Page 8 of 71 results (0.002 seconds)

CVSS: 5.0EPSS: 0%CPEs: 4EXPL: 0

Puppet Enterprise before 3.2.0 does not properly restrict access to node endpoints in the console, which allows remote attackers to obtain sensitive information via unspecified vectors. Puppet Enterprise anterior a 3.2.0 no restringe debidamente acceso a Endpoints de nodo en la consola, lo que permite a atacantes remotos obtener información sensible a través de vectores no especificados. • http://puppetlabs.com/security/cve/cve-2013-4971 http://www.securitytracker.com/id/1029873 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 2.1EPSS: 0%CPEs: 11EXPL: 0

Puppet before 3.3.3 and 3.4 before 3.4.1 and Puppet Enterprise (PE) before 2.8.4 and 3.1 before 3.1.1 allows local users to overwrite arbitrary files via a symlink attack on unspecified files. Puppet anteriores a 3.3.3. y 3.4 anteriores a 3.4.1 y Puppet Enterprise (PE) anteriores a 2.8.4 y 3.1 anteriores a 3.1.1 permite a usuarios locales sobreescribir ficheros arbitrarios a través de un ataque de enlaces simbólicos en ficheros no especificados. • http://puppetlabs.com/security/cve/cve-2013-4969 http://secunia.com/advisories/56253 http://secunia.com/advisories/56254 http://www.debian.org/security/2013/dsa-2831 http://www.ubuntu.com/usn/USN-2077-1 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

Puppet Enterprise before 3.1.0 does not properly restrict the number of authentication attempts by a console account, which makes it easier for remote attackers to bypass intended access restrictions via a brute-force attack. Puppet Enterprise anteriores a 3.1.0 no restringe el número de intentos de autenticación apropiadamente a traves de consola, lo que permite a un atacante remoto sortear las restricciones de acceso a traves de ataques de fuerza bruta. • http://osvdb.org/98640 http://puppetlabs.com/security/cve/cve-2013-4965 • CWE-287: Improper Authentication •

CVSS: 6.8EPSS: 0%CPEs: 7EXPL: 0

The dashboard report in Puppet Enterprise before 3.0.1 allows attackers to execute arbitrary YAML code via a crafted report-specific type. El panel de informe en Puppet Enterprise anterior a la versión 3.0.1 permite a atacantes remotos ejecutar código arbitrario YAML a través de un tipo de informe específico. • http://osvdb.org/98639 http://puppetlabs.com/security/cve/cve-2013-4957 http://secunia.com/advisories/55362 https://exchange.xforce.ibmcloud.com/vulnerabilities/88089 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 6.9EPSS: 0%CPEs: 7EXPL: 0

Puppet Enterprise before 3.0.1 does not use a session timeout, which makes it easier for attackers to gain privileges by leveraging an unattended workstation. Puppet Enterprise anterior a 3.0.1, no utiliza un timeout para las sesiones, lo que facilita a atacantes la obtención de privilegios aprovechando un PC desatendido físicamente. • http://puppetlabs.com/security/cve/cve-2013-4958 • CWE-287: Improper Authentication •