Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown

CVE-2014-5038

Disclosure Date: November 07, 2014 (last updated October 05, 2023)
Eucalyptus 3.0.0 through 4.0.1, when the log level is set to DEBUG or lower, logs user and system passwords, which allows local users to obtain sensitive information by reading the cloud log files.
0
Attacker Value
Unknown

CVE-2013-4768

Disclosure Date: April 16, 2014 (last updated October 05, 2023)
The web services APIs in Eucalyptus 2.0 through 3.4.1 allow remote attackers to cause a denial of service via vectors related to the "network connection clean up code" and (1) Cloud Controller (CLC), (2) Walrus, (3) Storage Controller (SC), and (4) VMware Broker (VB).
0
Attacker Value
Unknown

CVE-2013-4766

Disclosure Date: September 17, 2013 (last updated October 05, 2023)
The gather log service in Eucalyptus before 3.3.1 allows remote attackers to read log files via an unspecified request to the (1) Cluster Controller (CC) or (2) Node Controller (NC) component.
0
Attacker Value
Unknown

CVE-2013-2296

Disclosure Date: September 17, 2013 (last updated October 05, 2023)
Walrus in Eucalyptus before 3.2.2 does not verify authorization for the GetBucketLoggingStatus, SetBucketLoggingStatus, and SetBucketVersioningStatus bucket operations, which allows remote authenticated users to bypass intended restrictions on (1) modifying the logging setting, (2) modifying the versioning setting, or (3) accessing activity logs via a request.
0
Attacker Value
Unknown

CVE-2012-4067

Disclosure Date: September 17, 2013 (last updated October 05, 2023)
Walrus in Eucalyptus before 3.2.2 allows remote attackers to cause a denial of service (memory, thread, and CPU consumption) via a crafted XML message containing a DTD, as demonstrated by a bucket-logging request.
0
Attacker Value
Unknown

CVE-2012-4066

Disclosure Date: March 08, 2013 (last updated October 05, 2023)
The internal message protocol for Walrus in Eucalyptus 3.2.0 and earlier does not require signatures for unspecified request headers, which allows attackers to (1) delete or (2) upload snapshots.
0