Page 3 of 24 results (0.002 seconds)

CVSS: 1.9EPSS: 0%CPEs: 3EXPL: 0

The Storage Controller (SC) component in Eucalyptus 3.4.2 through 4.0.x before 4.0.1, when Dell Equallogic SAN is used, logs the CHAP user credentials, which allows local users to obtain sensitive information by reading the logs. El componente Storage Controller (SC) en Eucalyptus 3.4.2 hasta 4.0.x anterior a 4.0.1, cuando se utiliza Dell Equallogic SAN, registra las credenciales del usuarios CHAP, lo que permite a usuarios locales obtener información sensible mediante la lectura de los registros. • http://secunia.com/advisories/60359 http://secunia.com/advisories/60712 https://www.eucalyptus.com/resources/security/advisories/esa-23 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 5.0EPSS: 0%CPEs: 17EXPL: 0

The web services APIs in Eucalyptus 2.0 through 3.4.1 allow remote attackers to cause a denial of service via vectors related to the "network connection clean up code" and (1) Cloud Controller (CLC), (2) Walrus, (3) Storage Controller (SC), and (4) VMware Broker (VB). Las API de los servicios web en Eucalyptus 2.0 hasta 3.4.1 permite a atacantes remotos provocar una denegación de servicio a través de vectores relacionados con el "código de limpieza de la conexión de red" y (1) Cloud Controller (CLC), (2) Walrus, (3) Storage Controller (SC), y (4) VMware Broker (VB). • https://www.eucalyptus.com/resources/security/advisories/esa-15 • CWE-20: Improper Input Validation •

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

Unspecified vulnerability in Eucalyptus before 3.3.2 has unknown impact and attack vectors. Vulnerabilidad sin especificar en Eucalyptus anterior a la versión 3.3.2 tiene un impacto y vectores de ataque desconocidos. • http://osvdb.org/98180 http://www.eucalyptus.com/resources/security/advisories •

CVSS: 4.3EPSS: 0%CPEs: 23EXPL: 0

The gather log service in Eucalyptus before 3.3.1 allows remote attackers to read log files via an unspecified request to the (1) Cluster Controller (CC) or (2) Node Controller (NC) component. El servicio concentrador de logs en Eucalyptus version anterior a 3.3.1 permite a atacantes remotos leer logs a través de una solicitud no especificada los componentes Cluster Controller (CC) o Node Controller (NC) • http://www.eucalyptus.com/resources/security/advisories/esa-13 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 5.5EPSS: 0%CPEs: 21EXPL: 0

Walrus in Eucalyptus before 3.2.2 does not verify authorization for the GetBucketLoggingStatus, SetBucketLoggingStatus, and SetBucketVersioningStatus bucket operations, which allows remote authenticated users to bypass intended restrictions on (1) modifying the logging setting, (2) modifying the versioning setting, or (3) accessing activity logs via a request. Walrus en Eucalyptus anteriores a v3.2.2 no verifica la autorización para las operaciones GetBucketLoggingStatus, setBucketLoggingStatus, y SetBucketVersioningStatus, lo cual permite a usuarios autenticados evitar restricciones establecidas (1) modificando la configuración de registro, (2) modificando la configuración de versionado, o (3) accediendo a los logs de actividad a través de una petición. • http://www.eucalyptus.com/resources/security/advisories/esa-10 https://eucalyptus.atlassian.net/browse/EUCA-3074 • CWE-264: Permissions, Privileges, and Access Controls •