ansible vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the ansible package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Improper Access Control

<0:2.4.3.0-1.el7ae
  • H
Missing Authorization

<0:2.3.0.0-1.el7
  • H
Improper Access Control

<0:2.3.0.0-1.el7
  • H
Improper Access Control

<0:2.3.0.0-1.el7
  • H
Information Exposure

<0:2.3.0.0-1.el7
  • M
Cross-site Scripting (XSS)

<0:2.4.3.0-1.el7ae
  • M
Improper Certificate Validation

<0:2.2.1.0-2.el7
  • M
Use of Hard-coded Credentials

<0:2.2.1.0-2.el7
  • H
Improper Input Validation

<0:2.4.4.0-1.el7ae
  • H
Improper Input Validation

<0:2.4.4.0-1.el7ae
  • H
Incorrect Privilege Assignment

<0:2.4.4.0-1.el7ae
  • H
Incorrect Privilege Assignment

<0:2.4.4.0-1.el7ae
  • M
Arbitrary Command Injection

<0:2.2.0.0-1.el7
  • M
Arbitrary Command Injection

<0:2.2.0.0-1.el7
  • M
Improper Authentication

<0:2.3.2.0-2.el7
  • H
Improper Input Validation

<0:2.3.0.0-4.el7
  • M
Cross-site Scripting (XSS)

<0:2.4.3.0-1.el7ae
  • H
Improper Input Validation

<0:2.2.3.0-1.el7
  • H
Improper Input Validation

<0:2.2.3.0-1.el7
  • H
Improper Input Validation

<0:2.2.3.0-1.el7
  • M
Improper Input Validation

<0:2.3.1.0-3.el7
  • H
Improper Input Validation

<0:2.2.3.0-1.el7
  • H
Improper Input Validation

<0:2.2.3.0-1.el7
  • H
Improper Input Validation

<0:2.2.3.0-1.el7
  • H
Improper Input Validation

<0:2.3.0.0-4.el7
  • H
Improper Input Validation

<0:2.2.3.0-1.el7
  • H
Improper Input Validation

<0:2.2.3.0-1.el7
  • H
Improper Input Validation

<0:2.2.3.0-1.el7
  • H
Improper Input Validation

<0:2.2.3.0-1.el7
  • H
Improper Input Validation

<0:2.2.3.0-1.el7
  • H
Improper Input Validation

<0:2.2.3.0-1.el7
  • H
Improper Input Validation

<0:2.2.1.0-1.el7
  • H
Improper Input Validation

<0:2.2.1.0-2.el7
  • H
Improper Input Validation

<0:2.2.1.0-2.el7
  • H
Improper Input Validation

<0:2.3.0.0-4.el7
  • H
Improper Input Validation

<0:2.2.1.0-2.el7
  • H
Improper Input Validation

<0:2.2.1.0-2.el7
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

<0:2.5.15-1.el7ae
  • M
Directory Traversal

<0:2.7.8-1.el7ae
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

<0:2.6.19-1.el7ae
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

<0:2.6.19-1.el7ae
  • M
Directory Traversal

*
  • M
Directory Traversal

<0:2.6.14-1.el7ae
  • M
Directory Traversal

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

<0:2.7.4-1.el7ae
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

<0:2.6.10-1.el7ae
  • M
Information Exposure Through Log Files

*
  • L
Information Exposure Through Log Files

*
  • L
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

<0:2.5.13-1.el7ae
  • L
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • L
Information Exposure Through Log Files

*
  • L
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

<0:2.4.0.0-5.el7
  • M
Information Exposure Through Log Files

*
  • L
Information Exposure

<0:2.6.11-1.el7ae
  • M
Information Exposure

<0:2.7.1-1.el7ae
  • M
Information Exposure

<0:2.6.7-1.el7ae
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

<0:2.5.11-1.el7ae
  • L
Information Exposure

<0:2.6.11-1.el7ae
  • M
Untrusted Search Path

<0:2.6.1-1.el7ae
  • M
Untrusted Search Path

*
  • M
Untrusted Search Path

<0:2.4.6.0-1.el7ae
  • M
Untrusted Search Path

<0:2.5.6-1.el7ae
  • M
Untrusted Search Path

<0:2.4.6.0-1.el7ae
  • M
Untrusted Search Path

*
  • M
Untrusted Search Path

<0:2.4.6.0-1.el7ae
  • L
Information Exposure

<0:2.6.11-1.el7ae
  • L
Information Exposure

<0:2.5.14-1.el7ae
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • L
Information Exposure

<0:2.6.11-1.el7ae
  • L
Information Exposure

<0:2.7.5-1.el7ae
  • L
Information Exposure

<0:2.6.11-1.el7ae
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

<0:2.4.6.0-1.el7ae
  • M
Improper Input Validation

<0:2.4.6.0-1.el7ae
  • M
Improper Input Validation

*
  • M
Improper Input Validation

<0:2.4.6.0-1.el7ae
  • M
Improper Input Validation

<0:2.6.1-1.el7ae
  • M
Improper Input Validation

<0:2.5.6-1.el7ae
  • M
Information Exposure Through Log Files

<0:2.4.6.0-1.el7ae
  • M
Information Exposure Through Log Files

<0:2.4.6.0-1.el7ae
  • M
Information Exposure Through Log Files

<0:2.4.5.0-1.el7ae
  • M
Information Exposure Through Log Files

<0:2.4.6.0-1.el7ae
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

<0:2.5.5-1.el7ae
  • M
Information Exposure Through Log Files

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
Information Exposure

*
  • H
Incorrect Permission Assignment for Critical Resource

<0:2.8.15-1.el7ae
  • L
Incorrect Permission Assignment for Critical Resource

*
  • L
Incorrect Permission Assignment for Critical Resource

*
  • L
Incorrect Permission Assignment for Critical Resource

*
  • L
Incorrect Permission Assignment for Critical Resource

*
  • H
Improper Output Neutralization for Logs

<0:2.8.15-1.el7ae
  • M
Improper Output Neutralization for Logs

*
  • M
Information Exposure Through Log Files

*
  • H
Information Exposure Through Log Files

<0:2.8.15-1.el7ae
  • M
Information Exposure Through Log Files

*
  • L
Information Exposure Through Log Files

*
  • L
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • L
Arbitrary Argument Injection

*
  • L
Arbitrary Argument Injection

*
  • L
Arbitrary Argument Injection

*
  • L
Arbitrary Argument Injection

*
  • L
Arbitrary Argument Injection

*
  • H
Information Exposure

*
  • H
Information Exposure

<0:2.9.27-1.el7ae
  • H
Information Exposure

*
  • H
Information Exposure

<0:2.9.27-1.el7ae
  • H
Improper Input Validation

<0:2.9.23-1.el7ae
  • H
Improper Input Validation

<0:2.9.23-1.el7ae
  • M
OS Command Injection

*
  • M
OS Command Injection

*
  • M
OS Command Injection

*
  • M
OS Command Injection

*
  • M
OS Command Injection

*
  • M
OS Command Injection

*
  • M
Insecure Temporary File

*
  • M
Insecure Temporary File

*
  • M
Insecure Temporary File

*
  • M
Insecure Temporary File

*
  • M
Insecure Temporary File

*
  • M
Insecure Temporary File

*
  • M
Improper Output Neutralization for Logs

<0:2.6.20-1.el7ae
  • H
Improper Output Neutralization for Logs

<0:2.6.20-1.el7ae
  • H
Improper Output Neutralization for Logs

<0:2.8.6-1.el7ae
  • M
Improper Output Neutralization for Logs

*
  • M
Improper Output Neutralization for Logs

*
  • M
Improper Output Neutralization for Logs

*
  • M
Improper Output Neutralization for Logs

*
  • H
Improper Output Neutralization for Logs

<0:2.7.14-1.el7ae
  • M
Improper Authentication

<0:2.6.20-1.el7ae
  • M
Improper Authentication

*
  • H
Improper Authentication

<0:2.6.20-1.el7ae
  • H
Improper Authentication

<0:2.8.6-1.el7ae
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • H
Improper Authentication

<0:2.7.14-1.el7ae
  • H
Improper Output Neutralization for Logs

<0:2.8.6-1.el7ae
  • H
Improper Output Neutralization for Logs

<0:2.7.14-1.el7ae
  • M
Improper Output Neutralization for Logs

*
  • M
Improper Output Neutralization for Logs

*
  • H
Improper Output Neutralization for Logs

<0:2.6.20-1.el7ae
  • M
Improper Output Neutralization for Logs

<0:2.6.20-1.el7ae
  • M
Improper Output Neutralization for Logs

*
  • M
Improper Output Neutralization for Logs

*
  • M
Information Exposure Through Log Files

<0:2.9.20-1.el7ae
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

<0:2.9.20-1.el7ae
  • M
Information Exposure

*
  • M
Information Exposure

<0:2.8.2-1.el7ae
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

<0:2.6.19-1.el7ae
  • M
Information Exposure

<0:2.6.18-1.el7ae
  • M
Information Exposure

<0:2.6.19-1.el7ae
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

<0:2.7.12-1.el7ae
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

<0:2.9.18-1.el7ae
  • M
Information Exposure

<0:2.9.18-1.el7ae
  • M
Information Exposure

<0:2.8.4-1.el7ae
  • M
Information Exposure Through Log Files

<0:2.9.18-1.el7ae
  • M
Information Exposure Through Log Files

<0:2.9.18-1.el7ae
  • M
Information Exposure Through Log Files

*
  • M
Insufficiently Protected Credentials

<0:2.6.19-1.el7ae
  • M
Insufficiently Protected Credentials

<0:2.6.19-1.el7ae
  • M
Insufficiently Protected Credentials

*
  • M
Insufficiently Protected Credentials

<0:2.8.4-1.el7ae
  • M
Insufficiently Protected Credentials

*
  • M
Insufficiently Protected Credentials

<0:2.6.19-1.el7ae
  • M
Insufficiently Protected Credentials

*
  • M
Insufficiently Protected Credentials

<0:2.7.13-1.el7ae
  • M
Information Exposure Through Log Files

<0:2.9.18-1.el7ae
  • M
Information Exposure Through Log Files

<0:2.9.18-1.el7ae
  • M
Information Exposure Through Log Files

<0:2.9.18-1.el7ae
  • M
Information Exposure Through Log Files

<0:2.9.18-1.el7ae
  • M
Information Exposure Through Log Files

*
  • M
Improper Output Neutralization for Logs

<0:2.7.15-1.el7ae
  • M
Improper Output Neutralization for Logs

<0:2.9.1-1.el7
  • M
Improper Output Neutralization for Logs

*
  • M
Improper Output Neutralization for Logs

<0:2.8.7-1.el7ae
  • M
Improper Output Neutralization for Logs

<0:2.9.1-1.el7
  • M
Improper Output Neutralization for Logs

*
  • M
Improper Output Neutralization for Logs

*
  • M
Improper Output Neutralization for Logs

*
  • M
Improper Output Neutralization for Logs

*
  • L
Improper Verification of Cryptographic Signature

*
  • L
Improper Verification of Cryptographic Signature

*
  • H
Improper Verification of Cryptographic Signature

<0:2.8.15-1.el7ae
  • H
Improper Verification of Cryptographic Signature

<0:2.9.13-1.el7ae
  • H
Improper Verification of Cryptographic Signature

<0:2.9.13-1.el7ae
  • L
Improper Verification of Cryptographic Signature

*
  • L
Improper Verification of Cryptographic Signature

*
  • M
Improper Input Validation

<0:2.8.8-1.el7ae
  • M
Improper Input Validation

<0:2.9.4-1.el7ae
  • M
Improper Input Validation

<0:2.9.4-1.el7ae
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

<0:2.7.16-1.el7ae
  • M
Improper Input Validation

*
  • M
Improper Input Validation

<0:2.8.8-1.el7ae
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

<0:2.9.4-1.el7ae
  • M
Improper Input Validation

<0:2.7.16-1.el7ae
  • M
Improper Input Validation

*
  • M
Improper Input Validation

<0:2.9.4-1.el7ae
  • M
Improper Input Validation

*
  • H
Information Exposure

<0:2.9.7-1.el7ae
  • H
Information Exposure

<0:2.9.7-1.el7ae
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

<0:2.8.16-1.el7ae
  • M
Information Exposure

<0:2.7.18-1.el7ae
  • H
Information Exposure

<0:2.9.7-1.el7ae
  • H
Information Exposure

<0:2.8.11-1.el7ae
  • H
Information Exposure

<0:2.9.7-1.el7ae
  • L
Information Exposure

*
  • M
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • H
Information Exposure

<0:2.7.17-1.el7ae
  • H
Insecure Temporary File

<0:2.9.7-1.el7ae
  • L
Insecure Temporary File

*
  • L
Insecure Temporary File

*
  • L
Insecure Temporary File

*
  • L
Insecure Temporary File

*
  • H
Insecure Temporary File

<0:2.9.7-1.el7ae
  • H
Insecure Temporary File

<0:2.7.17-1.el7ae
  • H
Insecure Temporary File

<0:2.8.11-1.el7ae
  • L
Information Exposure

*
  • H
Information Exposure

<0:2.9.7-1.el7ae
  • H
Information Exposure

<0:2.8.11-1.el7ae
  • H
Information Exposure

<0:2.7.17-1.el7ae
  • L
Information Exposure

*
  • L
Information Exposure

*
  • H
Information Exposure

<0:2.9.7-1.el7ae
  • L
Information Exposure

*
  • H
Directory Traversal

<0:2.7.17-1.el7ae
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • H
Directory Traversal

<0:2.9.7-1.el7ae
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • H
Directory Traversal

<0:2.9.7-1.el7ae
  • H
Directory Traversal

<0:2.8.11-1.el7ae
  • H
Directory Traversal

<0:2.9.7-1.el7ae
  • H
Directory Traversal

<0:2.8.11-1.el7ae
  • H
Directory Traversal

<0:2.9.7-1.el7ae
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • H
Directory Traversal

<0:2.7.17-1.el7ae
  • M
Insecure Temporary File

*
  • M
Insecure Temporary File

*
  • M
Insecure Temporary File

*
  • H
Insecure Temporary File

<0:2.7.17-1.el7ae
  • H
Insecure Temporary File

<0:2.9.7-1.el7ae
  • M
Insecure Temporary File

*
  • M
Insecure Temporary File

*
  • H
Insecure Temporary File

<0:2.9.7-1.el7ae
  • H
Insecure Temporary File

<0:2.8.11-1.el7ae
  • H
Directory Traversal

<0:2.9.7-1.el7ae
  • H
Directory Traversal

<0:2.9.7-1.el7ae
  • M
Incomplete Cleanup

*
  • M
Incomplete Cleanup

*
  • M
Incomplete Cleanup

*
  • M
Incomplete Cleanup

*
  • H
Incomplete Cleanup

<0:2.9.7-1.el7ae
  • H
Incomplete Cleanup

<0:2.7.17-1.el7ae
  • H
Incomplete Cleanup

<0:2.8.11-1.el7ae
  • H
Incomplete Cleanup

<0:2.9.7-1.el7ae
  • M
Incomplete Cleanup

*
  • M
Missing Authorization

*
  • H
Missing Authorization

<0:2.9.7-1.el7ae
  • M
Missing Authorization

*
  • H
Missing Authorization

*
  • M
Missing Authorization

*
  • H
Missing Authorization

<0:2.8.11-1.el7ae
  • H
Missing Authorization

<0:2.9.7-1.el7ae
  • H
Missing Authorization

<0:2.7.17-1.el7ae
  • M
Use of Insufficiently Random Values

<0:2.9.6-1.el7ae
  • M
Use of Insufficiently Random Values

<0:2.9.6-1.el7ae
  • H
Improper Authentication

<0:2.4.4.0-1.el7ae
  • H
Improper Authentication

<0:2.4.4.0-1.el7ae
  • L
Authentication Bypass by Primary Weakness

*