Vulnerabilities (CVE)

Filtered by vendor Openstack Subscribe
Filtered by product Folsom
Total 26 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2013-1840 2 Amazon, Openstack 5 S3 Store, Essex, Folsom and 2 more 2023-12-10 3.5 LOW N/A
The v1 API in OpenStack Glance Essex (2012.1), Folsom (2012.2), and Grizzly, when using the single-tenant Swift or S3 store, reports the location field, which allows remote authenticated users to obtain the operator's backend credentials via a request for a cached image.
CVE-2012-3360 1 Openstack 2 Essex, Folsom 2023-12-10 5.5 MEDIUM N/A
Directory traversal vulnerability in virt/disk/api.py in OpenStack Compute (Nova) Folsom (2012.2) and Essex (2012.1), when used over libvirt-based hypervisors, allows remote authenticated users to write arbitrary files to the disk image via a .. (dot dot) in the path attribute of a file element.
CVE-2013-0208 2 Canonical, Openstack 3 Ubuntu Linux, Essex, Folsom 2023-12-10 6.5 MEDIUM N/A
The boot-from-volume feature in OpenStack Compute (Nova) Folsom and Essex, when using nova-volumes, allows remote authenticated users to boot from other users' volumes via a volume id in the block_device_mapping parameter.
CVE-2013-2161 2 Openstack, Opensuse 4 Folsom, Grizzly, Havana and 1 more 2023-12-10 7.5 HIGH N/A
XML injection vulnerability in account/utils.py in OpenStack Swift Folsom, Grizzly, and Havana allows attackers to trigger invalid or spoofed Swift responses via an account name.
CVE-2013-2096 1 Openstack 3 Folsom, Grizzly, Havana 2023-12-10 2.1 LOW N/A
OpenStack Compute (Nova) Folsom, Grizzly, and Havana does not verify the virtual size of a QCOW2 image, which allows local users to cause a denial of service (host file system disk consumption) by creating an image with a large virtual size that does not contain a large amount of data.
CVE-2012-5571 1 Openstack 2 Essex, Folsom 2023-12-10 3.5 LOW N/A
OpenStack Keystone Essex (2012.1) and Folsom (2012.2) does not properly handle EC2 tokens when the user role has been removed from a tenant, which allows remote authenticated users to bypass intended authorization restrictions by leveraging a token for the removed user role.