Логотип exploitDog
bind:CVE-2016-5714
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2016-5714

Количество 4

Количество 4

ubuntu логотип

CVE-2016-5714

больше 8 лет назад

Puppet Enterprise 2015.3.3 and 2016.x before 2016.4.0, and Puppet Agent 1.3.6 through 1.7.0 allow remote attackers to bypass a host whitelist protection mechanism and execute arbitrary code on Puppet nodes via vectors related to command validation, aka "Puppet Execution Protocol (PXP) Command Whitelist Validation Vulnerability."

CVSS3: 7.2
EPSS: Низкий
nvd логотип

CVE-2016-5714

больше 8 лет назад

Puppet Enterprise 2015.3.3 and 2016.x before 2016.4.0, and Puppet Agent 1.3.6 through 1.7.0 allow remote attackers to bypass a host whitelist protection mechanism and execute arbitrary code on Puppet nodes via vectors related to command validation, aka "Puppet Execution Protocol (PXP) Command Whitelist Validation Vulnerability."

CVSS3: 7.2
EPSS: Низкий
debian логотип

CVE-2016-5714

больше 8 лет назад

Puppet Enterprise 2015.3.3 and 2016.x before 2016.4.0, and Puppet Agen ...

CVSS3: 7.2
EPSS: Низкий
github логотип

GHSA-4h9c-3928-3w6h

больше 3 лет назад

Puppet Enterprise 2015.3.3 and 2016.x before 2016.4.0, and Puppet Agent 1.3.6 through 1.7.0 allow remote attackers to bypass a host whitelist protection mechanism and execute arbitrary code on Puppet nodes via vectors related to command validation, aka "Puppet Execution Protocol (PXP) Command Whitelist Validation Vulnerability."

CVSS3: 7.2
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2016-5714

Puppet Enterprise 2015.3.3 and 2016.x before 2016.4.0, and Puppet Agent 1.3.6 through 1.7.0 allow remote attackers to bypass a host whitelist protection mechanism and execute arbitrary code on Puppet nodes via vectors related to command validation, aka "Puppet Execution Protocol (PXP) Command Whitelist Validation Vulnerability."

CVSS3: 7.2
1%
Низкий
больше 8 лет назад
nvd логотип
CVE-2016-5714

Puppet Enterprise 2015.3.3 and 2016.x before 2016.4.0, and Puppet Agent 1.3.6 through 1.7.0 allow remote attackers to bypass a host whitelist protection mechanism and execute arbitrary code on Puppet nodes via vectors related to command validation, aka "Puppet Execution Protocol (PXP) Command Whitelist Validation Vulnerability."

CVSS3: 7.2
1%
Низкий
больше 8 лет назад
debian логотип
CVE-2016-5714

Puppet Enterprise 2015.3.3 and 2016.x before 2016.4.0, and Puppet Agen ...

CVSS3: 7.2
1%
Низкий
больше 8 лет назад
github логотип
GHSA-4h9c-3928-3w6h

Puppet Enterprise 2015.3.3 and 2016.x before 2016.4.0, and Puppet Agent 1.3.6 through 1.7.0 allow remote attackers to bypass a host whitelist protection mechanism and execute arbitrary code on Puppet nodes via vectors related to command validation, aka "Puppet Execution Protocol (PXP) Command Whitelist Validation Vulnerability."

CVSS3: 7.2
1%
Низкий
больше 3 лет назад

Уязвимостей на страницу