Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/app-admin/ansible@1.6.8
Typeebuild
Namespaceapp-admin
Nameansible
Version1.6.8
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.0.2.0-r1
Latest_non_vulnerable_version2.9.7
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-4b5u-b82x-zkc5
vulnerability_id VCID-4b5u-b82x-zkc5
summary Multiple argument injection vulnerabilities in Ansible before 1.6.7 allow remote attackers to execute arbitrary code by leveraging access to an Ansible managed host and providing a crafted fact, as demonstrated by a fact with (1) a trailing " src=" clause, (2) a trailing " temp=" clause, or (3) a trailing " validate=" clause accompanied by a shell command.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-4967
reference_id
reference_type
scores
0
value 0.04747
scoring_system epss
scoring_elements 0.89419
published_at 2026-04-08T12:55:00Z
1
value 0.04747
scoring_system epss
scoring_elements 0.89441
published_at 2026-04-16T12:55:00Z
2
value 0.04747
scoring_system epss
scoring_elements 0.89426
published_at 2026-04-13T12:55:00Z
3
value 0.04747
scoring_system epss
scoring_elements 0.8943
published_at 2026-04-12T12:55:00Z
4
value 0.04747
scoring_system epss
scoring_elements 0.89432
published_at 2026-04-11T12:55:00Z
5
value 0.04747
scoring_system epss
scoring_elements 0.89423
published_at 2026-04-09T12:55:00Z
6
value 0.04747
scoring_system epss
scoring_elements 0.89385
published_at 2026-04-01T12:55:00Z
7
value 0.04747
scoring_system epss
scoring_elements 0.8939
published_at 2026-04-02T12:55:00Z
8
value 0.04747
scoring_system epss
scoring_elements 0.89401
published_at 2026-04-04T12:55:00Z
9
value 0.04747
scoring_system epss
scoring_elements 0.89403
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-4967
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4967
2
reference_url https://github.com/ansible/ansible/commit/62a1295a3e08cb6c3e9f1b2a1e6e5dcaeab32527
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/ansible/ansible/commit/62a1295a3e08cb6c3e9f1b2a1e6e5dcaeab32527
3
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2020-205.yaml
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2020-205.yaml
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-4967
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-4967
5
reference_url http://www.ocert.org/advisories/ocert-2014-004.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://www.ocert.org/advisories/ocert-2014-004.html
6
reference_url https://github.com/advisories/GHSA-64cw-m57j-65xj
reference_id GHSA-64cw-m57j-65xj
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-64cw-m57j-65xj
7
reference_url https://security.gentoo.org/glsa/201411-09
reference_id GLSA-201411-09
reference_type
scores
url https://security.gentoo.org/glsa/201411-09
fixed_packages
0
url pkg:ebuild/app-admin/ansible@1.6.8
purl pkg:ebuild/app-admin/ansible@1.6.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-admin/ansible@1.6.8
aliases CVE-2014-4967, GHSA-64cw-m57j-65xj, PYSEC-2020-205
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4b5u-b82x-zkc5
1
url VCID-7sp5-368w-w3fd
vulnerability_id VCID-7sp5-368w-w3fd
summary The safe_eval function in Ansible before 1.6.4 does not properly restrict the code subset, which allows remote attackers to execute arbitrary code via crafted instructions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-4657.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4678.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4678.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-4678
reference_id
reference_type
scores
0
value 0.04731
scoring_system epss
scoring_elements 0.89413
published_at 2026-04-16T12:55:00Z
1
value 0.04731
scoring_system epss
scoring_elements 0.89402
published_at 2026-04-12T12:55:00Z
2
value 0.04731
scoring_system epss
scoring_elements 0.89357
published_at 2026-04-01T12:55:00Z
3
value 0.04731
scoring_system epss
scoring_elements 0.89363
published_at 2026-04-02T12:55:00Z
4
value 0.04731
scoring_system epss
scoring_elements 0.89374
published_at 2026-04-04T12:55:00Z
5
value 0.04731
scoring_system epss
scoring_elements 0.89376
published_at 2026-04-07T12:55:00Z
6
value 0.04731
scoring_system epss
scoring_elements 0.89393
published_at 2026-04-08T12:55:00Z
7
value 0.04731
scoring_system epss
scoring_elements 0.89405
published_at 2026-04-11T12:55:00Z
8
value 0.04731
scoring_system epss
scoring_elements 0.89397
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-4678
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4678
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4678
3
reference_url https://github.com/ansible/ansible/commit/5429b85b9f6c2e640074176f36ff05fd5e4d1916
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/ansible/ansible/commit/5429b85b9f6c2e640074176f36ff05fd5e4d1916
4
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2020-203.yaml
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2020-203.yaml
5
reference_url https://groups.google.com/forum/message/raw?msg=ansible-announce/ieV1vZvcTXU/5Q93ThkY9rIJ
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://groups.google.com/forum/message/raw?msg=ansible-announce/ieV1vZvcTXU/5Q93ThkY9rIJ
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-4678
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-4678
7
reference_url https://security-tracker.debian.org/tracker/CVE-2014-4678
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://security-tracker.debian.org/tracker/CVE-2014-4678
8
reference_url https://www.openwall.com/lists/oss-security/2014/06/26/30
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.openwall.com/lists/oss-security/2014/06/26/30
9
reference_url https://www.openwall.com/lists/oss-security/2014/07/02/2
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.openwall.com/lists/oss-security/2014/07/02/2
10
reference_url https://www.rapid7.com/db/vulnerabilities/freebsd-vid-2c493ac8-205e-11e5-a4a5-002590263bf5
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.rapid7.com/db/vulnerabilities/freebsd-vid-2c493ac8-205e-11e5-a4a5-002590263bf5
11
reference_url https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2014-4678
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2014-4678
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1828684
reference_id 1828684
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1828684
13
reference_url https://github.com/advisories/GHSA-66c7-5pwv-mm3j
reference_id GHSA-66c7-5pwv-mm3j
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-66c7-5pwv-mm3j
14
reference_url https://security.gentoo.org/glsa/201411-09
reference_id GLSA-201411-09
reference_type
scores
url https://security.gentoo.org/glsa/201411-09
fixed_packages
0
url pkg:ebuild/app-admin/ansible@1.6.8
purl pkg:ebuild/app-admin/ansible@1.6.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-admin/ansible@1.6.8
aliases CVE-2014-4678, GHSA-66c7-5pwv-mm3j, PYSEC-2020-203
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7sp5-368w-w3fd
2
url VCID-8pn7-4k42-6qeb
vulnerability_id VCID-8pn7-4k42-6qeb
summary Ansible before 1.6.7 does not prevent inventory data with "{{" and "lookup" substrings, and does not prevent remote data with "{{" substrings, which allows remote attackers to execute arbitrary code via (1) crafted lookup('pipe') calls or (2) crafted Jinja2 data.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-4966
reference_id
reference_type
scores
0
value 0.04747
scoring_system epss
scoring_elements 0.8939
published_at 2026-04-02T12:55:00Z
1
value 0.04747
scoring_system epss
scoring_elements 0.89441
published_at 2026-04-16T12:55:00Z
2
value 0.04747
scoring_system epss
scoring_elements 0.89426
published_at 2026-04-13T12:55:00Z
3
value 0.04747
scoring_system epss
scoring_elements 0.8943
published_at 2026-04-12T12:55:00Z
4
value 0.04747
scoring_system epss
scoring_elements 0.89432
published_at 2026-04-11T12:55:00Z
5
value 0.04747
scoring_system epss
scoring_elements 0.89423
published_at 2026-04-09T12:55:00Z
6
value 0.04747
scoring_system epss
scoring_elements 0.89419
published_at 2026-04-08T12:55:00Z
7
value 0.04747
scoring_system epss
scoring_elements 0.89403
published_at 2026-04-07T12:55:00Z
8
value 0.04747
scoring_system epss
scoring_elements 0.89401
published_at 2026-04-04T12:55:00Z
9
value 0.04747
scoring_system epss
scoring_elements 0.89385
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-4966
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4966
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4966
2
reference_url https://github.com/ansible/ansible/commit/62a1295a3e08cb6c3e9f1b2a1e6e5dcaeab32527
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/ansible/ansible/commit/62a1295a3e08cb6c3e9f1b2a1e6e5dcaeab32527
3
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2020-204.yaml
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2020-204.yaml
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-4966
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-4966
5
reference_url http://www.ocert.org/advisories/ocert-2014-004.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://www.ocert.org/advisories/ocert-2014-004.html
6
reference_url https://github.com/advisories/GHSA-wqq5-c89p-3wc3
reference_id GHSA-wqq5-c89p-3wc3
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-wqq5-c89p-3wc3
7
reference_url https://security.gentoo.org/glsa/201411-09
reference_id GLSA-201411-09
reference_type
scores
url https://security.gentoo.org/glsa/201411-09
fixed_packages
0
url pkg:ebuild/app-admin/ansible@1.6.8
purl pkg:ebuild/app-admin/ansible@1.6.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-admin/ansible@1.6.8
aliases CVE-2014-4966, GHSA-wqq5-c89p-3wc3, PYSEC-2020-204
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8pn7-4k42-6qeb
3
url VCID-vdyk-rcxz-z7an
vulnerability_id VCID-vdyk-rcxz-z7an
summary The safe_eval function in Ansible before 1.5.4 does not properly restrict the code subset, which allows remote attackers to execute arbitrary code via crafted instructions.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4657.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4657.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-4657
reference_id
reference_type
scores
0
value 0.02239
scoring_system epss
scoring_elements 0.84479
published_at 2026-04-01T12:55:00Z
1
value 0.02239
scoring_system epss
scoring_elements 0.84518
published_at 2026-04-07T12:55:00Z
2
value 0.02239
scoring_system epss
scoring_elements 0.84516
published_at 2026-04-04T12:55:00Z
3
value 0.02239
scoring_system epss
scoring_elements 0.84494
published_at 2026-04-02T12:55:00Z
4
value 0.02239
scoring_system epss
scoring_elements 0.84575
published_at 2026-04-16T12:55:00Z
5
value 0.02239
scoring_system epss
scoring_elements 0.84555
published_at 2026-04-13T12:55:00Z
6
value 0.02239
scoring_system epss
scoring_elements 0.84559
published_at 2026-04-12T12:55:00Z
7
value 0.02239
scoring_system epss
scoring_elements 0.84564
published_at 2026-04-11T12:55:00Z
8
value 0.02239
scoring_system epss
scoring_elements 0.84545
published_at 2026-04-09T12:55:00Z
9
value 0.02239
scoring_system epss
scoring_elements 0.8454
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-4657
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4657
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4657
3
reference_url https://github.com/ansible/ansible
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/ansible/ansible
4
reference_url https://github.com/ansible/ansible/blob/release1.5.5/CHANGELOG.md
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/ansible/ansible/blob/release1.5.5/CHANGELOG.md
5
reference_url https://github.com/ansible/ansible/commit/998793fd0ab55705d57527a38cee5e83f535974c
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/ansible/ansible/commit/998793fd0ab55705d57527a38cee5e83f535974c
6
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2020-199.yaml
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2020-199.yaml
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-4657
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-4657
8
reference_url https://web.archive.org/web/20210120133852/https://www.securityfocus.com/bid/68232
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20210120133852/https://www.securityfocus.com/bid/68232
9
reference_url https://www.securityfocus.com/bid/68232
reference_id
reference_type
scores
url https://www.securityfocus.com/bid/68232
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1831263
reference_id 1831263
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1831263
11
reference_url https://github.com/advisories/GHSA-qg47-5px9-32g7
reference_id GHSA-qg47-5px9-32g7
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-qg47-5px9-32g7
12
reference_url https://security.gentoo.org/glsa/201411-09
reference_id GLSA-201411-09
reference_type
scores
url https://security.gentoo.org/glsa/201411-09
fixed_packages
0
url pkg:ebuild/app-admin/ansible@1.6.8
purl pkg:ebuild/app-admin/ansible@1.6.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-admin/ansible@1.6.8
aliases CVE-2014-4657, GHSA-qg47-5px9-32g7, PYSEC-2020-199
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vdyk-rcxz-z7an
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/app-admin/ansible@1.6.8