Количество 7
Количество 7
CVE-2020-10729
A flaw was found in the use of insufficiently random values in Ansible. Two random password lookups of the same length generate the equal value as the template caching action for the same file since no re-evaluation happens. The highest threat from this vulnerability would be that all passwords are exposed at once for the file. This flaw affects Ansible Engine versions before 2.9.6.
CVE-2020-10729
A flaw was found in the use of insufficiently random values in Ansible. Two random password lookups of the same length generate the equal value as the template caching action for the same file since no re-evaluation happens. The highest threat from this vulnerability would be that all passwords are exposed at once for the file. This flaw affects Ansible Engine versions before 2.9.6.
CVE-2020-10729
A flaw was found in the use of insufficiently random values in Ansible. Two random password lookups of the same length generate the equal value as the template caching action for the same file since no re-evaluation happens. The highest threat from this vulnerability would be that all passwords are exposed at once for the file. This flaw affects Ansible Engine versions before 2.9.6.
CVE-2020-10729
A flaw was found in the use of insufficiently random values in Ansible ...
GHSA-r6h7-5pq2-j77h
Insufficiently random values in Ansible
BDU:2022-00275
Уязвимость системы управления конфигурациями Ansible, связанная с использованием недостаточно случайных значений, позволяющая нарушителю получить доступ к конфиденциальным данным
openSUSE-SU-2022:0081-1
Security update for ansible
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2020-10729 A flaw was found in the use of insufficiently random values in Ansible. Two random password lookups of the same length generate the equal value as the template caching action for the same file since no re-evaluation happens. The highest threat from this vulnerability would be that all passwords are exposed at once for the file. This flaw affects Ansible Engine versions before 2.9.6. | CVSS3: 5.5 | 0% Низкий | больше 4 лет назад | |
CVE-2020-10729 A flaw was found in the use of insufficiently random values in Ansible. Two random password lookups of the same length generate the equal value as the template caching action for the same file since no re-evaluation happens. The highest threat from this vulnerability would be that all passwords are exposed at once for the file. This flaw affects Ansible Engine versions before 2.9.6. | CVSS3: 5 | 0% Низкий | около 8 лет назад | |
CVE-2020-10729 A flaw was found in the use of insufficiently random values in Ansible. Two random password lookups of the same length generate the equal value as the template caching action for the same file since no re-evaluation happens. The highest threat from this vulnerability would be that all passwords are exposed at once for the file. This flaw affects Ansible Engine versions before 2.9.6. | CVSS3: 5.5 | 0% Низкий | больше 4 лет назад | |
CVE-2020-10729 A flaw was found in the use of insufficiently random values in Ansible ... | CVSS3: 5.5 | 0% Низкий | больше 4 лет назад | |
GHSA-r6h7-5pq2-j77h Insufficiently random values in Ansible | CVSS3: 5 | 0% Низкий | больше 4 лет назад | |
BDU:2022-00275 Уязвимость системы управления конфигурациями Ansible, связанная с использованием недостаточно случайных значений, позволяющая нарушителю получить доступ к конфиденциальным данным | CVSS3: 5.5 | 0% Низкий | больше 4 лет назад | |
openSUSE-SU-2022:0081-1 Security update for ansible | почти 4 года назад |
Уязвимостей на страницу