Show filters
134 Total Results
Displaying 71-80 of 134
Sort by:
Attacker Value
Unknown
CVE-2015-6501
Disclosure Date: January 12, 2017 (last updated November 25, 2024)
Open redirect vulnerability in the Console in Puppet Enterprise before 2015.2.1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the string parameter.
0
Attacker Value
Unknown
CVE-2016-2786
Disclosure Date: June 10, 2016 (last updated November 25, 2024)
The pxp-agent component in Puppet Enterprise 2015.3.x before 2015.3.3 and Puppet Agent 1.3.x before 1.3.6 does not properly validate server certificates, which might allow remote attackers to spoof brokers and execute arbitrary commands via a crafted certificate.
0
Attacker Value
Unknown
CVE-2016-2785
Disclosure Date: June 10, 2016 (last updated November 25, 2024)
Puppet Server before 2.3.2 and Ruby puppetmaster in Puppet 4.x before 4.4.2 and in Puppet Agent before 1.4.2 might allow remote attackers to bypass intended auth.conf access restrictions by leveraging incorrect URL decoding.
0
Attacker Value
Unknown
CVE-2015-7330
Disclosure Date: April 11, 2016 (last updated November 25, 2024)
Puppet Enterprise 2015.3 before 2015.3.1 allows remote attackers to bypass a host whitelist protection mechanism by leveraging the Puppet communications protocol.
0
Attacker Value
Unknown
CVE-2015-7328
Disclosure Date: January 08, 2016 (last updated November 25, 2024)
Puppet Server in Puppet Enterprise before 3.8.x before 3.8.3 and 2015.2.x before 2015.2.3 uses world-readable permissions for the private key of the Certification Authority (CA) certificate during the initial installation and configuration, which might allow local users to obtain sensitive information via unspecified vectors.
0
Attacker Value
Unknown
CVE-2015-1426
Disclosure Date: February 23, 2015 (last updated October 05, 2023)
Puppet Labs Facter 1.6.0 through 2.4.0 allows local users to obtains sensitive Amazon EC2 IAM instance metadata by reading a fact for an Amazon EC2 node.
0
Attacker Value
Unknown
CVE-2015-1029
Disclosure Date: January 16, 2015 (last updated October 05, 2023)
The puppetlabs-stdlib module 2.1 through 3.0 and 4.1.0 through 4.5.x before 4.5.1 for Puppet 2.8.8 and earlier allows remote authenticated users to gain privileges or obtain sensitive information by prepopulating the fact cache.
0
Attacker Value
Unknown
CVE-2014-9355
Disclosure Date: December 19, 2014 (last updated October 05, 2023)
Puppet Enterprise before 3.7.1 allows remote authenticated users to obtain licensing and certificate signing request information by leveraging access to an unspecified API endpoint.
0
Attacker Value
Unknown
CVE-2014-7170
Disclosure Date: December 17, 2014 (last updated October 05, 2023)
Race condition in Puppet Server 0.2.0 allows local users to obtain sensitive information by accessing it in between package installation or upgrade and the start of the service.
0
Attacker Value
Unknown
CVE-2014-3248
Disclosure Date: November 16, 2014 (last updated October 05, 2023)
Untrusted search path vulnerability in Puppet Enterprise 2.8 before 2.8.7, Puppet before 2.7.26 and 3.x before 3.6.2, Facter 1.6.x and 2.x before 2.0.2, Hiera before 1.3.4, and Mcollective before 2.5.2, when running with Ruby 1.9.1 or earlier, allows local users to gain privileges via a Trojan horse file in the current working directory, as demonstrated using (1) rubygems/defaults/operating_system.rb, (2) Win32API.rb, (3) Win32API.so, (4) safe_yaml.rb, (5) safe_yaml/deep.rb, or (6) safe_yaml/deep.so; or (7) operatingsystem.rb, (8) operatingsystem.so, (9) osfamily.rb, or (10) osfamily.so in puppet/confine.
0