Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
openstack grizzly - vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2013-0270
OpenStack Keystone Grizzly prior to 2013.1, Folsom, and possibly earlier allows remote malicious users to cause a denial of service (CPU and memory consumption) via a large HTTP request, as demonstrated by a long tenant_name when requesting a token.
Openstack Keystone
Openstack Keystone 2013.1
490
VMScore
CVE-2012-5482
The v2 API in OpenStack Glance Grizzly, Folsom (2012.2), and Essex (2012.1) allows remote authenticated users to delete arbitrary non-protected images via an image deletion request. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-4573.
Openstack Image Registry And Delivery Service (glance) -
Openstack Essex 2012.1
Openstack Folsom 2012.2
534
VMScore
CVE-2013-2059
OpenStack Identity (Keystone) Folsom 2012.2.4 and previous versions, Grizzly prior to 2013.1.1, and Havana does not immediately revoke the authentication token when deleting a user through the Keystone v2 API, which allows remote authenticated users to retain access via the token...
Openstack Keystone 2012.1
Openstack Keystone 2013.1
445
VMScore
CVE-2013-0282
OpenStack Keystone Grizzly prior to 2013.1, Folsom 2012.1.3 and previous versions, and Essex does not properly check if the (1) user, (2) tenant, or (3) domain is enabled when using EC2-style authentication, which allows context-dependent malicious users to bypass access restrict...
Openstack Keystone
Openstack Keystone 2013.1
490
VMScore
CVE-2012-4573
The v1 API in OpenStack Glance Grizzly, Folsom (2012.2), and Essex (2012.1) allows remote authenticated users to delete arbitrary non-protected images via an image deletion request, a different vulnerability than CVE-2012-5482.
Openstack Image Registry And Delivery Service (glance) -
Openstack Essex 2012.1
Openstack Folsom 2012.2
312
VMScore
CVE-2013-4278
The "create an instance" API in OpenStack Compute (Nova) Folsom, Grizzly, and Havana does not properly enforce the os-flavor-access:is_public property, which allows remote authenticated users to boot arbitrary flavors by guessing the flavor id. NOTE: this issue is due t...
Openstack Compute -
383
VMScore
CVE-2013-2157
OpenStack Keystone Folsom, Grizzly prior to 2013.1.3, and Havana, when using LDAP with Anonymous binding, allows remote malicious users to bypass authentication via an empty password.
Openstack Keystone
356
VMScore
CVE-2013-0212
store/swift.py in OpenStack Glance Essex (2012.1), Folsom (2012.2) prior to 2012.2.3, and Grizzly, when in Swift single tenant mode, logs the Swift endpoint's user name and password in cleartext when the endpoint is misconfigured or unusable, allows remote authenticated user...
Openstack Image Registry And Delivery Service (glance) 2012.2.2
Openstack Image Registry And Delivery Service (glance) 2012.2.1
Openstack Image Registry And Delivery Service (glance) 2012.1
Openstack Image Registry And Delivery Service (glance) 2012.2
Canonical Ubuntu Linux 11.10
Canonical Ubuntu Linux 12.10
Canonical Ubuntu Linux 12.04
1 Github repository
312
VMScore
CVE-2013-1840
The v1 API in OpenStack Glance Essex (2012.1), Folsom (2012.2), and Grizzly, when using the single-tenant Swift or S3 store, reports the location field, which allows remote authenticated users to obtain the operator's backend credentials via a request for a cached image.
Openstack Glance V1
445
VMScore
CVE-2013-0247
OpenStack Keystone Essex 2012.1.3 and previous versions, Folsom 2012.2.3 and previous versions, and Grizzly grizzly-2 and previous versions allows remote malicious users to cause a denial of service (disk consumption) via many invalid token requests that trigger excessive generat...
Openstack Keystone
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 12.10
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2