CVE-2016-0732
07.09.2017, 13:29
The identity zones feature in Pivotal Cloud Foundry 208 through 229; UAA 2.0.0 through 2.7.3 and 3.0.0; UAA-Release 2 through 4, when configured with multiple identity zones; and Elastic Runtime 1.6.0 through 1.6.13 allows remote authenticated users with privileges in one zone to gain privileges and perform operations on a different zone via unspecified vectors.Enginsight
Vendor | Product | Version |
---|---|---|
cloudfoundry | cf-release | 208 ≤ 𝑥 ≤ 229 |
cloudfoundry | user_account_and_authentication | 2.0.0 |
cloudfoundry | user_account_and_authentication | 2.0.1 |
cloudfoundry | user_account_and_authentication | 2.0.2 |
cloudfoundry | user_account_and_authentication | 2.0.3 |
cloudfoundry | user_account_and_authentication | 2.1.0 |
cloudfoundry | user_account_and_authentication | 2.2.0 |
cloudfoundry | user_account_and_authentication | 2.2.1 |
cloudfoundry | user_account_and_authentication | 2.2.2 |
cloudfoundry | user_account_and_authentication | 2.2.3 |
cloudfoundry | user_account_and_authentication | 2.2.4 |
cloudfoundry | user_account_and_authentication | 2.2.4.1 |
cloudfoundry | user_account_and_authentication | 2.2.5 |
cloudfoundry | user_account_and_authentication | 2.2.5.2 |
cloudfoundry | user_account_and_authentication | 2.2.5.3 |
cloudfoundry | user_account_and_authentication | 2.2.6 |
cloudfoundry | user_account_and_authentication | 2.3.0 |
cloudfoundry | user_account_and_authentication | 2.3.1 |
cloudfoundry | user_account_and_authentication | 2.3.1.1 |
cloudfoundry | user_account_and_authentication | 2.4.0 |
cloudfoundry | user_account_and_authentication | 2.4.1 |
cloudfoundry | user_account_and_authentication | 2.5.0 |
cloudfoundry | user_account_and_authentication | 2.5.1 |
cloudfoundry | user_account_and_authentication | 2.5.2 |
cloudfoundry | user_account_and_authentication | 2.6.0 |
cloudfoundry | user_account_and_authentication | 2.6.1 |
cloudfoundry | user_account_and_authentication | 2.6.2 |
cloudfoundry | user_account_and_authentication | 2.7.0 |
cloudfoundry | user_account_and_authentication | 2.7.0.1 |
cloudfoundry | user_account_and_authentication | 2.7.0.2 |
cloudfoundry | user_account_and_authentication | 2.7.0.3 |
cloudfoundry | user_account_and_authentication | 2.7.1 |
cloudfoundry | user_account_and_authentication | 2.7.2 |
cloudfoundry | user_account_and_authentication | 2.7.3 |
pivotal | elastic_runtime | 1.6.0 |
pivotal | elastic_runtime | 1.6.1 |
pivotal | elastic_runtime | 1.6.2 |
pivotal | elastic_runtime | 1.6.3 |
pivotal | elastic_runtime | 1.6.4 |
pivotal | elastic_runtime | 1.6.5 |
pivotal | elastic_runtime | 1.6.6 |
pivotal | elastic_runtime | 1.6.7 |
pivotal | elastic_runtime | 1.6.8 |
pivotal | elastic_runtime | 1.6.9 |
pivotal | elastic_runtime | 1.6.10 |
pivotal | elastic_runtime | 1.6.11 |
pivotal | elastic_runtime | 1.6.12 |
pivotal | elastic_runtime | 1.6.13 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration