Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-9493

Опубликовано: 07 янв. 2015
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5.5

Описание

The V2 API in OpenStack Image Registry and Delivery Service (Glance) before 2014.2.2 and 2014.1.4 allows remote authenticated users to read or delete arbitrary files via a full pathname in a file: URL in the image location property.

РелизСтатусПримечание
devel

not-affected

1:2015.1~b1-0ubuntu3
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [1:2014.1.4-0ubuntu1]]
lucid

DNE

precise

not-affected

code not present
trusty

released

1:2014.1.4-0ubuntu1
trusty/esm

DNE

trusty was released [1:2014.1.4-0ubuntu1]
upstream

needs-triage

utopic

not-affected

1:2014.2.2-0ubuntu1
vivid

not-affected

1:2015.1~b1-0ubuntu3

Показывать по

EPSS

Процентиль: 73%
0.0075
Низкий

5.5 Medium

CVSS2

Связанные уязвимости

redhat
около 11 лет назад

The V2 API in OpenStack Image Registry and Delivery Service (Glance) before 2014.2.2 and 2014.1.4 allows remote authenticated users to read or delete arbitrary files via a full pathname in a file: URL in the image location property.

nvd
около 11 лет назад

The V2 API in OpenStack Image Registry and Delivery Service (Glance) before 2014.2.2 and 2014.1.4 allows remote authenticated users to read or delete arbitrary files via a full pathname in a file: URL in the image location property.

debian
около 11 лет назад

The V2 API in OpenStack Image Registry and Delivery Service (Glance) b ...

github
больше 3 лет назад

The V2 API in OpenStack Image Registry and Delivery Service (Glance) before 2014.2.2 and 2014.1.4 allows remote authenticated users to read or delete arbitrary files via a full pathname in a file: URL in the image location property.

EPSS

Процентиль: 73%
0.0075
Низкий

5.5 Medium

CVSS2