296,223
Total vulnerabilities in the database
Eucalyptus 3.0.0 through 4.0.1, when the log level is set to DEBUG or lower, logs user and system passwords, which allows local users to obtain sensitive information by reading the cloud log files.
Software | From | Fixed in |
---|---|---|
eucalyptus / eucalyptus | 4.0.1 | 4.0.1.x |
eucalyptus / eucalyptus | 3.3.1 | 3.3.1.x |
eucalyptus / eucalyptus | 3.2.2 | 3.2.2.x |
eucalyptus / eucalyptus | 3.3.2 | 3.3.2.x |
eucalyptus / eucalyptus | 3.3.0 | 3.3.0.x |
eucalyptus / eucalyptus | 3.0.1 | 3.0.1.x |
eucalyptus / eucalyptus | 3.4.0 | 3.4.0.x |
eucalyptus / eucalyptus | 3.4.1 | 3.4.1.x |
eucalyptus / eucalyptus | 3.4.2 | 3.4.2.x |
eucalyptus / eucalyptus | 3.1.0 | 3.1.0.x |
eucalyptus / eucalyptus | 3.1.1 | 3.1.1.x |
eucalyptus / eucalyptus | 3.1.2 | 3.1.2.x |
eucalyptus / eucalyptus | 3.0 | 3.0.x |
eucalyptus / eucalyptus | 3.2.1 | 3.2.1.x |
eucalyptus / eucalyptus | 3.2.0 | 3.2.0.x |
eucalyptus / eucalyptus | 3.4.3 | 3.4.3.x |
eucalyptus / eucalyptus | 4.0.0 | 4.0.0.x |