Safety vulnerability ID: 34505
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Ansigenome before 0.6.0 uses yaml.load() instead of yaml.safe_load(), allowing a code execution vulnerability.
Latest version: 0.6.0
A tool to help you gather information and manage your Ansible roles.
- Fix code execution vulnerability by using `yaml.safe_load` instead of `yaml.load` (thanks ypid)
- Support for scanning roles that have sub-directories (thanks Yannig)
- Add `ansigenome_info.status` template variable (thanks ypid)
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application