Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
eucalyptus eucalyptus 3.4.1 vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2013-4769
The cloud controller (aka CLC) component in Eucalyptus 3.3.x and 3.4.x prior to 3.4.2, when the dns.recursive.enabled setting is used, allows remote malicious users to cause a denial of service (traffic amplification) via spoofed DNS queries.
Eucalyptus Eucalyptus 3.3.2
Eucalyptus Eucalyptus 3.4.1
Eucalyptus Eucalyptus 3.3.0
Eucalyptus Eucalyptus 3.3.1
Eucalyptus Eucalyptus 3.4.0
4.6
CVSSv2
CVE-2015-6861
HPE Helion Eucalyptus 3.4.0 up to and including 4.2.0 allows remote authenticated users to bypass an intended AssumeRole permission requirement and assume an IAM role by leveraging a policy setting for a user's account.
Eucalyptus Eucalyptus 4.0.0
Eucalyptus Eucalyptus 3.4.3
Eucalyptus Eucalyptus 4.1.1
Eucalyptus Eucalyptus 4.1.0
Eucalyptus Eucalyptus 3.4.0
Eucalyptus Eucalyptus 4.2.0
Eucalyptus Eucalyptus 4.1.2
Eucalyptus Eucalyptus 3.4.2
Eucalyptus Eucalyptus 3.4.1
Eucalyptus Eucalyptus 4.0.2
Eucalyptus Eucalyptus 4.0.1
2.1
CVSSv2
CVE-2014-5038
Eucalyptus 3.0.0 up to and including 4.0.1, when the log level is set to DEBUG or lower, logs user and system passwords, which allows local users to obtain sensitive information by reading the cloud log files.
Eucalyptus Eucalyptus 3.3.0
Eucalyptus Eucalyptus 3.2.2
Eucalyptus Eucalyptus 3.2.1
Eucalyptus Eucalyptus 3.2.0
Eucalyptus Eucalyptus 3.4.0
Eucalyptus Eucalyptus 3.3.1
Eucalyptus Eucalyptus 3.1.2
Eucalyptus Eucalyptus 3.1.0
Eucalyptus Eucalyptus 4.0.1
Eucalyptus Eucalyptus 4.0.0
Eucalyptus Eucalyptus 3.4.3
Eucalyptus Eucalyptus 3.4.2
Eucalyptus Eucalyptus 3.0
Eucalyptus Eucalyptus 3.4.1
Eucalyptus Eucalyptus 3.3.2
Eucalyptus Eucalyptus 3.1.1
Eucalyptus Eucalyptus 3.0.1
5
CVSSv2
CVE-2013-4768
The web services APIs in Eucalyptus 2.0 up to and including 3.4.1 allow remote malicious users to cause a denial of service via vectors related to the "network connection clean up code" and (1) Cloud Controller (CLC), (2) Walrus, (3) Storage Controller (SC), and (4) VMw...
Eucalyptus Eucalyptus 3.4.0
Eucalyptus Eucalyptus 3.2.0
Eucalyptus Eucalyptus 3.2.2
Eucalyptus Eucalyptus 3.0
Eucalyptus Eucalyptus 3.0.1
Eucalyptus Eucalyptus 3.1.0
Eucalyptus Eucalyptus 3.1.1
Eucalyptus Eucalyptus 3.3.1
Eucalyptus Eucalyptus 2.0.3
Eucalyptus Eucalyptus 2.0.2
Eucalyptus Eucalyptus 2.0.1
Eucalyptus Eucalyptus 3.4.1
Eucalyptus Eucalyptus 3.3.2
Eucalyptus Eucalyptus 3.1.2
Eucalyptus Eucalyptus 3.2.1
Eucalyptus Eucalyptus 3.3.0
Eucalyptus Eucalyptus 2.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
spoof
CVE-2024-34928
CVE-2024-5291
deserialization
CVE-2024-4471
CVE-2024-4956
CVE-2024-32002
CVE-2024-5227
unspecified
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started