Show filters
5 Total Results
Displaying 1-5 of 5
Sort by:
Attacker Value
Unknown
CVE-2022-3276
Disclosure Date: October 07, 2022 (last updated February 24, 2025)
Command injection is possible in the puppetlabs-mysql module prior to version 13.0.0. A malicious actor is able to exploit this vulnerability only if they are able to provide unsanitized input to the module. This condition is rare in most deployments of Puppet and Puppet Enterprise.
0
Attacker Value
Unknown
CVE-2022-3275
Disclosure Date: October 07, 2022 (last updated February 24, 2025)
Command injection is possible in the puppetlabs-apt module prior to version 9.0.0. A malicious actor is able to exploit this vulnerability only if they are able to provide unsanitized input to the module. This condition is rare in most deployments of Puppet and Puppet Enterprise.
0
Attacker Value
Unknown
CVE-2020-29128
Disclosure Date: November 26, 2020 (last updated February 22, 2025)
petl before 1.68, in some configurations, allows resolution of entities in an XML document.
0
Attacker Value
Unknown
CVE-2015-7224
Disclosure Date: December 21, 2017 (last updated November 26, 2024)
puppetlabs-mysql 3.1.0 through 3.6.0 allow remote attackers to bypass authentication by leveraging creation of a database account without a password when a 'mysql_user' user parameter contains a host with a netmask.
0
Attacker Value
Unknown
CVE-2017-2299
Disclosure Date: September 15, 2017 (last updated November 26, 2024)
Versions of the puppetlabs-apache module prior to 1.11.1 and 2.1.0 make it very easy to accidentally misconfigure TLS trust. If you specify the `ssl_ca` parameter but do not specify the `ssl_certs_dir` parameter, a default will be provided for the `ssl_certs_dir` that will trust certificates from any of the system-trusted certificate authorities. This did not affect FreeBSD.
0