CVE-2013-4766
17.09.2013, 12:04
The gather log service in Eucalyptus before 3.3.1 allows remote attackers to read log files via an unspecified request to the (1) Cluster Controller (CC) or (2) Node Controller (NC) component.Enginsight
Vendor | Product | Version |
---|---|---|
eucalyptus | eucalyptus | 𝑥 ≤ 3.3.0 |
eucalyptus | eucalyptus | 1.0 |
eucalyptus | eucalyptus | 1.1 |
eucalyptus | eucalyptus | 1.2 |
eucalyptus | eucalyptus | 1.3 |
eucalyptus | eucalyptus | 1.4 |
eucalyptus | eucalyptus | 1.5.1 |
eucalyptus | eucalyptus | 1.5.2 |
eucalyptus | eucalyptus | 1.6 |
eucalyptus | eucalyptus | 1.6.2 |
eucalyptus | eucalyptus | 2.0 |
eucalyptus | eucalyptus | 2.0.0 |
eucalyptus | eucalyptus | 2.0.1 |
eucalyptus | eucalyptus | 2.0.2 |
eucalyptus | eucalyptus | 2.0.3 |
eucalyptus | eucalyptus | 3.0 |
eucalyptus | eucalyptus | 3.0.1 |
eucalyptus | eucalyptus | 3.1.0 |
eucalyptus | eucalyptus | 3.1.1 |
eucalyptus | eucalyptus | 3.1.2 |
eucalyptus | eucalyptus | 3.2.0 |
eucalyptus | eucalyptus | 3.2.1 |
eucalyptus | eucalyptus | 3.2.2 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration