Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/puppet@3.7.2-4%2Bdeb8u1~bpo70%2B1
Typedeb
Namespacedebian
Namepuppet
Version3.7.2-4+deb8u1~bpo70+1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version5.5.10-4
Latest_non_vulnerable_version5.5.10-4
Affected_by_vulnerabilities
0
url VCID-18aq-72zg-3uc9
vulnerability_id VCID-18aq-72zg-3uc9
summary puppet: Unsafe YAML deserialization
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2295.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2295.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-2295
reference_id
reference_type
scores
0
value 0.01893
scoring_system epss
scoring_elements 0.8313
published_at 2026-04-01T12:55:00Z
1
value 0.01893
scoring_system epss
scoring_elements 0.83236
published_at 2026-04-21T12:55:00Z
2
value 0.01893
scoring_system epss
scoring_elements 0.83233
published_at 2026-04-16T12:55:00Z
3
value 0.01893
scoring_system epss
scoring_elements 0.83234
published_at 2026-04-18T12:55:00Z
4
value 0.01893
scoring_system epss
scoring_elements 0.83147
published_at 2026-04-02T12:55:00Z
5
value 0.01893
scoring_system epss
scoring_elements 0.83161
published_at 2026-04-04T12:55:00Z
6
value 0.01893
scoring_system epss
scoring_elements 0.83159
published_at 2026-04-07T12:55:00Z
7
value 0.01893
scoring_system epss
scoring_elements 0.83184
published_at 2026-04-08T12:55:00Z
8
value 0.01893
scoring_system epss
scoring_elements 0.83191
published_at 2026-04-09T12:55:00Z
9
value 0.01893
scoring_system epss
scoring_elements 0.83207
published_at 2026-04-11T12:55:00Z
10
value 0.01893
scoring_system epss
scoring_elements 0.83201
published_at 2026-04-12T12:55:00Z
11
value 0.01893
scoring_system epss
scoring_elements 0.83197
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-2295
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2295
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:C/A:C
1
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1452651
reference_id 1452651
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1452651
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863212
reference_id 863212
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863212
6
reference_url https://usn.ubuntu.com/3308-1/
reference_id USN-3308-1
reference_type
scores
url https://usn.ubuntu.com/3308-1/
7
reference_url https://usn.ubuntu.com/USN-4804-1/
reference_id USN-USN-4804-1
reference_type
scores
url https://usn.ubuntu.com/USN-4804-1/
fixed_packages
0
url pkg:deb/debian/puppet@3.7.2-4%2Bdeb8u1
purl pkg:deb/debian/puppet@3.7.2-4%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18aq-72zg-3uc9
1
vulnerability VCID-8xgm-pabz-hkeg
2
vulnerability VCID-bt3p-h1js-53gg
3
vulnerability VCID-wkb1-dm1m-67db
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/puppet@3.7.2-4%252Bdeb8u1
1
url pkg:deb/debian/puppet@4.8.2-5
purl pkg:deb/debian/puppet@4.8.2-5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-8xgm-pabz-hkeg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/puppet@4.8.2-5
aliases CVE-2017-2295
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-18aq-72zg-3uc9
1
url VCID-8xgm-pabz-hkeg
vulnerability_id VCID-8xgm-pabz-hkeg
summary
Improper Privilege Management
In previous versions of Puppet Agent it was possible to install a module with world writable permissions. Puppet Agent 5.3.4 and 1.10.10 included a fix to this vulnerability.
references
0
reference_url https://access.redhat.com/errata/RHSA-2018:2927
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:2927
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10689.json
reference_id
reference_type
scores
0
value 2.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10689.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10689
reference_id
reference_type
scores
0
value 0.00092
scoring_system epss
scoring_elements 0.25732
published_at 2026-04-16T12:55:00Z
1
value 0.00092
scoring_system epss
scoring_elements 0.25728
published_at 2026-04-13T12:55:00Z
2
value 0.00092
scoring_system epss
scoring_elements 0.25786
published_at 2026-04-12T12:55:00Z
3
value 0.00092
scoring_system epss
scoring_elements 0.25828
published_at 2026-04-11T12:55:00Z
4
value 0.00092
scoring_system epss
scoring_elements 0.25819
published_at 2026-04-09T12:55:00Z
5
value 0.00092
scoring_system epss
scoring_elements 0.2577
published_at 2026-04-08T12:55:00Z
6
value 0.00092
scoring_system epss
scoring_elements 0.25699
published_at 2026-04-07T12:55:00Z
7
value 0.00092
scoring_system epss
scoring_elements 0.2593
published_at 2026-04-04T12:55:00Z
8
value 0.00092
scoring_system epss
scoring_elements 0.25887
published_at 2026-04-02T12:55:00Z
9
value 0.00092
scoring_system epss
scoring_elements 0.25827
published_at 2026-04-01T12:55:00Z
10
value 0.00092
scoring_system epss
scoring_elements 0.25689
published_at 2026-04-21T12:55:00Z
11
value 0.00092
scoring_system epss
scoring_elements 0.25714
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10689
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10689
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10689
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/puppetlabs/puppet
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/puppetlabs/puppet
6
reference_url https://github.com/puppetlabs/puppet/commit/17d9e02da3882e44c1876e2805cf9708481715ee
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/puppetlabs/puppet/commit/17d9e02da3882e44c1876e2805cf9708481715ee
7
reference_url https://github.com/puppetlabs/puppet/commit/2f1047f85e22cde139a421bc25d371f2ffc92cb1
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/puppetlabs/puppet/commit/2f1047f85e22cde139a421bc25d371f2ffc92cb1
8
reference_url https://tickets.puppetlabs.com/browse/PUP-7866
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://tickets.puppetlabs.com/browse/PUP-7866
9
reference_url https://usn.ubuntu.com/3567-1
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://usn.ubuntu.com/3567-1
10
reference_url https://usn.ubuntu.com/3567-1/
reference_id
reference_type
scores
url https://usn.ubuntu.com/3567-1/
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1542850
reference_id 1542850
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1542850
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=890412
reference_id 890412
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=890412
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-10689
reference_id CVE-2017-10689
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2017-10689
14
reference_url https://puppet.com/security/cve/CVE-2017-10689
reference_id CVE-2017-10689
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements
1
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://puppet.com/security/cve/CVE-2017-10689
15
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2017-10689.yml
reference_id CVE-2017-10689.YML
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2017-10689.yml
16
reference_url https://github.com/advisories/GHSA-vw22-465p-8j5w
reference_id GHSA-vw22-465p-8j5w
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-vw22-465p-8j5w
17
reference_url https://usn.ubuntu.com/USN-4804-1/
reference_id USN-USN-4804-1
reference_type
scores
url https://usn.ubuntu.com/USN-4804-1/
fixed_packages
0
url pkg:deb/debian/puppet@5.5.10-4
purl pkg:deb/debian/puppet@5.5.10-4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/puppet@5.5.10-4
aliases CVE-2017-10689, GHSA-vw22-465p-8j5w
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8xgm-pabz-hkeg
2
url VCID-bt3p-h1js-53gg
vulnerability_id VCID-bt3p-h1js-53gg
summary Versions of Puppet Agent prior to 1.6.0 included a version of the Puppet Execution Protocol (PXP) agent that passed environment variables through to Puppet runs. This could allow unauthorized code to be loaded. This bug was first introduced in Puppet Agent 1.3.0.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5713
reference_id
reference_type
scores
0
value 0.0112
scoring_system epss
scoring_elements 0.78268
published_at 2026-04-21T12:55:00Z
1
value 0.0112
scoring_system epss
scoring_elements 0.78271
published_at 2026-04-18T12:55:00Z
2
value 0.0112
scoring_system epss
scoring_elements 0.78185
published_at 2026-04-01T12:55:00Z
3
value 0.0112
scoring_system epss
scoring_elements 0.78194
published_at 2026-04-02T12:55:00Z
4
value 0.0112
scoring_system epss
scoring_elements 0.78224
published_at 2026-04-04T12:55:00Z
5
value 0.0112
scoring_system epss
scoring_elements 0.78206
published_at 2026-04-07T12:55:00Z
6
value 0.0112
scoring_system epss
scoring_elements 0.78232
published_at 2026-04-08T12:55:00Z
7
value 0.0112
scoring_system epss
scoring_elements 0.78238
published_at 2026-04-09T12:55:00Z
8
value 0.0112
scoring_system epss
scoring_elements 0.78264
published_at 2026-04-11T12:55:00Z
9
value 0.0112
scoring_system epss
scoring_elements 0.78247
published_at 2026-04-12T12:55:00Z
10
value 0.0112
scoring_system epss
scoring_elements 0.78242
published_at 2026-04-13T12:55:00Z
11
value 0.0112
scoring_system epss
scoring_elements 0.78274
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5713
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5713
2
reference_url https://puppet.com/security/cve/cve-2016-5713
reference_id
reference_type
scores
url https://puppet.com/security/cve/cve-2016-5713
3
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:puppet:puppet_agent:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:puppet:puppet_agent:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:puppet:puppet_agent:*:*:*:*:*:*:*:*
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-5713
reference_id CVE-2016-5713
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-5713
fixed_packages
0
url pkg:deb/debian/puppet@4.8.2-5~bpo8%2B1
purl pkg:deb/debian/puppet@4.8.2-5~bpo8%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18aq-72zg-3uc9
1
vulnerability VCID-8xgm-pabz-hkeg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/puppet@4.8.2-5~bpo8%252B1
aliases CVE-2016-5713
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bt3p-h1js-53gg
3
url VCID-wkb1-dm1m-67db
vulnerability_id VCID-wkb1-dm1m-67db
summary
Multiple vulnerabilities have been found in Puppet Agent, the worst
    of which could result in the execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5714
reference_id
reference_type
scores
0
value 0.0101
scoring_system epss
scoring_elements 0.77138
published_at 2026-04-21T12:55:00Z
1
value 0.0101
scoring_system epss
scoring_elements 0.77147
published_at 2026-04-18T12:55:00Z
2
value 0.0101
scoring_system epss
scoring_elements 0.77044
published_at 2026-04-01T12:55:00Z
3
value 0.0101
scoring_system epss
scoring_elements 0.77049
published_at 2026-04-02T12:55:00Z
4
value 0.0101
scoring_system epss
scoring_elements 0.77078
published_at 2026-04-04T12:55:00Z
5
value 0.0101
scoring_system epss
scoring_elements 0.7706
published_at 2026-04-07T12:55:00Z
6
value 0.0101
scoring_system epss
scoring_elements 0.77092
published_at 2026-04-08T12:55:00Z
7
value 0.0101
scoring_system epss
scoring_elements 0.77102
published_at 2026-04-09T12:55:00Z
8
value 0.0101
scoring_system epss
scoring_elements 0.77129
published_at 2026-04-11T12:55:00Z
9
value 0.0101
scoring_system epss
scoring_elements 0.77109
published_at 2026-04-12T12:55:00Z
10
value 0.0101
scoring_system epss
scoring_elements 0.77105
published_at 2026-04-13T12:55:00Z
11
value 0.0101
scoring_system epss
scoring_elements 0.77145
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5714
1
reference_url https://bugs.gentoo.org/597684
reference_id
reference_type
scores
url https://bugs.gentoo.org/597684
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5714
3
reference_url https://puppet.com/security/cve/cve-2016-5714
reference_id
reference_type
scores
url https://puppet.com/security/cve/cve-2016-5714
4
reference_url https://puppet.com/security/cve/pxp-agent-oct-2016
reference_id
reference_type
scores
url https://puppet.com/security/cve/pxp-agent-oct-2016
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:puppet:puppet_agent:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:puppet:puppet_agent:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:puppet:puppet_agent:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:puppet:puppet_enterprise:2015.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:puppet:puppet_enterprise:2015.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:puppet:puppet_enterprise:2015.3.3:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:puppet:puppet_enterprise:2016.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:puppet:puppet_enterprise:2016.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:puppet:puppet_enterprise:2016.1.1:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:puppet:puppet_enterprise:2016.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:puppet:puppet_enterprise:2016.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:puppet:puppet_enterprise:2016.1.2:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:puppet:puppet_enterprise:2016.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:puppet:puppet_enterprise:2016.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:puppet:puppet_enterprise:2016.2.0:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:puppet:puppet_enterprise:2016.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:puppet:puppet_enterprise:2016.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:puppet:puppet_enterprise:2016.2.1:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-5714
reference_id CVE-2016-5714
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
1
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-5714
12
reference_url https://security.gentoo.org/glsa/201710-12
reference_id GLSA-201710-12
reference_type
scores
url https://security.gentoo.org/glsa/201710-12
fixed_packages
0
url pkg:deb/debian/puppet@4.8.2-5~bpo8%2B1
purl pkg:deb/debian/puppet@4.8.2-5~bpo8%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18aq-72zg-3uc9
1
vulnerability VCID-8xgm-pabz-hkeg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/puppet@4.8.2-5~bpo8%252B1
aliases CVE-2016-5714
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wkb1-dm1m-67db
Fixing_vulnerabilities
Risk_score4.4
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/puppet@3.7.2-4%252Bdeb8u1~bpo70%252B1