Show filters
136 Total Results
Displaying 71-80 of 136
Sort by:
Attacker Value
Unknown

CVE-2015-7331

Disclosure Date: January 30, 2017 (last updated November 25, 2024)
The mcollective-puppet-agent plugin before 1.11.1 for Puppet allows remote attackers to execute arbitrary code via vectors involving the --server argument.
0
Attacker Value
Unknown

CVE-2015-6808

Disclosure Date: September 04, 2015 (last updated October 05, 2023)
Cross-site scripting (XSS) vulnerability in the Spotlight module 7.x-1.x before 7.x-1.5 for Drupal allows remote authenticated users with certain permissions to inject arbitrary web script or HTML via a node title.
0
Attacker Value
Unknown

CVE-2015-3158

Disclosure Date: August 26, 2015 (last updated October 05, 2023)
The invokeNextValve function in identity/federation/bindings/tomcat/idp/AbstractIDPValve.java in PicketLink before 2.8.0.Beta1 does not properly check role based authorization, which allows remote authenticated users to gain access to restricted application resources via a (1) direct request or (2) request through an SP initiated flow.
0
Attacker Value
Unknown

CVE-2015-0277

Disclosure Date: August 17, 2015 (last updated November 08, 2023)
The Service Provider (SP) in PicketLink before 2.7.0 does not ensure that it is a member of an Audience element when an AudienceRestriction is specified, which allows remote attackers to log in to other users' accounts via a crafted SAML assertion. NOTE: this identifier has been SPLIT per ADT2 due to different vulnerability types. See CVE-2015-6254 for lack of validation for the Destination attribute in a Response element in a SAML assertion.
0
Attacker Value
Unknown

CVE-2015-6254

Disclosure Date: August 17, 2015 (last updated October 05, 2023)
The (1) Service Provider (SP) and (2) Identity Provider (IdP) in PicketLink before 2.7.0 does not ensure that the Destination attribute in a Response element in a SAML assertion matches the location from which the message was received, which allows remote attackers to have unspecified impact via unknown vectors. NOTE: this identifier was SPLIT from CVE-2015-0277 per ADT2 due to different vulnerability types.
0
Attacker Value
Unknown

CVE-2015-1426

Disclosure Date: February 23, 2015 (last updated October 05, 2023)
Puppet Labs Facter 1.6.0 through 2.4.0 allows local users to obtains sensitive Amazon EC2 IAM instance metadata by reading a fact for an Amazon EC2 node.
0
Attacker Value
Unknown

CVE-2014-8602

Disclosure Date: December 11, 2014 (last updated October 05, 2023)
iterator.c in NLnet Labs Unbound before 1.5.1 does not limit delegation chaining, which allows remote attackers to cause a denial of service (memory and CPU consumption) via a large or infinite number of referrals.
0
Attacker Value
Unknown

CVE-2014-3248

Disclosure Date: November 16, 2014 (last updated October 05, 2023)
Untrusted search path vulnerability in Puppet Enterprise 2.8 before 2.8.7, Puppet before 2.7.26 and 3.x before 3.6.2, Facter 1.6.x and 2.x before 2.0.2, Hiera before 1.3.4, and Mcollective before 2.5.2, when running with Ruby 1.9.1 or earlier, allows local users to gain privileges via a Trojan horse file in the current working directory, as demonstrated using (1) rubygems/defaults/operating_system.rb, (2) Win32API.rb, (3) Win32API.so, (4) safe_yaml.rb, (5) safe_yaml/deep.rb, or (6) safe_yaml/deep.so; or (7) operatingsystem.rb, (8) operatingsystem.so, (9) osfamily.rb, or (10) osfamily.so in puppet/confine.
0
Attacker Value
Unknown

CVE-2014-3209

Disclosure Date: November 16, 2014 (last updated October 05, 2023)
The ldns-keygen tool in ldns 1.6.x uses the current umask to set the privileges of the private key, which might allow local users to obtain the private key by reading the file.
0
Attacker Value
Unknown

CVE-2014-7058

Disclosure Date: October 19, 2014 (last updated October 05, 2023)
The Efendimizin Sunnetleri (aka com.wEfendimizinSunnetleri) application 2.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
0