Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
eucalyptus eucalyptus 3.4.2 vulnerabilities and exploits
(subscribe to this query)
1.9
CVSSv2
CVE-2014-5036
The Storage Controller (SC) component in Eucalyptus 3.4.2 up to and including 4.0.x prior to 4.0.1, when Dell Equallogic SAN is used, logs the CHAP user credentials, which allows local users to obtain sensitive information by reading the logs.
Eucalyptus Eucalyptus 3.4.3
Eucalyptus Eucalyptus 3.4.2
Eucalyptus Eucalyptus 4.0.0
4.6
CVSSv2
CVE-2015-6861
HPE Helion Eucalyptus 3.4.0 up to and including 4.2.0 allows remote authenticated users to bypass an intended AssumeRole permission requirement and assume an IAM role by leveraging a policy setting for a user's account.
Eucalyptus Eucalyptus 4.0.0
Eucalyptus Eucalyptus 3.4.3
Eucalyptus Eucalyptus 4.1.1
Eucalyptus Eucalyptus 4.1.0
Eucalyptus Eucalyptus 3.4.0
Eucalyptus Eucalyptus 4.2.0
Eucalyptus Eucalyptus 4.1.2
Eucalyptus Eucalyptus 3.4.2
Eucalyptus Eucalyptus 3.4.1
Eucalyptus Eucalyptus 4.0.2
Eucalyptus Eucalyptus 4.0.1
2.1
CVSSv2
CVE-2014-5038
Eucalyptus 3.0.0 up to and including 4.0.1, when the log level is set to DEBUG or lower, logs user and system passwords, which allows local users to obtain sensitive information by reading the cloud log files.
Eucalyptus Eucalyptus 3.3.0
Eucalyptus Eucalyptus 3.2.2
Eucalyptus Eucalyptus 3.2.1
Eucalyptus Eucalyptus 3.2.0
Eucalyptus Eucalyptus 3.4.0
Eucalyptus Eucalyptus 3.3.1
Eucalyptus Eucalyptus 3.1.2
Eucalyptus Eucalyptus 3.1.0
Eucalyptus Eucalyptus 4.0.1
Eucalyptus Eucalyptus 4.0.0
Eucalyptus Eucalyptus 3.4.3
Eucalyptus Eucalyptus 3.4.2
Eucalyptus Eucalyptus 3.0
Eucalyptus Eucalyptus 3.4.1
Eucalyptus Eucalyptus 3.3.2
Eucalyptus Eucalyptus 3.1.1
Eucalyptus Eucalyptus 3.0.1
4.3
CVSSv2
CVE-2013-4769
The cloud controller (aka CLC) component in Eucalyptus 3.3.x and 3.4.x prior to 3.4.2, when the dns.recursive.enabled setting is used, allows remote malicious users to cause a denial of service (traffic amplification) via spoofed DNS queries.
Eucalyptus Eucalyptus 3.3.2
Eucalyptus Eucalyptus 3.4.1
Eucalyptus Eucalyptus 3.3.0
Eucalyptus Eucalyptus 3.3.1
Eucalyptus Eucalyptus 3.4.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started