296,223
Total vulnerabilities in the database
HPE Helion Eucalyptus 3.4.0 through 4.2.0 allows remote authenticated users to bypass an intended AssumeRole permission requirement and assume an IAM role by leveraging a policy setting for a user's account.
Software | From | Fixed in |
---|---|---|
eucalyptus / eucalyptus | 4.0.1 | 4.0.1.x |
eucalyptus / eucalyptus | 3.4.0 | 3.4.0.x |
eucalyptus / eucalyptus | 3.4.1 | 3.4.1.x |
eucalyptus / eucalyptus | 3.4.2 | 3.4.2.x |
eucalyptus / eucalyptus | 4.1.2 | 4.1.2.x |
eucalyptus / eucalyptus | 4.1.1 | 4.1.1.x |
eucalyptus / eucalyptus | 3.4.3 | 3.4.3.x |
eucalyptus / eucalyptus | 4.1.0 | 4.1.0.x |
eucalyptus / eucalyptus | 4.0.0 | 4.0.0.x |
eucalyptus / eucalyptus | 4.2.0 | 4.2.0.x |
eucalyptus / eucalyptus | 4.0.2 | 4.0.2.x |