Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
eucalyptus eucalyptus 3.3.1 vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2013-4769
The cloud controller (aka CLC) component in Eucalyptus 3.3.x and 3.4.x prior to 3.4.2, when the dns.recursive.enabled setting is used, allows remote malicious users to cause a denial of service (traffic amplification) via spoofed DNS queries.
Eucalyptus Eucalyptus 3.3.2
Eucalyptus Eucalyptus 3.4.1
Eucalyptus Eucalyptus 3.3.0
Eucalyptus Eucalyptus 3.3.1
Eucalyptus Eucalyptus 3.4.0
2.1
CVSSv2
CVE-2014-5038
Eucalyptus 3.0.0 up to and including 4.0.1, when the log level is set to DEBUG or lower, logs user and system passwords, which allows local users to obtain sensitive information by reading the cloud log files.
Eucalyptus Eucalyptus 3.3.0
Eucalyptus Eucalyptus 3.2.2
Eucalyptus Eucalyptus 3.2.1
Eucalyptus Eucalyptus 3.2.0
Eucalyptus Eucalyptus 3.4.0
Eucalyptus Eucalyptus 3.3.1
Eucalyptus Eucalyptus 3.1.2
Eucalyptus Eucalyptus 3.1.0
Eucalyptus Eucalyptus 4.0.1
Eucalyptus Eucalyptus 4.0.0
Eucalyptus Eucalyptus 3.4.3
Eucalyptus Eucalyptus 3.4.2
Eucalyptus Eucalyptus 3.0
Eucalyptus Eucalyptus 3.4.1
Eucalyptus Eucalyptus 3.3.2
Eucalyptus Eucalyptus 3.1.1
Eucalyptus Eucalyptus 3.0.1
5
CVSSv2
CVE-2013-4768
The web services APIs in Eucalyptus 2.0 up to and including 3.4.1 allow remote malicious users to cause a denial of service via vectors related to the "network connection clean up code" and (1) Cloud Controller (CLC), (2) Walrus, (3) Storage Controller (SC), and (4) VMw...
Eucalyptus Eucalyptus 3.4.0
Eucalyptus Eucalyptus 3.2.0
Eucalyptus Eucalyptus 3.2.2
Eucalyptus Eucalyptus 3.0
Eucalyptus Eucalyptus 3.0.1
Eucalyptus Eucalyptus 3.1.0
Eucalyptus Eucalyptus 3.1.1
Eucalyptus Eucalyptus 3.3.1
Eucalyptus Eucalyptus 2.0.3
Eucalyptus Eucalyptus 2.0.2
Eucalyptus Eucalyptus 2.0.1
Eucalyptus Eucalyptus 3.4.1
Eucalyptus Eucalyptus 3.3.2
Eucalyptus Eucalyptus 3.1.2
Eucalyptus Eucalyptus 3.2.1
Eucalyptus Eucalyptus 3.3.0
Eucalyptus Eucalyptus 2.0
4.3
CVSSv2
CVE-2013-4766
The gather log service in Eucalyptus prior to 3.3.1 allows remote malicious users to read log files via an unspecified request to the (1) Cluster Controller (CC) or (2) Node Controller (NC) component.
Eucalyptus Eucalyptus 1.6
Eucalyptus Eucalyptus 1.6.2
Eucalyptus Eucalyptus 2.0
Eucalyptus Eucalyptus 2.0.0
Eucalyptus Eucalyptus 1.0
Eucalyptus Eucalyptus 1.1
Eucalyptus Eucalyptus 1.2
Eucalyptus Eucalyptus 3.0.1
Eucalyptus Eucalyptus 3.1.0
Eucalyptus Eucalyptus 3.1.1
Eucalyptus Eucalyptus 3.1.2
Eucalyptus Eucalyptus 3.2.0
Eucalyptus Eucalyptus 1.4
Eucalyptus Eucalyptus 1.5.2
Eucalyptus Eucalyptus 2.0.1
Eucalyptus Eucalyptus 2.0.3
Eucalyptus Eucalyptus 3.2.1
Eucalyptus Eucalyptus
Eucalyptus Eucalyptus 1.3
Eucalyptus Eucalyptus 1.5.1
Eucalyptus Eucalyptus 2.0.2
Eucalyptus Eucalyptus 3.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-29895
blind SQL injection
CVE-2024-5064
CVE-2023-52677
CVE-2023-52682
CVE-2024-30051
CVE-2024-35849
remote attackers
remote
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started