Vulnerabilities > Eucalyptus > Eucalyptus > 3.2.1
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2018-02-15 | CVE-2016-8520 | Permission Issues vulnerability in Eucalyptus HPE Helion Eucalyptus v4.3.0 and earlier does not correctly check IAM user's permissions for accessing versioned objects and ACLs. | 6.5 |
2014-11-07 | CVE-2014-5038 | Information Exposure vulnerability in Eucalyptus Eucalyptus 3.0.0 through 4.0.1, when the log level is set to DEBUG or lower, logs user and system passwords, which allows local users to obtain sensitive information by reading the cloud log files. | 2.1 |
2014-04-16 | CVE-2013-4768 | Improper Input Validation vulnerability in Eucalyptus The web services APIs in Eucalyptus 2.0 through 3.4.1 allow remote attackers to cause a denial of service via vectors related to the "network connection clean up code" and (1) Cloud Controller (CLC), (2) Walrus, (3) Storage Controller (SC), and (4) VMware Broker (VB). | 5.0 |
2013-10-10 | CVE-2013-4767 | Remote Command Injection vulnerability in Eucalyptus Unspecified vulnerability in Eucalyptus before 3.3.2 has unknown impact and attack vectors. | 10.0 |
2013-09-17 | CVE-2013-4766 | Information Exposure vulnerability in Eucalyptus The gather log service in Eucalyptus before 3.3.1 allows remote attackers to read log files via an unspecified request to the (1) Cluster Controller (CC) or (2) Node Controller (NC) component. | 4.3 |
2013-09-17 | CVE-2013-2296 | Permissions, Privileges, and Access Controls vulnerability in Eucalyptus Walrus in Eucalyptus before 3.2.2 does not verify authorization for the GetBucketLoggingStatus, SetBucketLoggingStatus, and SetBucketVersioningStatus bucket operations, which allows remote authenticated users to bypass intended restrictions on (1) modifying the logging setting, (2) modifying the versioning setting, or (3) accessing activity logs via a request. | 5.5 |
2013-09-17 | CVE-2012-4067 | Resource Management Errors vulnerability in Eucalyptus Walrus in Eucalyptus before 3.2.2 allows remote attackers to cause a denial of service (memory, thread, and CPU consumption) via a crafted XML message containing a DTD, as demonstrated by a bucket-logging request. | 4.3 |