Filtered by vendor Eucalyptus
Subscribe
Total
25 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2014-5039 | 1 Eucalyptus | 1 Eucalyptus Management Console | 2020-02-05 | 6.8 MEDIUM | 9.6 CRITICAL |
Cross-site scripting (XSS) vulnerability in Eucalyptus Management Console (EMC) 4.0.x before 4.0.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | |||||
CVE-2013-4770 | 1 Eucalyptus | 1 Eucalyptus Management Console | 2020-01-29 | 4.3 MEDIUM | 6.1 MEDIUM |
Cross-site scripting (XSS) vulnerability in Eucalyptus Management Console (EMC) 4.0.x before 4.0.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | |||||
CVE-2017-7999 | 1 Eucalyptus | 1 Eucalyptus | 2019-10-02 | 3.5 LOW | 6.5 MEDIUM |
Atlassian Eucalyptus before 4.4.1, when in EDGE mode, allows remote authenticated users with certain privileges to cause a denial of service (E2 service outage) via unspecified vectors. | |||||
CVE-2011-0730 | 2 Canonical, Eucalyptus | 2 Ubuntu Linux, Eucalyptus | 2018-11-29 | 6.5 MEDIUM | N/A |
Eucalyptus before 2.0.3 and Eucalyptus EE before 2.0.2, as used in Ubuntu Enterprise Cloud (UEC) and other products, do not properly interpret signed elements in SOAP requests, which allows man-in-the-middle attackers to execute arbitrary commands by modifying a request, related to an "XML Signature Element Wrapping" or a "SOAP signature replay" issue. | |||||
CVE-2016-8520 | 1 Eucalyptus | 1 Eucalyptus | 2018-03-13 | 6.5 MEDIUM | 8.8 HIGH |
HPE Helion Eucalyptus v4.3.0 and earlier does not correctly check IAM user's permissions for accessing versioned objects and ACLs. In some cases, authenticated users with S3 permissions could also access versioned data. | |||||
CVE-2016-8528 | 1 Eucalyptus | 1 Eucalyptus | 2018-03-07 | 6.5 MEDIUM | 8.8 HIGH |
A Remote Escalation of Privilege vulnerability in HPE Helion Eucalyptus version 3.3.0 through 4.3.1 was found. | |||||
CVE-2012-4063 | 1 Eucalyptus | 1 Eucalyptus | 2017-08-28 | 5.0 MEDIUM | N/A |
The Apache Santuario configuration in Eucalyptus before 3.1.1 does not properly restrict applying XML Signature transforms to documents, which allows remote attackers to cause a denial of service via unspecified vectors. | |||||
CVE-2010-3905 | 1 Eucalyptus | 1 Eucalyptus | 2017-08-16 | 7.5 HIGH | N/A |
The password reset feature in the administrator interface for Eucalyptus 2.0.0 and 2.0.1 does not perform authentication, which allows remote attackers to gain privileges by sending password reset requests for other users. | |||||
CVE-2015-6861 | 1 Eucalyptus | 1 Eucalyptus | 2016-11-28 | 4.6 MEDIUM | 7.5 HIGH |
HPE Helion Eucalyptus 3.4.0 through 4.2.0 allows remote authenticated users to bypass an intended AssumeRole permission requirement and assume an IAM role by leveraging a policy setting for a user's account. | |||||
CVE-2014-5040 | 1 Eucalyptus | 1 Eucalyptus | 2016-01-05 | 4.6 MEDIUM | 6.8 MEDIUM |
HP Helion Eucalyptus 4.1.x before 4.1.2 and HPE Helion Eucalyptus 4.2.x before 4.2.1 allow remote authenticated users to bypass intended access restrictions and modify arbitrary (1) access key credentials by leveraging knowledge of a key ID or (2) signing certificates by leveraging knowledge of a certificate ID. | |||||
CVE-2013-4769 | 1 Eucalyptus | 1 Eucalyptus | 2014-12-29 | 4.3 MEDIUM | N/A |
The cloud controller (aka CLC) component in Eucalyptus 3.3.x and 3.4.x before 3.4.2, when the dns.recursive.enabled setting is used, allows remote attackers to cause a denial of service (traffic amplification) via spoofed DNS queries. | |||||
CVE-2014-5038 | 1 Eucalyptus | 1 Eucalyptus | 2014-11-10 | 2.1 LOW | N/A |
Eucalyptus 3.0.0 through 4.0.1, when the log level is set to DEBUG or lower, logs user and system passwords, which allows local users to obtain sensitive information by reading the cloud log files. | |||||
CVE-2014-5037 | 1 Eucalyptus | 1 Eucalyptus | 2014-11-10 | 2.1 LOW | N/A |
Eucalyptus 4.0.0 through 4.0.1, when the log level is set to INFO, logs user and system passwords, which allows local users to obtain sensitive information by reading cloud-requests.log. | |||||
CVE-2014-5036 | 1 Eucalyptus | 1 Eucalyptus | 2014-09-08 | 1.9 LOW | N/A |
The Storage Controller (SC) component in Eucalyptus 3.4.2 through 4.0.x before 4.0.1, when Dell Equallogic SAN is used, logs the CHAP user credentials, which allows local users to obtain sensitive information by reading the logs. | |||||
CVE-2013-4768 | 1 Eucalyptus | 1 Eucalyptus | 2014-04-16 | 5.0 MEDIUM | N/A |
The web services APIs in Eucalyptus 2.0 through 3.4.1 allow remote attackers to cause a denial of service via vectors related to the "network connection clean up code" and (1) Cloud Controller (CLC), (2) Walrus, (3) Storage Controller (SC), and (4) VMware Broker (VB). | |||||
CVE-2013-4767 | 1 Eucalyptus | 1 Eucalyptus | 2013-10-10 | 10.0 HIGH | N/A |
Unspecified vulnerability in Eucalyptus before 3.3.2 has unknown impact and attack vectors. | |||||
CVE-2013-2297 | 1 Eucalyptus | 1 Eustore | 2013-09-18 | 6.9 MEDIUM | N/A |
Eucalyptus EuStore sets a blank root password in the default configuration of EMI 3868652036, EMI 0400376721, EMI 2425352071, and EMI 1347115203, which allows local users to gain privileges via unspecified vectors, a related issue to CVE-2013-2069. | |||||
CVE-2013-2296 | 1 Eucalyptus | 1 Eucalyptus | 2013-09-18 | 5.5 MEDIUM | N/A |
Walrus in Eucalyptus before 3.2.2 does not verify authorization for the GetBucketLoggingStatus, SetBucketLoggingStatus, and SetBucketVersioningStatus bucket operations, which allows remote authenticated users to bypass intended restrictions on (1) modifying the logging setting, (2) modifying the versioning setting, or (3) accessing activity logs via a request. | |||||
CVE-2012-4067 | 1 Eucalyptus | 1 Eucalyptus | 2013-09-18 | 4.3 MEDIUM | N/A |
Walrus in Eucalyptus before 3.2.2 allows remote attackers to cause a denial of service (memory, thread, and CPU consumption) via a crafted XML message containing a DTD, as demonstrated by a bucket-logging request. | |||||
CVE-2013-4766 | 1 Eucalyptus | 1 Eucalyptus | 2013-09-18 | 4.3 MEDIUM | N/A |
The gather log service in Eucalyptus before 3.3.1 allows remote attackers to read log files via an unspecified request to the (1) Cluster Controller (CC) or (2) Node Controller (NC) component. |