Vulnerabilities (CVE)

Filtered by vendor Redhat Subscribe
Filtered by product Ansible
Total 45 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2014-4678 2 Debian, Redhat 2 Debian Linux, Ansible 2020-02-25 7.5 HIGH 9.8 CRITICAL
The safe_eval function in Ansible before 1.6.4 does not properly restrict the code subset, which allows remote attackers to execute arbitrary code via crafted instructions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-4657.
CVE-2015-6240 1 Redhat 1 Ansible 2019-09-16 7.2 HIGH 7.8 HIGH
The chroot, jail, and zone connection plugins in ansible before 1.9.2 allow local users to escape a restricted environment via a symlink attack.
CVE-2015-3908 1 Redhat 1 Ansible 2019-09-16 4.3 MEDIUM N/A
Ansible before 1.9.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
CVE-2014-3498 1 Redhat 1 Ansible 2018-10-30 6.5 MEDIUM 8.8 HIGH
The user module in ansible before 1.6.6 allows remote authenticated users to execute arbitrary commands.
CVE-2013-2233 1 Redhat 1 Ansible 2018-06-07 5.8 MEDIUM 7.4 HIGH
Ansible before 1.2.1 makes it easier for remote attackers to conduct man-in-the-middle attacks by leveraging failure to cache SSH host keys.