Language:
https://puppet.com/security/cve/cve-2013-4073
https://puppet.com/security/cve/cve-2013-4761
https://puppet.com/security/cve/cve-2013-4762
https://puppet.com/security/cve/cve-2013-4955
https://puppet.com/security/cve/cve-2013-4956
https://puppet.com/security/cve/cve-2013-4958
https://puppet.com/security/cve/cve-2013-4959
https://puppet.com/security/cve/cve-2013-4961
https://puppet.com/security/cve/cve-2013-4962
https://puppet.com/security/cve/cve-2013-4963
https://puppet.com/security/cve/cve-2013-4964
Severity: Medium
ID: 70663
File Name: puppet_enterprise_301.nasl
Version: 1.9
Type: remote
Family: CGI abuses
Published: 10/28/2013
Updated: 1/19/2021
Supported Sensors: Nessus
Risk Factor: Medium
Score: 5.9
Risk Factor: Medium
Base Score: 6.9
Temporal Score: 5.1
Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C
CPE: cpe:/a:puppetlabs:puppet
Required KB Items: puppet/rest_port
Exploit Ease: No exploit is required
Patch Publication Date: 8/15/2013
Vulnerability Publication Date: 8/15/2013
CVE: CVE-2013-4073, CVE-2013-4761, CVE-2013-4762, CVE-2013-4955, CVE-2013-4956, CVE-2013-4958, CVE-2013-4959, CVE-2013-4961, CVE-2013-4962, CVE-2013-4963, CVE-2013-4964, CVE-2013-4967, CVE-2013-4968
BID: 60843, 61805, 61806, 61856, 61857, 61859, 61860, 61861, 61862, 61870, 61945, 61949, 66541