Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
saltstack salt 0.17.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2013-4435
Salt (aka SaltStack) 0.15.0 up to and including 0.17.0 allows remote authenticated users who are using external authentication or client ACL to execute restricted routines by embedding the routine in another routine.
Saltstack Salt 0.15.0
Saltstack Salt 0.15.1
Saltstack Salt 0.17.0
Saltstack Salt 0.16.0
Saltstack Salt 0.16.3
Saltstack Salt 0.16.2
Saltstack Salt 0.16.4
NA
CVE-2013-4439
Salt (aka SaltStack) prior to 0.15.0 up to and including 0.17.0 allows remote authenticated minions to impersonate arbitrary minions via a crafted minion with a valid key.
Saltstack Salt 0.15.0
Saltstack Salt 0.15.1
Saltstack Salt 0.16.0
Saltstack Salt 0.16.2
Saltstack Salt 0.16.3
Saltstack Salt 0.16.4
Saltstack Salt 0.17.0
NA
CVE-2013-6617
The salt master in Salt (aka SaltStack) 0.11.0 up to and including 0.17.0 does not properly drop group privileges, which makes it easier for remote malicious users to gain privileges.
Saltstack Salt 0.16.2
Saltstack Salt 0.16.3
Saltstack Salt 0.16.4
Saltstack Salt 0.17.0
Saltstack Salt 0.14.0
Saltstack Salt 0.15.1
Saltstack Salt 0.11.0
Saltstack Salt 0.13.0
Saltstack Salt 0.15.0
Saltstack Salt 0.16.0
Saltstack Salt 0.12.0
NA
CVE-2013-4436
The default configuration for salt-ssh in Salt (aka SaltStack) 0.17.0 does not validate the SSH host key of requests, which allows remote malicious users to have unspecified impact via a man-in-the-middle (MITM) attack.
Saltstack Salt 0.17.0
NA
CVE-2013-4437
Unspecified vulnerability in salt-ssh in Salt (aka SaltStack) 0.17.0 has unspecified impact and vectors related to "insecure Usage of /tmp."
Saltstack Salt 0.17.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-22460
CVE-2024-4646
CVE-2024-29212
IMAP
CVE-2023-36672
CVE-2024-34547
command injection
CVE-2024-4651
stored XSS
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started