Show filters
5 Total Results
Displaying 1-5 of 5
Sort by:
Attacker Value
Unknown

CVE-2022-3276

Disclosure Date: October 07, 2022 (last updated February 24, 2025)
Command injection is possible in the puppetlabs-mysql module prior to version 13.0.0. A malicious actor is able to exploit this vulnerability only if they are able to provide unsanitized input to the module. This condition is rare in most deployments of Puppet and Puppet Enterprise.
Attacker Value
Unknown

CVE-2022-3275

Disclosure Date: October 07, 2022 (last updated February 24, 2025)
Command injection is possible in the puppetlabs-apt module prior to version 9.0.0. A malicious actor is able to exploit this vulnerability only if they are able to provide unsanitized input to the module. This condition is rare in most deployments of Puppet and Puppet Enterprise.
Attacker Value
Unknown

CVE-2020-29128

Disclosure Date: November 26, 2020 (last updated February 22, 2025)
petl before 1.68, in some configurations, allows resolution of entities in an XML document.
Attacker Value
Unknown

CVE-2015-7224

Disclosure Date: December 21, 2017 (last updated November 26, 2024)
puppetlabs-mysql 3.1.0 through 3.6.0 allow remote attackers to bypass authentication by leveraging creation of a database account without a password when a 'mysql_user' user parameter contains a host with a netmask.
0
Attacker Value
Unknown

CVE-2017-2299

Disclosure Date: September 15, 2017 (last updated November 26, 2024)
Versions of the puppetlabs-apache module prior to 1.11.1 and 2.1.0 make it very easy to accidentally misconfigure TLS trust. If you specify the `ssl_ca` parameter but do not specify the `ssl_certs_dir` parameter, a default will be provided for the `ssl_certs_dir` that will trust certificates from any of the system-trusted certificate authorities. This did not affect FreeBSD.
0