ansible-test vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the ansible-test package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Improper Output Neutralization for Logs

<0:2.16.3-2.el8
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
Information Exposure

*
  • L
Arbitrary Argument Injection

*
  • H
Information Exposure

<0:2.9.27-1.el8ae
  • H
Information Exposure

<0:2.9.27-1.el8ae
  • H
Improper Input Validation

<0:2.9.23-1.el8ae
  • H
Improper Input Validation

<0:2.9.23-1.el8ae
  • M
OS Command Injection

*
  • M
Insecure Temporary File

*
  • M
Information Exposure Through Log Files

<0:2.9.20-1.el8ae
  • M
Information Exposure Through Log Files

<0:2.9.20-1.el8ae
  • M
Information Exposure

<0:2.9.18-1.el8ae
  • M
Information Exposure

<0:2.9.18-1.el8ae
  • M
Information Exposure Through Log Files

<0:2.9.18-1.el8ae
  • M
Information Exposure Through Log Files

<0:2.9.18-1.el8ae
  • M
Information Exposure Through Log Files

<0:2.9.18-1.el8ae
  • M
Information Exposure Through Log Files

<0:2.9.18-1.el8ae
  • M
Information Exposure Through Log Files

<0:2.9.18-1.el8ae
  • M
Information Exposure Through Log Files

<0:2.9.18-1.el8ae
  • M
Improper Output Neutralization for Logs

<0:2.9.1-1.el8
  • M
Improper Output Neutralization for Logs

<0:2.9.1-1.el8
  • H
Improper Verification of Cryptographic Signature

<0:2.9.13-1.el8ae
  • H
Improper Verification of Cryptographic Signature

<0:2.9.13-1.el8ae
  • M
Improper Input Validation

<0:2.9.4-1.el8ae
  • M
Improper Input Validation

<0:2.9.4-1.el8ae
  • M
Improper Input Validation

<0:2.9.4-1.el8ae
  • M
Improper Input Validation

<0:2.9.4-1.el8ae
  • H
Information Exposure

<0:2.9.7-1.el8ae
  • H
Information Exposure

<0:2.9.7-1.el8ae
  • H
Information Exposure

<0:2.9.7-1.el8ae
  • H
Information Exposure

<0:2.9.7-1.el8ae
  • H
Insecure Temporary File

<0:2.9.7-1.el8ae
  • H
Insecure Temporary File

<0:2.9.7-1.el8ae
  • H
Information Exposure

<0:2.9.7-1.el8ae
  • H
Information Exposure

<0:2.9.7-1.el8ae
  • H
Directory Traversal

<0:2.9.7-1.el8ae
  • H
Directory Traversal

<0:2.9.7-1.el8ae
  • H
Directory Traversal

<0:2.9.7-1.el8ae
  • H
Directory Traversal

<0:2.9.7-1.el8ae
  • H
Insecure Temporary File

<0:2.9.7-1.el8ae
  • H
Insecure Temporary File

<0:2.9.7-1.el8ae
  • H
Directory Traversal

<0:2.9.7-1.el8ae
  • H
Directory Traversal

<0:2.9.7-1.el8ae
  • H
Incomplete Cleanup

<0:2.9.7-1.el8ae
  • H
Incomplete Cleanup

<0:2.9.7-1.el8ae
  • H
Missing Authorization

<0:2.9.7-1.el8ae
  • H
Missing Authorization

<0:2.9.7-1.el8ae
  • M
Use of Insufficiently Random Values

<0:2.9.6-1.el8ae
  • M
Use of Insufficiently Random Values

<0:2.9.6-1.el8ae