to have collisions when running multiple ansible processes. This issue affects mainly the service availability.
Aliases
0
alias CVE-2020-25636
1
alias PYSEC-2020-221
Fixed_packages
0
url pkg:deb/debian/ansible@0?distro=trixie
purl pkg:deb/debian/ansible@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@0%3Fdistro=trixie
1
url pkg:deb/debian/ansible@2.10.7%2Bmerged%2Bbase%2B2.10.17%2Bdfsg-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/ansible@2.10.7%2Bmerged%2Bbase%2B2.10.17%2Bdfsg-0%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@2.10.7%252Bmerged%252Bbase%252B2.10.17%252Bdfsg-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/ansible@7.7.0%2Bdfsg-3%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/ansible@7.7.0%2Bdfsg-3%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@7.7.0%252Bdfsg-3%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/ansible@12.0.0%2Bdfsg-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/ansible@12.0.0%2Bdfsg-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@12.0.0%252Bdfsg-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/ansible@13.4.0%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/ansible@13.4.0%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ansible@13.4.0%252Bdfsg-1%3Fdistro=trixie
Affected_packages
0
url pkg:pypi/ansible@2.10.1
purl pkg:pypi/ansible@2.10.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2jy6-eqpn-wbce
1
vulnerability VCID-4yvf-k192-9fca
2
vulnerability VCID-682j-e2pu-1uee
3
vulnerability VCID-axc3-wcsk-q3eg
4
vulnerability VCID-e3z2-ydhb-gqfg
5
vulnerability VCID-qbdk-hxhg-wbh4
6
vulnerability VCID-ujbp-cc1r-wfe9
7
vulnerability VCID-xw8r-fn6y-mbhp
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/ansible@2.10.1
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25636.json
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25636.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-25636
reference_id
reference_type
scores
0
value 0.0012
scoring_system epss
scoring_elements 0.30944
published_at 2026-04-16T12:55:00Z
1
value 0.00129
scoring_system epss
scoring_elements 0.3237
published_at 2026-04-02T12:55:00Z
2
value 0.00129
scoring_system epss
scoring_elements 0.32407
published_at 2026-04-04T12:55:00Z
3
value 0.00129
scoring_system epss
scoring_elements 0.32232
published_at 2026-04-07T12:55:00Z
4
value 0.00129
scoring_system epss
scoring_elements 0.32281
published_at 2026-04-08T12:55:00Z
5
value 0.00129
scoring_system epss
scoring_elements 0.3231
published_at 2026-04-09T12:55:00Z
6
value 0.00129
scoring_system epss
scoring_elements 0.32311
published_at 2026-04-11T12:55:00Z
7
value 0.00129
scoring_system epss
scoring_elements 0.32273
published_at 2026-04-12T12:55:00Z
8
value 0.00129
scoring_system epss
scoring_elements 0.32242
published_at 2026-04-13T12:55:00Z
9
value 0.00129
scoring_system epss
scoring_elements 0.32235
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-25636
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25636
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25636
3
reference_url https://github.com/ansible-collections/community.aws/issues/221
reference_id
reference_type
scores
url https://github.com/ansible-collections/community.aws/issues/221
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1880274
reference_id 1880274
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1880274
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-25636
reference_id CVE-2020-25636
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2020-25636
Weaknesses
0
cwe_id 820
name Missing Synchronization
description The product utilizes a shared resource in a concurrent manner but does not attempt to synchronize access to the resource.
1
cwe_id 1035
name OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017.
2
cwe_id 552
name Files or Directories Accessible to External Parties
description The product makes files or directories accessible to unauthorized actors, even though they should not be.
3
cwe_id 937
name OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013.
Exploits
Severity_range_score6.6 - 6.6
Exploitability0.5
Weighted_severity5.9
Risk_score3.0
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-2jy6-eqpn-wbce