Fuel CMS version 1.4.7 suffers from an authenticated remote SQL injection vulnerability.
4ae5ec0beb2c3044f53f42044cecbb911c8cd94fdfd2abc8a690b12bc25f378c
Red Hat Security Advisory 2020-1543-01 - Ansible is a simple model-driven configuration management, multi-node deployment, and remote-task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically. Issues addressed include information leakage and password leak vulnerabilities.
c52002c8b0c0474479293e105ec5d98f83b7c09d861560d312dc04aa0c422499
Red Hat Security Advisory 2020-1541-01 - Ansible is a simple model-driven configuration management, multi-node deployment, and remote-task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically. Issues addressed include information leakage, password leak, and traversal vulnerabilities.
bafa80d198121580fa5362fb4f482bc1ea9851b9c4a5ce83e562156958360640
Red Hat Security Advisory 2020-1544-01 - Ansible is a simple model-driven configuration management, multi-node deployment, and remote-task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically. Issues addressed include information leakage and password leak vulnerabilities.
9f34c5bfcfca954df28814893bd4a1a6b13bb45b32a7fda07bdf819cec68ac9b
Red Hat Security Advisory 2020-1542-01 - Ansible is a simple model-driven configuration management, multi-node deployment, and remote-task execution system. Ansible works over SSH and does not require any software or daemons to be installed on remote nodes. Extension modules can be written in any language and are transferred to managed machines automatically. Issues addressed include information leakage, password leak, and traversal vulnerabilities.
081f0637174bb0bb026e380e73e882eaf6655807ad9be9a713654872ac5e68dc