Show filters
25 Total Results
Displaying 1-10 of 25
Sort by:
Attacker Value
Unknown
CVE-2014-5039
Disclosure Date: January 31, 2020 (last updated February 21, 2025)
Cross-site scripting (XSS) vulnerability in Eucalyptus Management Console (EMC) 4.0.x before 4.0.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
0
Attacker Value
Unknown
CVE-2013-4770
Disclosure Date: January 27, 2020 (last updated February 21, 2025)
Cross-site scripting (XSS) vulnerability in Eucalyptus Management Console (EMC) 4.0.x before 4.0.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
0
Attacker Value
Unknown
CVE-2016-8520
Disclosure Date: February 15, 2018 (last updated November 26, 2024)
HPE Helion Eucalyptus v4.3.0 and earlier does not correctly check IAM user's permissions for accessing versioned objects and ACLs. In some cases, authenticated users with S3 permissions could also access versioned data.
0
Attacker Value
Unknown
CVE-2016-8528
Disclosure Date: February 15, 2018 (last updated November 26, 2024)
A Remote Escalation of Privilege vulnerability in HPE Helion Eucalyptus version 3.3.0 through 4.3.1 was found.
0
Attacker Value
Unknown
CVE-2017-7999
Disclosure Date: June 01, 2017 (last updated November 26, 2024)
Atlassian Eucalyptus before 4.4.1, when in EDGE mode, allows remote authenticated users with certain privileges to cause a denial of service (E2 service outage) via unspecified vectors.
0
Attacker Value
Unknown
CVE-2015-6861
Disclosure Date: January 05, 2016 (last updated November 25, 2024)
HPE Helion Eucalyptus 3.4.0 through 4.2.0 allows remote authenticated users to bypass an intended AssumeRole permission requirement and assume an IAM role by leveraging a policy setting for a user's account.
0
Attacker Value
Unknown
CVE-2014-5040
Disclosure Date: January 05, 2016 (last updated November 25, 2024)
HP Helion Eucalyptus 4.1.x before 4.1.2 and HPE Helion Eucalyptus 4.2.x before 4.2.1 allow remote authenticated users to bypass intended access restrictions and modify arbitrary (1) access key credentials by leveraging knowledge of a key ID or (2) signing certificates by leveraging knowledge of a certificate ID.
0
Attacker Value
Unknown
CVE-2013-4769
Disclosure Date: December 26, 2014 (last updated October 05, 2023)
The cloud controller (aka CLC) component in Eucalyptus 3.3.x and 3.4.x before 3.4.2, when the dns.recursive.enabled setting is used, allows remote attackers to cause a denial of service (traffic amplification) via spoofed DNS queries.
0
Attacker Value
Unknown
CVE-2014-5037
Disclosure Date: November 07, 2014 (last updated October 05, 2023)
Eucalyptus 4.0.0 through 4.0.1, when the log level is set to INFO, logs user and system passwords, which allows local users to obtain sensitive information by reading cloud-requests.log.
0
Attacker Value
Unknown
CVE-2014-5038
Disclosure Date: November 07, 2014 (last updated October 05, 2023)
Eucalyptus 3.0.0 through 4.0.1, when the log level is set to DEBUG or lower, logs user and system passwords, which allows local users to obtain sensitive information by reading the cloud log files.
0