Search for packages
| purl | pkg:deb/debian/mcollective@2.6.0%2Bdfsg-2.1 |
| Next non-vulnerable version | 2.12.1+dfsg-1 |
| Latest non-vulnerable version | 2.12.1+dfsg-1 |
| Risk | 3.6 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-casd-wvax-8yde
Aliases: CVE-2016-2788 |
mcollective: Improper validation of fields in MCollective pings |
Affected by 0 other vulnerabilities. |
|
VCID-e88t-j5b4-s7ba
Aliases: CVE-2017-2292 |
A vulnerability in MCollective might allow remote attackers to execute arbitrary code. |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-6raq-jq1v-cyde | Two vulnerabilities have been found in MCollective, the worst of which could lead to privilege escalation. |
CVE-2014-3251
|
| VCID-7ypq-wmb7-quhc | Moderate severity vulnerability that affects facter, hiera, mcollective-client, and puppet Untrusted search path vulnerability in Puppet Enterprise 2.8 before 2.8.7, Puppet before 2.7.26 and 3.x before 3.6.2, Facter 1.6.x and 2.x before 2.0.2, Hiera before 1.3.4, and Mcollective before 2.5.2, when running with Ruby 1.9.1 or earlier, allows local users to gain privileges via a Trojan horse file in the current working directory, as demonstrated using (1) rubygems/defaults/operating_system.rb, (2) Win32API.rb, (3) Win32API.so, (4) safe_yaml.rb, (5) safe_yaml/deep.rb, or (6) safe_yaml/deep.so; or (7) operatingsystem.rb, (8) operatingsystem.so, (9) osfamily.rb, or (10) osfamily.so in puppet/confine. |
CVE-2014-3248
GHSA-92v7-pq4h-58j5 |