Vulnerabilities > Eucalyptus > Medium
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-01-27 | CVE-2013-4770 | Cross-site Scripting vulnerability in Eucalyptus Management Console 4.0.0 Cross-site scripting (XSS) vulnerability in Eucalyptus Management Console (EMC) 4.0.x before 4.0.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | 4.3 |
2018-02-15 | CVE-2016-8528 | Permissions, Privileges, and Access Controls vulnerability in Eucalyptus A Remote Escalation of Privilege vulnerability in HPE Helion Eucalyptus version 3.3.0 through 4.3.1 was found. | 6.5 |
2018-02-15 | CVE-2016-8520 | Permission Issues vulnerability in Eucalyptus HPE Helion Eucalyptus v4.3.0 and earlier does not correctly check IAM user's permissions for accessing versioned objects and ACLs. | 6.5 |
2016-01-05 | CVE-2015-6861 | Permissions, Privileges, and Access Controls vulnerability in Eucalyptus HPE Helion Eucalyptus 3.4.0 through 4.2.0 allows remote authenticated users to bypass an intended AssumeRole permission requirement and assume an IAM role by leveraging a policy setting for a user's account. | 4.6 |
2016-01-05 | CVE-2014-5040 | Permissions, Privileges, and Access Controls vulnerability in Eucalyptus 4.1.1/4.2.0 HP Helion Eucalyptus 4.1.x before 4.1.2 and HPE Helion Eucalyptus 4.2.x before 4.2.1 allow remote authenticated users to bypass intended access restrictions and modify arbitrary (1) access key credentials by leveraging knowledge of a key ID or (2) signing certificates by leveraging knowledge of a certificate ID. | 4.6 |
2014-12-26 | CVE-2013-4769 | Data Processing Errors vulnerability in Eucalyptus The cloud controller (aka CLC) component in Eucalyptus 3.3.x and 3.4.x before 3.4.2, when the dns.recursive.enabled setting is used, allows remote attackers to cause a denial of service (traffic amplification) via spoofed DNS queries. | 4.3 |
2014-04-16 | CVE-2013-4768 | Improper Input Validation vulnerability in Eucalyptus The web services APIs in Eucalyptus 2.0 through 3.4.1 allow remote attackers to cause a denial of service via vectors related to the "network connection clean up code" and (1) Cloud Controller (CLC), (2) Walrus, (3) Storage Controller (SC), and (4) VMware Broker (VB). | 5.0 |
2013-09-17 | CVE-2013-4766 | Information Exposure vulnerability in Eucalyptus The gather log service in Eucalyptus before 3.3.1 allows remote attackers to read log files via an unspecified request to the (1) Cluster Controller (CC) or (2) Node Controller (NC) component. | 4.3 |
2013-09-17 | CVE-2013-2297 | Credentials Management vulnerability in Eucalyptus Eustore Eucalyptus EuStore sets a blank root password in the default configuration of EMI 3868652036, EMI 0400376721, EMI 2425352071, and EMI 1347115203, which allows local users to gain privileges via unspecified vectors, a related issue to CVE-2013-2069. | 6.9 |
2013-09-17 | CVE-2013-2296 | Permissions, Privileges, and Access Controls vulnerability in Eucalyptus Walrus in Eucalyptus before 3.2.2 does not verify authorization for the GetBucketLoggingStatus, SetBucketLoggingStatus, and SetBucketVersioningStatus bucket operations, which allows remote authenticated users to bypass intended restrictions on (1) modifying the logging setting, (2) modifying the versioning setting, or (3) accessing activity logs via a request. | 5.5 |