The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Puppet

Continuous Delivery for Puppet Enterprise: information disclosure via Impact Analysis Report
An attacker can bypass access restrictions to data via Impact Analysis Report of Continuous Delivery for Puppet Enterprise, in order to obtain sensitive information...
CVE-2020-7944, VIGILANCE-VUL-32610
Ruby: information disclosure via Socket Library
A local attacker can read a memory fragment via Socket Library of Ruby, in order to obtain sensitive information...
CVE-2020-10933, DSA-4721-1, FEDORA-2020-a95706b117, openSUSE-SU-2020:0586-1, VIGILANCE-VUL-32164
Puppet: information disclosure
An attacker can bypass access restrictions to data of Puppet, in order to obtain sensitive information...
CVE-2020-7943, VIGILANCE-VUL-31762
Puppet: information disclosure via Compromised Certificate
An attacker can bypass access restrictions to data via Compromised Certificate of Puppet, in order to obtain sensitive information...
CVE-2020-7942, SUSE-SU-2020:1057-1, VIGILANCE-VUL-31632
RubyGem Rack: privilege escalation via Session ID Time Measurement
An attacker can bypass restrictions via Session ID Time Measurement of RubyGem Rack, in order to escalate his privileges...
CVE-2019-16782, FEDORA-2020-57fc0d0156, openSUSE-SU-2020:0214-1, SUSE-SU-2020:0359-1, VIGILANCE-VUL-31365
Oracle Java: vulnerabilities of January 2020
Several vulnerabilities were announced in Oracle products...
1289194, 3260187, 5694963, 6120873, 6121041, 6199287, 6199289, 6201679, 6210521, 6210522, 6217590, 6235912, 6245356, 6248703, 6248705, 6250533, 6256052, 6257207, 6338657, 6338659, CERTFR-2020-AVI-035, CERTFR-2020-AVI-176, cpujan2020, CVE-2020-2583, CVE-2020-2585, CVE-2020-2590, CVE-2020-2593, CVE-2020-2601, CVE-2020-2604, CVE-2020-2654, CVE-2020-2655, CVE-2020-2659, DLA-2128-1, DSA-2020-062, DSA-2020-135, DSA-2020-198, DSA-4605-1, DSA-4621-1, FEDORA-2020-0a2dd63bf0, FEDORA-2020-202cb87e26, FEDORA-2020-2ed6716c30, FEDORA-2020-7e042e371a, FEDORA-2020-d735a887d1, FEDORA-2020-ebbf986d01, openSUSE-SU-2020:0113-1, openSUSE-SU-2020:0147-1, RHSA-2020:0122-01, RHSA-2020:0128-01, RHSA-2020:0157-01, RHSA-2020:0196-01, RHSA-2020:0202-01, RHSA-2020:0231-01, RHSA-2020:0232-01, RHSA-2020:0465-01, RHSA-2020:0467-01, RHSA-2020:0468-01, RHSA-2020:0469-01, RHSA-2020:0470-01, RHSA-2020:0541-01, RHSA-2020:0632-01, RHSA-2020:2236-01, RHSA-2020:2237-01, RHSA-2020:2238-01, RHSA-2020:2239-01, RHSA-2020:2241-01, RHSA-2020:3386-01, RHSA-2020:3387-01, RHSA-2020:3388-01, SB10315, SUSE-SU-2020:0140-1, SUSE-SU-2020:0213-1, SUSE-SU-2020:0261-1, SUSE-SU-2020:0456-1, SUSE-SU-2020:0466-1, SUSE-SU-2020:0528-1, SUSE-SU-2020:0628-1, SUSE-SU-2020:14286-1, SUSE-SU-2020:14287-1, SUSE-SU-2020:14398-1, SUSE-SU-2020:1683-1, SUSE-SU-2020:1684-1, SUSE-SU-2020:1685-1, USN-4257-1, VIGILANCE-VUL-31331
OpenSSL: information disclosure via Montgomery Squaring rsaz_512_sqr Overflow
An attacker can bypass access restrictions to data via Montgomery Squaring rsaz_512_sqr() Overflow of OpenSSL, in order to obtain sensitive information...
6228808, CERTFR-2019-AVI-611, cpujul2020, CVE-2019-1551, DSA-2020-062, DSA-2020-112, DSA-4594-1, JSA11025, JSA11074, openSUSE-SU-2020:0062-1, SSA:2019-354-01, SSB-439005, SUSE-SU-2020:0002-1, SUSE-SU-2020:0028-1, SUSE-SU-2020:0064-1, SUSE-SU-2020:0069-1, SUSE-SU-2020:0099-1, SUSE-SU-2020:0474-1, SYMSA1768, USN-4376-1, USN-4376-2, USN-4504-1, VIGILANCE-VUL-31088
Debian: privilege escalation via postgresql-common pg_ctlcluster Directory Creation
An attacker can bypass restrictions via postgresql-common pg_ctlcluster Directory Creation of Debian, in order to escalate his privileges...
CVE-2019-3466, DLA-1994-1, DSA-4568-1, USN-4194-1, USN-4194-2, VIGILANCE-VUL-30874
Netty: information disclosure via HTTP Request Smuggling
An attacker can bypass access restrictions to data via HTTP Request Smuggling of Netty, in order to obtain sensitive information...
6198380, CST-7312, CVE-2019-16869, DLA-1941-1, DLA-2110-1, DLA-2365-1, DSA-2020-066, DSA-2020-067, DSA-4597-1, RHSA-2020:0159-01, RHSA-2020:0160-01, RHSA-2020:0161-01, RHSA-2020:0164-01, RHSA-2020:0445-01, USN-4532-1, USN-4600-1, VIGILANCE-VUL-30480
HTTP/2: multiple vulnerabilities
An attacker can use several vulnerabilities of HTTP/2...
1072144, 1072860, 1167160, 6198380, bulletinoct2019, CERTFR-2019-AVI-389, cpuapr2020, cpuoct2020, CVE-2019-9511, CVE-2019-9512, CVE-2019-9513, CVE-2019-9514, CVE-2019-9515, CVE-2019-9516, CVE-2019-9517, CVE-2019-9518, DSA-4503-1, DSA-4505-1, DSA-4508-1, DSA-4511-1, DSA-4520-1, DSA-4669-1, FEDORA-2019-1686ae9b59, FEDORA-2019-5a6a7bc12c, FEDORA-2019-63ba15cc83, FEDORA-2019-7443ebda4b, FEDORA-2019-81985a8858, FEDORA-2019-8a437d5c2f, FEDORA-2019-befd924cfe, HT210436, NFLX-2019-002, openSUSE-SU-2019:2000-1, openSUSE-SU-2019:2051-1, openSUSE-SU-2019:2056-1, openSUSE-SU-2019:2072-1, openSUSE-SU-2019:2085-1, openSUSE-SU-2019:2114-1, openSUSE-SU-2019:2115-1, openSUSE-SU-2019:2120-1, openSUSE-SU-2019:2130-1, openSUSE-SU-2019:2232-1, openSUSE-SU-2019:2234-1, openSUSE-SU-2019:2264-1, RHSA-2019:2692-01, RHSA-2019:2726-01, RHSA-2019:2745-01, RHSA-2019:2746-01, RHSA-2019:2775-01, RHSA-2019:2799-01, RHSA-2019:2893-01, RHSA-2019:2925-01, RHSA-2019:2939-01, RHSA-2019:2949-01, RHSA-2019:2955-01, RHSA-2019:4018-01, RHSA-2019:4019-01, RHSA-2019:4020-01, RHSA-2019:4021-01, RHSA-2019:4040-01, RHSA-2019:4041-01, RHSA-2019:4042-01, RHSA-2019:4045-01, RHSA-2019:4269-01, RHSA-2019:4273-01, RHSA-2020:0406-01, SSA:2020-091-02, SUSE-SU-2019:2213-1, SUSE-SU-2019:2214-1, SUSE-SU-2019:2237-1, SUSE-SU-2019:2254-1, SUSE-SU-2019:2259-1, SUSE-SU-2019:2260-1, SUSE-SU-2019:2309-1, SUSE-SU-2019:2329-1, SUSE-SU-2019:2473-1, SUSE-SU-2019:2559-1, SUSE-SU-2020:0059-1, Synology-SA-19:33, Synology-SA-19:37, USN-4099-1, USN-4113-1, USN-4113-2, USN-4308-1, VIGILANCE-VUL-30040, VU#605641
Our database contains other pages. You can request a free trial to read them.

Display information about Puppet: