Vulnerabilities (CVE)

Filtered by vendor Saltstack Subscribe
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2014-3563 1 Saltstack 1 Salt 2017-08-29 7.2 HIGH N/A
Multiple unspecified vulnerabilities in Salt (aka SaltStack) before 2014.1.10 allow local users to have an unspecified impact via vectors related to temporary file creation in (1) seed.py, (2) salt-ssh, or (3) salt-cloud.
CVE-2013-4435 1 Saltstack 1 Salt 2013-11-07 6.0 MEDIUM N/A
Salt (aka SaltStack) 0.15.0 through 0.17.0 allows remote authenticated users who are using external authentication or client ACL to execute restricted routines by embedding the routine in another routine.
CVE-2013-4436 1 Saltstack 1 Salt 2013-11-07 9.3 HIGH N/A
The default configuration for salt-ssh in Salt (aka SaltStack) 0.17.0 does not validate the SSH host key of requests, which allows remote attackers to have unspecified impact via a man-in-the-middle (MITM) attack.
CVE-2013-4437 1 Saltstack 1 Salt 2013-11-07 10.0 HIGH N/A
Unspecified vulnerability in salt-ssh in Salt (aka SaltStack) 0.17.0 has unspecified impact and vectors related to "insecure Usage of /tmp."
CVE-2013-4438 1 Saltstack 1 Salt 2013-11-07 7.5 HIGH N/A
Salt (aka SaltStack) before 0.17.1 allows remote attackers to execute arbitrary YAML code via unspecified vectors. NOTE: the vendor states that this might not be a vulnerability because the YAML to be loaded has already been determined to be safe.
CVE-2013-4439 1 Saltstack 1 Salt 2013-11-07 4.9 MEDIUM N/A
Salt (aka SaltStack) before 0.15.0 through 0.17.0 allows remote authenticated minions to impersonate arbitrary minions via a crafted minion with a valid key.
CVE-2013-6617 1 Saltstack 1 Salt 2013-11-06 10.0 HIGH N/A
The salt master in Salt (aka SaltStack) 0.11.0 through 0.17.0 does not properly drop group privileges, which makes it easier for remote attackers to gain privileges.