ansible vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the ansible package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Improper Cross-boundary Removal of Sensitive Data

*
  • M
Improper Cross-boundary Removal of Sensitive Data

*
  • M
Improper Cross-boundary Removal of Sensitive Data

*
  • M
Improper Cross-boundary Removal of Sensitive Data

*
  • M
Improper Cross-boundary Removal of Sensitive Data

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • M
Insecure Temporary File

*
  • M
Insecure Temporary File

*
  • M
Insecure Temporary File

*
  • M
Insecure Temporary File

*
  • M
Insecure Temporary File

*
  • M
Insecure Temporary File

*
  • M
Insecure Temporary File

*
  • L
Improper Input Validation

*
  • H
Improper Input Validation

*
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • L
Information Exposure

*
  • M
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Insecure Temporary File

*
  • L
Insecure Temporary File

*
  • L
Insecure Temporary File

*
  • L
Insecure Temporary File

*
  • L
Insecure Temporary File

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • L
Arbitrary Argument Injection

*
  • L
Arbitrary Argument Injection

*
  • L
Arbitrary Argument Injection

*
  • L
Arbitrary Argument Injection

*
  • L
Arbitrary Argument Injection

*
  • L
Arbitrary Argument Injection

*
  • L
Arbitrary Argument Injection

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • M
OS Command Injection

*
  • M
OS Command Injection

*
  • M
OS Command Injection

*
  • M
OS Command Injection

*
  • M
OS Command Injection

*
  • M
OS Command Injection

*
  • M
OS Command Injection

*
  • M
Insecure Temporary File

*
  • M
Insecure Temporary File

*
  • M
Insecure Temporary File

*
  • M
Insecure Temporary File

*
  • M
Insecure Temporary File

*
  • M
Insecure Temporary File

*
  • M
External Control of File Name or Path

*
  • M
External Control of File Name or Path

*
  • M
External Control of File Name or Path

*
  • M
External Control of File Name or Path

*
  • M
External Control of File Name or Path

*
  • M
External Control of File Name or Path

*
  • M
External Control of File Name or Path

*
  • M
OS Command Injection

*
  • M
OS Command Injection

*
  • M
OS Command Injection

*
  • M
OS Command Injection

*
  • M
OS Command Injection

*
  • M
OS Command Injection

*
  • M
OS Command Injection

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure Through Log Files

*
  • L
Information Exposure Through Log Files

*
  • L
Information Exposure Through Log Files

*
  • L
Information Exposure Through Log Files

*
  • L
Information Exposure Through Log Files

*
  • L
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • H
Improper Verification of Cryptographic Signature

*
  • L
Improper Verification of Cryptographic Signature

*
  • L
Improper Verification of Cryptographic Signature

*
  • L
Improper Verification of Cryptographic Signature

*
  • L
Improper Verification of Cryptographic Signature

*
  • H
Improper Verification of Cryptographic Signature

*
  • H
Arbitrary Command Injection

*
  • L
Incorrect Permission Assignment for Critical Resource

*
  • L
Incorrect Permission Assignment for Critical Resource

*
  • L
Incorrect Permission Assignment for Critical Resource

*
  • L
Incorrect Permission Assignment for Critical Resource

*
  • L
Incorrect Permission Assignment for Critical Resource

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Insufficiently Protected Credentials

*
  • L
Authentication Bypass by Primary Weakness

*
  • H
Information Exposure

*
  • H
Information Exposure

*
  • H
Information Exposure

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Untrusted Search Path

*
  • M
Untrusted Search Path

*
  • M
Untrusted Search Path

*
  • M
Untrusted Search Path

*
  • M
Insufficiently Protected Credentials

*
  • M
Insufficiently Protected Credentials

*
  • M
Insufficiently Protected Credentials

*
  • M
Insufficiently Protected Credentials

*
  • H
Missing Authorization

*
  • M
Missing Authorization

*
  • M
Missing Authorization

*
  • M
Missing Authorization

*
  • H
Missing Authorization

*
  • M
Incomplete Cleanup

*
  • M
Incomplete Cleanup

*
  • M
Incomplete Cleanup

*
  • M
Incomplete Cleanup

*
  • M
Incomplete Cleanup

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Information Exposure Through Log Files

*
  • L
Information Exposure Through Log Files

*
  • L
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Directory Traversal

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • H
Information Exposure Through Log Files

*