ansible-doc vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the ansible-doc package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Cross-site Scripting (XSS)

<0:2.4.3.0-1.el7ae
  • H
Improper Input Validation

<0:2.4.4.0-1.el7ae
  • H
Incorrect Privilege Assignment

<0:2.4.4.0-1.el7ae
  • M
Improper Authentication

<0:2.3.2.0-2.el7
  • H
Improper Input Validation

<0:2.3.0.0-4.el7
  • M
Cross-site Scripting (XSS)

<0:2.4.3.0-1.el7ae
  • M
Improper Input Validation

<0:2.3.1.0-3.el7
  • H
Improper Input Validation

<0:2.3.0.0-4.el7
  • H
Improper Input Validation

<0:2.3.0.0-4.el7
  • M
Directory Traversal

<0:2.5.15-1.el7ae
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • L
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

<0:2.5.13-1.el7ae
  • L
Information Exposure Through Log Files

*
  • L
Information Exposure Through Log Files

*
  • L
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure Through Log Files

<0:2.4.0.0-5.el7
  • M
Information Exposure Through Log Files

*
  • M
Information Exposure

<0:2.5.11-1.el7ae
  • M
Information Exposure

*
  • M
Untrusted Search Path

<0:2.5.6-1.el7ae
  • M
Information Exposure

*
  • M
Information Exposure

*
  • L
Information Exposure

<0:2.5.14-1.el7ae
  • M
Improper Input Validation

<0:2.5.6-1.el7ae
  • M
Information Exposure Through Log Files

<0:2.4.5.0-1.el7ae
  • M
Information Exposure Through Log Files

<0:2.5.5-1.el7ae
  • L
Incorrect Permission Assignment for Critical Resource

*
  • L
Incorrect Permission Assignment for Critical Resource

*
  • M
Improper Output Neutralization for Logs

*
  • L
Information Exposure Through Log Files

*
  • L
Information Exposure Through Log Files

*
  • L
Arbitrary Argument Injection

*
  • L
Arbitrary Argument Injection

*
  • M
OS Command Injection

*
  • M
OS Command Injection

*
  • M
Insecure Temporary File

*
  • M
Insecure Temporary File

*
  • M
Improper Output Neutralization for Logs

*
  • M
Improper Authentication

*
  • M
Improper Output Neutralization for Logs

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Insufficiently Protected Credentials

*
  • M
Improper Output Neutralization for Logs

*
  • M
Improper Output Neutralization for Logs

*
  • L
Improper Verification of Cryptographic Signature

*
  • L
Improper Verification of Cryptographic Signature

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • L
Information Exposure

*
  • M
Information Exposure

*
  • L
Insecure Temporary File

*
  • L
Insecure Temporary File

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Insecure Temporary File

*
  • M
Insecure Temporary File

*
  • M
Incomplete Cleanup

*
  • M
Incomplete Cleanup

*
  • M
Missing Authorization

*
  • M
Missing Authorization

*
  • H
Improper Authentication

<0:2.4.4.0-1.el7ae