Логотип exploitDog
bind:CVE-2012-0030
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2012-0030

Количество 4

Количество 4

ubuntu логотип

CVE-2012-0030

около 14 лет назад

Nova 2011.3 and Essex, when using the OpenStack API, allows remote authenticated users to bypass access restrictions for tenants of other users via an OSAPI request with a modified project_id URI parameter.

CVSS2: 4.9
EPSS: Низкий
nvd логотип

CVE-2012-0030

около 14 лет назад

Nova 2011.3 and Essex, when using the OpenStack API, allows remote authenticated users to bypass access restrictions for tenants of other users via an OSAPI request with a modified project_id URI parameter.

CVSS2: 4.9
EPSS: Низкий
debian логотип

CVE-2012-0030

около 14 лет назад

Nova 2011.3 and Essex, when using the OpenStack API, allows remote aut ...

CVSS2: 4.9
EPSS: Низкий
github логотип

GHSA-3c45-vg2q-j67q

почти 4 года назад

Nova 2011.3 and Essex, when using the OpenStack API, allows remote authenticated users to bypass access restrictions for tenants of other users via an OSAPI request with a modified project_id URI parameter.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2012-0030

Nova 2011.3 and Essex, when using the OpenStack API, allows remote authenticated users to bypass access restrictions for tenants of other users via an OSAPI request with a modified project_id URI parameter.

CVSS2: 4.9
1%
Низкий
около 14 лет назад
nvd логотип
CVE-2012-0030

Nova 2011.3 and Essex, when using the OpenStack API, allows remote authenticated users to bypass access restrictions for tenants of other users via an OSAPI request with a modified project_id URI parameter.

CVSS2: 4.9
1%
Низкий
около 14 лет назад
debian логотип
CVE-2012-0030

Nova 2011.3 and Essex, when using the OpenStack API, allows remote aut ...

CVSS2: 4.9
1%
Низкий
около 14 лет назад
github логотип
GHSA-3c45-vg2q-j67q

Nova 2011.3 and Essex, when using the OpenStack API, allows remote authenticated users to bypass access restrictions for tenants of other users via an OSAPI request with a modified project_id URI parameter.

1%
Низкий
почти 4 года назад

Уязвимостей на страницу