ansible-core@2.14.18rc1 vulnerabilities
Radically simple IT automation
-
latest version
2.18.0
-
first published
4 years ago
-
latest version published
13 days ago
-
licenses detected
- [0,)
Direct Vulnerabilities
Known vulnerabilities in the ansible-core package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
ansible-core is an a radically simple IT automation system. It handles configuration management, application deployment, cloud provisioning, ad-hoc task execution, network automation, and multi-node orchestration. Ansible makes complex changes like zero-downtime rolling updates with load balancers easy. Affected versions of this package are vulnerable to Improper Input Validation through the use of the How to fix Improper Input Validation? Upgrade |
[,2.18.0)
|
ansible-core is an a radically simple IT automation system. It handles configuration management, application deployment, cloud provisioning, ad-hoc task execution, network automation, and multi-node orchestration. Ansible makes complex changes like zero-downtime rolling updates with load balancers easy. Affected versions of this package are vulnerable to Exposure of Sensitive Information in Log Files when loading variables from Ansible Vault without setting Note: This is a similar vulnerability to the previously reported CVE-2024-0690. How to fix Exposure of Sensitive Information in Log Files? There is no fixed version for |
[0,)
|
ansible-core is an a radically simple IT automation system. It handles configuration management, application deployment, cloud provisioning, ad-hoc task execution, network automation, and multi-node orchestration. Ansible makes complex changes like zero-downtime rolling updates with load balancers easy. Affected versions of this package are vulnerable to Improper Control of Generation of Code ('Code Injection'). An attacker can inject malicious code into the template, leading to unauthorized access and potential data compromise. How to fix Improper Control of Generation of Code ('Code Injection')? Upgrade |
[,2.15.7rc1)
[2.16.0,2.16.1rc1)
|