Логотип exploitDog
bind:"CVE-2017-2295"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2017-2295"

Количество 8

Количество 8

ubuntu логотип

CVE-2017-2295

больше 8 лет назад

Versions of Puppet prior to 4.10.1 will deserialize data off the wire (from the agent to the server, in this case) with a attacker-specified format. This could be used to force YAML deserialization in an unsafe manner, which would lead to remote code execution. This change constrains the format of data on the wire to PSON or safely decoded YAML.

CVSS3: 8.2
EPSS: Низкий
redhat логотип

CVE-2017-2295

больше 8 лет назад

Versions of Puppet prior to 4.10.1 will deserialize data off the wire (from the agent to the server, in this case) with a attacker-specified format. This could be used to force YAML deserialization in an unsafe manner, which would lead to remote code execution. This change constrains the format of data on the wire to PSON or safely decoded YAML.

CVSS3: 8.1
EPSS: Низкий
nvd логотип

CVE-2017-2295

больше 8 лет назад

Versions of Puppet prior to 4.10.1 will deserialize data off the wire (from the agent to the server, in this case) with a attacker-specified format. This could be used to force YAML deserialization in an unsafe manner, which would lead to remote code execution. This change constrains the format of data on the wire to PSON or safely decoded YAML.

CVSS3: 8.2
EPSS: Низкий
debian логотип

CVE-2017-2295

больше 8 лет назад

Versions of Puppet prior to 4.10.1 will deserialize data off the wire ...

CVSS3: 8.2
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2017:1948-1

больше 8 лет назад

Security update for rubygem-puppet

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:0600-1

почти 8 лет назад

Security update for puppet

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2017:2113-1

больше 8 лет назад

Security update for puppet

EPSS: Низкий
github логотип

GHSA-988w-9qqw-43hr

больше 3 лет назад

Versions of Puppet prior to 4.10.1 will deserialize data off the wire (from the agent to the server, in this case) with a attacker-specified format. This could be used to force YAML deserialization in an unsafe manner, which would lead to remote code execution. This change constrains the format of data on the wire to PSON or safely decoded YAML.

CVSS3: 8.2
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2017-2295

Versions of Puppet prior to 4.10.1 will deserialize data off the wire (from the agent to the server, in this case) with a attacker-specified format. This could be used to force YAML deserialization in an unsafe manner, which would lead to remote code execution. This change constrains the format of data on the wire to PSON or safely decoded YAML.

CVSS3: 8.2
2%
Низкий
больше 8 лет назад
redhat логотип
CVE-2017-2295

Versions of Puppet prior to 4.10.1 will deserialize data off the wire (from the agent to the server, in this case) with a attacker-specified format. This could be used to force YAML deserialization in an unsafe manner, which would lead to remote code execution. This change constrains the format of data on the wire to PSON or safely decoded YAML.

CVSS3: 8.1
2%
Низкий
больше 8 лет назад
nvd логотип
CVE-2017-2295

Versions of Puppet prior to 4.10.1 will deserialize data off the wire (from the agent to the server, in this case) with a attacker-specified format. This could be used to force YAML deserialization in an unsafe manner, which would lead to remote code execution. This change constrains the format of data on the wire to PSON or safely decoded YAML.

CVSS3: 8.2
2%
Низкий
больше 8 лет назад
debian логотип
CVE-2017-2295

Versions of Puppet prior to 4.10.1 will deserialize data off the wire ...

CVSS3: 8.2
2%
Низкий
больше 8 лет назад
suse-cvrf логотип
openSUSE-SU-2017:1948-1

Security update for rubygem-puppet

2%
Низкий
больше 8 лет назад
suse-cvrf логотип
SUSE-SU-2018:0600-1

Security update for puppet

2%
Низкий
почти 8 лет назад
suse-cvrf логотип
SUSE-SU-2017:2113-1

Security update for puppet

2%
Низкий
больше 8 лет назад
github логотип
GHSA-988w-9qqw-43hr

Versions of Puppet prior to 4.10.1 will deserialize data off the wire (from the agent to the server, in this case) with a attacker-specified format. This could be used to force YAML deserialization in an unsafe manner, which would lead to remote code execution. This change constrains the format of data on the wire to PSON or safely decoded YAML.

CVSS3: 8.2
2%
Низкий
больше 3 лет назад

Уязвимостей на страницу