Lucene search

K
OpenstackEssex

6 matches found

CVE
CVE
added 2012/09/05 11:55 p.m.65 views

CVE-2012-3542

OpenStack Keystone, as used in OpenStack Folsom before folsom-rc1 and OpenStack Essex (2012.1), allows remote attackers to add an arbitrary user to an arbitrary tenant via a request to update the user's default tenant to the administrative API. NOTE: this identifier was originally incorrectly assig...

4.3CVSS6.5AI score0.01917EPSS
CVE
CVE
added 2012/07/31 10:45 a.m.64 views

CVE-2012-3426

OpenStack Keystone before 2012.1.1, as used in OpenStack Folsom before Folsom-1 and OpenStack Essex, does not properly implement token expiration, which allows remote authenticated users to bypass intended authorization restrictions by (1) creating new tokens through token chaining, (2) leveraging ...

4.9CVSS6.1AI score0.00208EPSS
CVE
CVE
added 2013/03/22 9:55 p.m.59 views

CVE-2013-1838

OpenStack Compute (Nova) Grizzly, Folsom (2012.2), and Essex (2012.1) does not properly implement a quota for fixed IPs, which allows remote authenticated users to cause a denial of service (resource exhaustion and failure to spawn new instances) via a large number of calls to the addFixedIp functi...

4CVSS6.2AI score0.01427EPSS
CVE
CVE
added 2012/01/13 6:55 p.m.45 views

CVE-2012-0030

Nova 2011.3 and Essex, when using the OpenStack API, allows remote authenticated users to bypass access restrictions for tenants of other users via an OSAPI request with a modified project_id URI parameter.

4.9CVSS5.3AI score0.00549EPSS
CVE
CVE
added 2013/03/08 9:55 p.m.45 views

CVE-2013-0261

(1) installer/basedefs.py and (2) modules/ospluginutils.py in PackStack allows local users to overwrite arbitrary files via a symlink attack on a temporary file with a predictable name in /tmp.

4.4CVSS6.5AI score0.00054EPSS
CVE
CVE
added 2012/06/21 3:55 p.m.42 views

CVE-2012-2654

The (1) EC2 and (2) OS APIs in OpenStack Compute (Nova) Folsom (2012.2), Essex (2012.1), and Diablo (2011.3) do not properly check the protocol when security groups are created and the network protocol is not specified entirely in lowercase, which allows remote attackers to bypass intended access r...

4.3CVSS6.5AI score0.01178EPSS