語系:
https://puppet.com/security/cve/cve-2013-4073
https://puppet.com/security/cve/cve-2013-4761
https://puppet.com/security/cve/cve-2013-4762
https://puppet.com/security/cve/cve-2013-4955
https://puppet.com/security/cve/cve-2013-4956
https://puppet.com/security/cve/cve-2013-4958
https://puppet.com/security/cve/cve-2013-4959
https://puppet.com/security/cve/cve-2013-4961
https://puppet.com/security/cve/cve-2013-4962
https://puppet.com/security/cve/cve-2013-4963
https://puppet.com/security/cve/cve-2013-4964
嚴重性: Medium
ID: 70663
檔案名稱: puppet_enterprise_301.nasl
版本: 1.9
類型: remote
系列: CGI abuses
已發布: 2013/10/28
已更新: 2021/1/19
支援的感應器: Nessus
風險因素: Medium
分數: 5.9
風險因素: Medium
基本分數: 6.9
時間分數: 5.1
媒介: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C
CPE: cpe:/a:puppetlabs:puppet
必要的 KB 項目: puppet/rest_port
可輕鬆利用: No exploit is required
修補程式發佈日期: 2013/8/15
弱點發布日期: 2013/8/15
CVE: CVE-2013-4073, CVE-2013-4761, CVE-2013-4762, CVE-2013-4955, CVE-2013-4956, CVE-2013-4958, CVE-2013-4959, CVE-2013-4961, CVE-2013-4962, CVE-2013-4963, CVE-2013-4964, CVE-2013-4967, CVE-2013-4968
BID: 60843, 61805, 61806, 61856, 61857, 61859, 61860, 61861, 61862, 61870, 61945, 61949, 66541