Known Vulnerabilities for Continuous Delivery by Puppet

Listed below are 4 of the newest known vulnerabilities associated with "Continuous Delivery" by "Puppet".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2026-5328 A weakness has been identified in shsuishang modulithshop up to 829bac71f507e84684c782b9b062b8bf3b5585d6. The impacted elemen... Not Provided 2026-04-02 2026-04-02
CVE-2026-5323 A vulnerability was found in priyankark a11y-mcp up to 1.0.5. This vulnerability affects the function A11yServer of the file ... Not Provided 2026-04-02 2026-04-02
CVE-2026-5002 A vulnerability has been found in PromtEngineer localGPT up to 4d41c7d1713b16b216d8e062e51a5dd88b20b054. The impacted element... Not Provided 2026-03-28 2026-03-30
CVE-2026-5001 A flaw has been found in PromtEngineer localGPT up to 4d41c7d1713b16b216d8e062e51a5dd88b20b054. The affected element is the f... Not Provided 2026-03-28 2026-03-30
CVE-2026-4999 A security vulnerability has been detected in z-9527 admin up to 72aaf2dd05cf4ec2e98f390668b41e128eec5ad2. This issue affects... Not Provided 2026-03-28 2026-03-30
CVE-2026-4907 A vulnerability was identified in Page-Replica Page Replica up to e4a7f52e75093ee318b4d5a9a9db6751050d2ad0. The impacted elem... Not Provided 2026-03-27 2026-03-27
CVE-2021-27024 A flaw was discovered in Continuous Delivery for Puppet Enterprise (CD4PE) that results in a user with lower privileges being... 8.1 - HIGH 2021-11-18 2022-07-12
CVE-2020-7945 Local registry credentials were included directly in the CD4PE deployment definition, which could expose these credentials to... 5.5 - MEDIUM 2020-09-18 2020-09-30
CVE-2020-7944 In Continuous Delivery for Puppet Enterprise (CD4PE) before 3.4.0, changes to resources or classes containing Sensitive param... 7.7 - HIGH 2020-03-26 2020-04-01
CVE-2019-10695 When using the cd4pe::root_configuration task to configure a Continuous Delivery for PE installation, the root user’s usern... 6.5 - MEDIUM 2019-12-12 2023-01-28

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationPuppetContinuous Delivery4.0.1AllAllAll
ApplicationPuppetContinuous Delivery4.0.0AllAllAll
ApplicationPuppetContinuous Delivery3.4.1AllAllAll
ApplicationPuppetContinuous Delivery3.4.0AllAllAll
ApplicationPuppetContinuous Delivery3.3.0AllAllAll
ApplicationPuppetContinuous Delivery3.2.1AllAllAll
ApplicationPuppetContinuous Delivery3.2.0AllAllAll
ApplicationPuppetContinuous Delivery3.1.1AllAllAll
ApplicationPuppetContinuous Delivery3.1.0AllAllAll
ApplicationPuppetContinuous Delivery3.0.2AllAllAll
ApplicationPuppetContinuous Delivery3.0.1AllAllAll
ApplicationPuppetContinuous Delivery3.0.0AllAllAll
ApplicationPuppetContinuous Delivery2.18.4AllAllAll
ApplicationPuppetContinuous Delivery2.18.3AllAllAll
ApplicationPuppetContinuous Delivery2.18.2AllAllAll
ApplicationPuppetContinuous Delivery2.18.1AllAllAll
ApplicationPuppetContinuous Delivery2.18.0AllAllAll
ApplicationPuppetContinuous Delivery2.17.1AllAllAll
ApplicationPuppetContinuous Delivery2.17.0AllAllAll
ApplicationPuppetContinuous Delivery2.16.0AllAllAll
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report