Puppet 2.7.x prior to 2.7.21 and 3.1.x prior to 3.1.1, when running Ruby 1.9.3 or later, allows remote malicious users to execute arbitrary code via vectors related to "serialized attributes."
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
puppetlabs puppet 2.7.20 |
||
puppetlabs puppet 2.7.1 |
||
puppetlabs puppet 2.7.0 |
||
puppet puppet 2.7.16 |
||
puppet puppet 2.7.3 |
||
puppet puppet 2.7.11 |
||
puppet puppet 2.7.2 |
||
puppet puppet 2.7.13 |
||
puppet puppet 2.7.8 |
||
puppet puppet 2.7.10 |
||
puppet puppet_enterprise 3.1.0 |
||
puppet puppet 2.7.18 |
||
puppet puppet 2.7.17 |
||
puppet puppet 2.7.9 |
||
puppet puppet 2.7.4 |
||
puppetlabs puppet 2.7.19 |
||
puppet puppet 2.7.6 |
||
puppet puppet 2.7.7 |
||
puppet puppet 2.7.5 |
||
puppet puppet 2.7.14 |
||
puppet puppet 2.7.12 |