CVE-2013-4766
17.09.2013, 12:04
The gather log service in Eucalyptus before 3.3.1 allows remote attackers to read log files via an unspecified request to the (1) Cluster Controller (CC) or (2) Node Controller (NC) component.Enginsight
| Vendor | Product | Version |
|---|---|---|
| eucalyptus | eucalyptus | 𝑥 ≤ 3.3.0 |
| eucalyptus | eucalyptus | 1.0 |
| eucalyptus | eucalyptus | 1.1 |
| eucalyptus | eucalyptus | 1.2 |
| eucalyptus | eucalyptus | 1.3 |
| eucalyptus | eucalyptus | 1.4 |
| eucalyptus | eucalyptus | 1.5.1 |
| eucalyptus | eucalyptus | 1.5.2 |
| eucalyptus | eucalyptus | 1.6 |
| eucalyptus | eucalyptus | 1.6.2 |
| eucalyptus | eucalyptus | 2.0 |
| eucalyptus | eucalyptus | 2.0.0 |
| eucalyptus | eucalyptus | 2.0.1 |
| eucalyptus | eucalyptus | 2.0.2 |
| eucalyptus | eucalyptus | 2.0.3 |
| eucalyptus | eucalyptus | 3.0 |
| eucalyptus | eucalyptus | 3.0.1 |
| eucalyptus | eucalyptus | 3.1.0 |
| eucalyptus | eucalyptus | 3.1.1 |
| eucalyptus | eucalyptus | 3.1.2 |
| eucalyptus | eucalyptus | 3.2.0 |
| eucalyptus | eucalyptus | 3.2.1 |
| eucalyptus | eucalyptus | 3.2.2 |
𝑥
= Vulnerable software versions
Ubuntu Releases
Common Weakness Enumeration