Vulnerabilities > Eucalyptus
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-01-31 | CVE-2014-5039 | Cross-site Scripting vulnerability in Eucalyptus Management Console 4.0.0/4.0.1 Cross-site scripting (XSS) vulnerability in Eucalyptus Management Console (EMC) 4.0.x before 4.0.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | 9.6 |
2020-01-27 | CVE-2013-4770 | Cross-site Scripting vulnerability in Eucalyptus Management Console 4.0.0 Cross-site scripting (XSS) vulnerability in Eucalyptus Management Console (EMC) 4.0.x before 4.0.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | 6.1 |
2018-02-15 | CVE-2016-8528 | Permissions, Privileges, and Access Controls vulnerability in Eucalyptus A Remote Escalation of Privilege vulnerability in HPE Helion Eucalyptus version 3.3.0 through 4.3.1 was found. | 8.8 |
2018-02-15 | CVE-2016-8520 | Permission Issues vulnerability in Eucalyptus HPE Helion Eucalyptus v4.3.0 and earlier does not correctly check IAM user's permissions for accessing versioned objects and ACLs. | 8.8 |
2017-06-01 | CVE-2017-7999 | Unspecified vulnerability in Eucalyptus Atlassian Eucalyptus before 4.4.1, when in EDGE mode, allows remote authenticated users with certain privileges to cause a denial of service (E2 service outage) via unspecified vectors. | 6.5 |
2016-01-05 | CVE-2015-6861 | Permissions, Privileges, and Access Controls vulnerability in Eucalyptus HPE Helion Eucalyptus 3.4.0 through 4.2.0 allows remote authenticated users to bypass an intended AssumeRole permission requirement and assume an IAM role by leveraging a policy setting for a user's account. | 7.5 |
2016-01-05 | CVE-2014-5040 | Permissions, Privileges, and Access Controls vulnerability in Eucalyptus 4.1.1/4.2.0 HP Helion Eucalyptus 4.1.x before 4.1.2 and HPE Helion Eucalyptus 4.2.x before 4.2.1 allow remote authenticated users to bypass intended access restrictions and modify arbitrary (1) access key credentials by leveraging knowledge of a key ID or (2) signing certificates by leveraging knowledge of a certificate ID. | 6.8 |