Total vulnerabilities in the database
Puppet Enterprise 2.8.x before 2.8.7 allows remote attackers to obtain sensitive information via vectors involving hiding and unhiding nodes.
Software | From | Fixed in |
---|---|---|
puppet / puppet_enterprise | 2.8.1 | 2.8.1.x |
puppet / puppet_enterprise | 2.8.2 | 2.8.2.x |
puppet / puppet_enterprise | 2.8.3 | 2.8.3.x |
puppet / puppet_enterprise | 2.8.4 | 2.8.4.x |
puppet / puppet_enterprise | 2.8.5 | 2.8.5.x |
puppet / puppet_enterprise | 2.8.6 | 2.8.6.x |
puppet / puppet_enterprise | 2.8.0 | 2.8.0.x |