{"url":"http://public2.vulnerablecode.io/api/packages/77902?format=json","purl":"pkg:ebuild/app-admin/ansible@1.6.8","type":"ebuild","namespace":"app-admin","name":"ansible","version":"1.6.8","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"2.0.2.0-r1","latest_non_vulnerable_version":"2.9.7","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/6032?format=json","vulnerability_id":"VCID-4b5u-b82x-zkc5","summary":"Multiple argument injection vulnerabilities in Ansible before 1.6.7 allow remote attackers to execute arbitrary code by leveraging access to an Ansible managed host and providing a crafted fact, as demonstrated by a fact with (1) a trailing \" src=\" clause, (2) a trailing \" temp=\" clause, or (3) a trailing \" validate=\" clause accompanied by a shell command.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-4967","reference_id":"","reference_type":"","scores":[{"value":"0.04747","scoring_system":"epss","scoring_elements":"0.89419","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04747","scoring_system":"epss","scoring_elements":"0.89441","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04747","scoring_system":"epss","scoring_elements":"0.89426","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04747","scoring_system":"epss","scoring_elements":"0.8943","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04747","scoring_system":"epss","scoring_elements":"0.89432","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04747","scoring_system":"epss","scoring_elements":"0.89423","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04747","scoring_system":"epss","scoring_elements":"0.89385","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04747","scoring_system":"epss","scoring_elements":"0.8939","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04747","scoring_system":"epss","scoring_elements":"0.89401","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04747","scoring_system":"epss","scoring_elements":"0.89403","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-4967"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4967","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4967"},{"reference_url":"https://github.com/ansible/ansible/commit/62a1295a3e08cb6c3e9f1b2a1e6e5dcaeab32527","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"9.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/ansible/ansible/commit/62a1295a3e08cb6c3e9f1b2a1e6e5dcaeab32527"},{"reference_url":"https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2020-205.yaml","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"9.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2020-205.yaml"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-4967","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"9.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-4967"},{"reference_url":"http://www.ocert.org/advisories/ocert-2014-004.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"9.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.ocert.org/advisories/ocert-2014-004.html"},{"reference_url":"https://github.com/advisories/GHSA-64cw-m57j-65xj","reference_id":"GHSA-64cw-m57j-65xj","reference_type":"","scores":[{"value":"CRITICAL","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-64cw-m57j-65xj"},{"reference_url":"https://security.gentoo.org/glsa/201411-09","reference_id":"GLSA-201411-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201411-09"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77902?format=json","purl":"pkg:ebuild/app-admin/ansible@1.6.8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-admin/ansible@1.6.8"}],"aliases":["CVE-2014-4967","GHSA-64cw-m57j-65xj","PYSEC-2020-205"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4b5u-b82x-zkc5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/6035?format=json","vulnerability_id":"VCID-7sp5-368w-w3fd","summary":"The safe_eval function in Ansible before 1.6.4 does not properly restrict the code subset, which allows remote attackers to execute arbitrary code via crafted instructions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-4657.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4678.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4678.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-4678","reference_id":"","reference_type":"","scores":[{"value":"0.04731","scoring_system":"epss","scoring_elements":"0.89413","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04731","scoring_system":"epss","scoring_elements":"0.89402","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04731","scoring_system":"epss","scoring_elements":"0.89357","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04731","scoring_system":"epss","scoring_elements":"0.89363","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04731","scoring_system":"epss","scoring_elements":"0.89374","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04731","scoring_system":"epss","scoring_elements":"0.89376","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04731","scoring_system":"epss","scoring_elements":"0.89393","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04731","scoring_system":"epss","scoring_elements":"0.89405","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04731","scoring_system":"epss","scoring_elements":"0.89397","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-4678"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4678","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4678"},{"reference_url":"https://github.com/ansible/ansible/commit/5429b85b9f6c2e640074176f36ff05fd5e4d1916","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"9.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/ansible/ansible/commit/5429b85b9f6c2e640074176f36ff05fd5e4d1916"},{"reference_url":"https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2020-203.yaml","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"9.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2020-203.yaml"},{"reference_url":"https://groups.google.com/forum/message/raw?msg=ansible-announce/ieV1vZvcTXU/5Q93ThkY9rIJ","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"9.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://groups.google.com/forum/message/raw?msg=ansible-announce/ieV1vZvcTXU/5Q93ThkY9rIJ"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-4678","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"9.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-4678"},{"reference_url":"https://security-tracker.debian.org/tracker/CVE-2014-4678","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"9.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security-tracker.debian.org/tracker/CVE-2014-4678"},{"reference_url":"https://www.openwall.com/lists/oss-security/2014/06/26/30","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"9.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.openwall.com/lists/oss-security/2014/06/26/30"},{"reference_url":"https://www.openwall.com/lists/oss-security/2014/07/02/2","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"9.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.openwall.com/lists/oss-security/2014/07/02/2"},{"reference_url":"https://www.rapid7.com/db/vulnerabilities/freebsd-vid-2c493ac8-205e-11e5-a4a5-002590263bf5","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"9.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.rapid7.com/db/vulnerabilities/freebsd-vid-2c493ac8-205e-11e5-a4a5-002590263bf5"},{"reference_url":"https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2014-4678","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"9.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2014-4678"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1828684","reference_id":"1828684","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1828684"},{"reference_url":"https://github.com/advisories/GHSA-66c7-5pwv-mm3j","reference_id":"GHSA-66c7-5pwv-mm3j","reference_type":"","scores":[{"value":"CRITICAL","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-66c7-5pwv-mm3j"},{"reference_url":"https://security.gentoo.org/glsa/201411-09","reference_id":"GLSA-201411-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201411-09"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77902?format=json","purl":"pkg:ebuild/app-admin/ansible@1.6.8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-admin/ansible@1.6.8"}],"aliases":["CVE-2014-4678","GHSA-66c7-5pwv-mm3j","PYSEC-2020-203"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7sp5-368w-w3fd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/6033?format=json","vulnerability_id":"VCID-8pn7-4k42-6qeb","summary":"Ansible before 1.6.7 does not prevent inventory data with \"{{\" and \"lookup\" substrings, and does not prevent remote data with \"{{\" substrings, which allows remote attackers to execute arbitrary code via (1) crafted lookup('pipe') calls or (2) crafted Jinja2 data.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-4966","reference_id":"","reference_type":"","scores":[{"value":"0.04747","scoring_system":"epss","scoring_elements":"0.8939","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04747","scoring_system":"epss","scoring_elements":"0.89441","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04747","scoring_system":"epss","scoring_elements":"0.89426","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04747","scoring_system":"epss","scoring_elements":"0.8943","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04747","scoring_system":"epss","scoring_elements":"0.89432","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04747","scoring_system":"epss","scoring_elements":"0.89423","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04747","scoring_system":"epss","scoring_elements":"0.89419","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04747","scoring_system":"epss","scoring_elements":"0.89403","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04747","scoring_system":"epss","scoring_elements":"0.89401","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04747","scoring_system":"epss","scoring_elements":"0.89385","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-4966"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4966","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4966"},{"reference_url":"https://github.com/ansible/ansible/commit/62a1295a3e08cb6c3e9f1b2a1e6e5dcaeab32527","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"9.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/ansible/ansible/commit/62a1295a3e08cb6c3e9f1b2a1e6e5dcaeab32527"},{"reference_url":"https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2020-204.yaml","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"9.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2020-204.yaml"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-4966","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"9.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-4966"},{"reference_url":"http://www.ocert.org/advisories/ocert-2014-004.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"9.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.ocert.org/advisories/ocert-2014-004.html"},{"reference_url":"https://github.com/advisories/GHSA-wqq5-c89p-3wc3","reference_id":"GHSA-wqq5-c89p-3wc3","reference_type":"","scores":[{"value":"CRITICAL","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-wqq5-c89p-3wc3"},{"reference_url":"https://security.gentoo.org/glsa/201411-09","reference_id":"GLSA-201411-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201411-09"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77902?format=json","purl":"pkg:ebuild/app-admin/ansible@1.6.8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-admin/ansible@1.6.8"}],"aliases":["CVE-2014-4966","GHSA-wqq5-c89p-3wc3","PYSEC-2020-204"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8pn7-4k42-6qeb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/6038?format=json","vulnerability_id":"VCID-vdyk-rcxz-z7an","summary":"The safe_eval function in Ansible before 1.5.4 does not properly restrict the code subset, which allows remote attackers to execute arbitrary code via crafted instructions.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4657.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4657.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-4657","reference_id":"","reference_type":"","scores":[{"value":"0.02239","scoring_system":"epss","scoring_elements":"0.84479","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02239","scoring_system":"epss","scoring_elements":"0.84518","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02239","scoring_system":"epss","scoring_elements":"0.84516","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02239","scoring_system":"epss","scoring_elements":"0.84494","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02239","scoring_system":"epss","scoring_elements":"0.84575","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02239","scoring_system":"epss","scoring_elements":"0.84555","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02239","scoring_system":"epss","scoring_elements":"0.84559","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02239","scoring_system":"epss","scoring_elements":"0.84564","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02239","scoring_system":"epss","scoring_elements":"0.84545","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02239","scoring_system":"epss","scoring_elements":"0.8454","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-4657"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4657","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4657"},{"reference_url":"https://github.com/ansible/ansible","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"9.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/ansible/ansible"},{"reference_url":"https://github.com/ansible/ansible/blob/release1.5.5/CHANGELOG.md","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"9.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/ansible/ansible/blob/release1.5.5/CHANGELOG.md"},{"reference_url":"https://github.com/ansible/ansible/commit/998793fd0ab55705d57527a38cee5e83f535974c","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"9.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/ansible/ansible/commit/998793fd0ab55705d57527a38cee5e83f535974c"},{"reference_url":"https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2020-199.yaml","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"9.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2020-199.yaml"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-4657","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"9.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-4657"},{"reference_url":"https://web.archive.org/web/20210120133852/https://www.securityfocus.com/bid/68232","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"9.3","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20210120133852/https://www.securityfocus.com/bid/68232"},{"reference_url":"https://www.securityfocus.com/bid/68232","reference_id":"","reference_type":"","scores":[],"url":"https://www.securityfocus.com/bid/68232"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1831263","reference_id":"1831263","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1831263"},{"reference_url":"https://github.com/advisories/GHSA-qg47-5px9-32g7","reference_id":"GHSA-qg47-5px9-32g7","reference_type":"","scores":[{"value":"CRITICAL","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-qg47-5px9-32g7"},{"reference_url":"https://security.gentoo.org/glsa/201411-09","reference_id":"GLSA-201411-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201411-09"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/77902?format=json","purl":"pkg:ebuild/app-admin/ansible@1.6.8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-admin/ansible@1.6.8"}],"aliases":["CVE-2014-4657","GHSA-qg47-5px9-32g7","PYSEC-2020-199"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vdyk-rcxz-z7an"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-admin/ansible@1.6.8"}