Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-62348

Опубликовано: 30 янв. 2026
Источник: debian
EPSS Низкий

Описание

Salt's junos execution module contained an unsafe YAML decode/load usage. A specially crafted YAML payload processed by the junos module could lead to unintended code execution under the context of the Salt process.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
saltremovedpackage

EPSS

Процентиль: 1%
0.00009
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
8 дней назад

Salt's junos execution module contained an unsafe YAML decode/load usage. A specially crafted YAML payload processed by the junos module could lead to unintended code execution under the context of the Salt process.

CVSS3: 7.8
nvd
8 дней назад

Salt's junos execution module contained an unsafe YAML decode/load usage. A specially crafted YAML payload processed by the junos module could lead to unintended code execution under the context of the Salt process.

CVSS3: 7.8
github
8 дней назад

Salt junos Module Vulnerable to Code Injection via Specially Crafted YAML Payload

suse-cvrf
около 2 месяцев назад

Security update for salt

suse-cvrf
около 2 месяцев назад

Security update for salt

EPSS

Процентиль: 1%
0.00009
Низкий