Direct Vulnerabilities

Known vulnerabilities in the ansible package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
Information Exposure

*
  • M
Insecure Temporary File

*
  • M
Insecure Temporary File

*
  • M
Insecure Temporary File

*
  • M
Insecure Temporary File

*
  • M
Insecure Temporary File

*
  • M
Insecure Temporary File

*
  • M
Insecure Temporary File

*
  • L
Improper Input Validation

*
  • H
Improper Input Validation

*
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • L
Information Exposure

*
  • M
Information Exposure

*
  • L
Information Exposure

*
  • L
Insecure Temporary File

*
  • L
Insecure Temporary File

*
  • L
Insecure Temporary File

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • L
Arbitrary Argument Injection

*
  • L
Arbitrary Argument Injection

*
  • L
Arbitrary Argument Injection

*
  • L
Arbitrary Argument Injection

*
  • L
Arbitrary Argument Injection

*
  • L
Arbitrary Argument Injection

*
  • L
Arbitrary Argument Injection

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • M
OS Command Injection

*
  • M
OS Command Injection

*
  • M
OS Command Injection

*
  • M
OS Command Injection

*
  • M
OS Command Injection

*
  • M
OS Command Injection

*
  • M
OS Command Injection

*
  • M
Insecure Temporary File

*
  • M
Insecure Temporary File

*
  • M
Insecure Temporary File

*
  • M
Insecure Temporary File

*
  • M
Insecure Temporary File

*
  • M
Insecure Temporary File

*
  • M
Arbitrary Argument Injection

*
  • M
Arbitrary Argument Injection

*
  • M
Arbitrary Argument Injection

*
  • M
Arbitrary Argument Injection

*
  • M
OS Command Injection

*
  • M
OS Command Injection

*
  • M
OS Command Injection

*
  • M
OS Command Injection

*
  • M
OS Command Injection

*
  • M
OS Command Injection

*
  • M
OS Command Injection

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure Through Log Files

*
  • L
Information Exposure Through Log Files

*
  • L
Information Exposure Through Log Files

*
  • L
Information Exposure Through Log Files

*
  • L
Information Exposure Through Log Files

*
  • L
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • H
Improper Verification of Cryptographic Signature

*
  • L
Improper Verification of Cryptographic Signature

*
  • L
Improper Verification of Cryptographic Signature

*
  • L
Improper Verification of Cryptographic Signature

*
  • L
Improper Verification of Cryptographic Signature

*
  • H
Improper Verification of Cryptographic Signature

*
  • H
Arbitrary Command Injection

*
  • L
Incorrect Permission Assignment for Critical Resource

*
  • L
Incorrect Permission Assignment for Critical Resource

*
  • L
Incorrect Permission Assignment for Critical Resource

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Insufficiently Protected Credentials

*
  • L
Authentication Bypass by Primary Weakness

*
  • H
Information Exposure

*
  • M
Information Exposure Through Log Files

*
  • M
Untrusted Search Path

*
  • M
Untrusted Search Path

*
  • M
Insufficiently Protected Credentials

*
  • M
Insufficiently Protected Credentials

*
  • M
Insufficiently Protected Credentials

*
  • M
Insufficiently Protected Credentials

*
  • H
Missing Authorization

*
  • M
Missing Authorization

*
  • M
Missing Authorization

*
  • M
Incomplete Cleanup

*
  • M
Incomplete Cleanup

*
  • M
Incomplete Cleanup

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Information Exposure Through Log Files

*
  • L
Information Exposure Through Log Files

*
  • L
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Directory Traversal

*
  • M
File and Directory Information Exposure

*
  • M
File and Directory Information Exposure

*
  • M
File and Directory Information Exposure

*