Puppet 2.6.x and 2.7.x before 2.7.13, and Puppet Enterprise Users 1.0-2.5.x before 2.5.1 allows remote authenticated users to execute arbitrary command
Reporter | Title | Published | Views | Family All 45 |
---|---|---|---|---|
![]() | CVE-2012-1988 | 29 May 201220:55 | – | cve |
![]() | CVE-2012-1988 | 29 May 201220:00 | – | cvelist |
![]() | Puppet Arbitrary Command Execution | 14 May 202200:56 | – | osv |
![]() | puppet - several | 13 Apr 201200:00 | – | osv |
![]() | CVE-2012-1988 | 29 May 201220:55 | – | nvd |
![]() | Puppet Arbitrary Command Execution | 13 May 202221:00 | – | rubygems |
![]() | Puppet Arbitrary Command Execution | 14 May 202200:56 | – | github |
![]() | Design/Logic Flaw | 29 May 201220:55 | – | prion |
![]() | CVE-2012-1988 | 11 Apr 201200:00 | – | ubuntucve |
![]() | [SECURITY] Fedora 17 Update: puppet-2.7.13-1.fc17 | 6 May 201204:52 | – | fedora |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Debian | 11 | all | puppet | 2.7.13-1 | puppet_2.7.13-1_all.deb |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo