Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apache cloudstack 4.0.0 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2013-2756
Apache CloudStack 4.0.0 prior to 4.0.2 and Citrix CloudPlatform (formerly Citrix CloudStack) 3.0.x prior to 3.0.6 Patch C allows remote malicious users to bypass the console proxy authentication by leveraging knowledge of the source code.
Apache Cloudstack 4.0.2
Apache Cloudstack 4.0.1
Citrix Cloudplatform 3.0.3
Citrix Cloudplatform 3.0.5
Apache Cloudstack 4.0.0
Citrix Cloudplatform 3.0.6
Citrix Cloudplatform 3.0
Citrix Cloudplatform 3.0.4
5
CVSSv2
CVE-2013-2758
Apache CloudStack 4.0.0 prior to 4.0.2 and Citrix CloudPlatform (formerly Citrix CloudStack) 3.0.x prior to 3.0.6 Patch C uses a hash of a predictable sequence, which makes it easier for remote malicious users to guess the console access URL via a brute force attack.
Apache Cloudstack 4.0.2
Apache Cloudstack 4.0.1
Citrix Cloudplatform 3.0.3
Citrix Cloudplatform 3.0.5
Apache Cloudstack 4.0.0
Citrix Cloudplatform 3.0.6
Citrix Cloudplatform 3.0
Citrix Cloudplatform 3.0.4
4.3
CVSSv2
CVE-2013-2136
Multiple cross-site scripting (XSS) vulnerabilities in Apache CloudStack prior to 4.1.1 allow remote malicious users to inject arbitrary web script or HTML via the (1) Physical network name to the Zone wizard; (2) New network name, (3) instance name, or (4) group to the Instance ...
Apache Cloudstack 2.0
Apache Cloudstack 2.0.1
Apache Cloudstack 2.1.5
Apache Cloudstack 2.1.6
Apache Cloudstack 2.2.12
Apache Cloudstack 2.2.13
Apache Cloudstack 2.2.9
Apache Cloudstack 3.0.0
Apache Cloudstack 2.1.10
Apache Cloudstack 2.1.2
Apache Cloudstack 2.1.9
Apache Cloudstack 2.2.0
Apache Cloudstack 2.2.3
Apache Cloudstack 2.2.5
Apache Cloudstack 2.2.6
Apache Cloudstack 4.0.0
Apache Cloudstack 4.0.1
Apache Cloudstack 2.1.0
Apache Cloudstack 2.1.1
Apache Cloudstack 2.1.7
Apache Cloudstack 2.1.8
Apache Cloudstack 2.2.14
4
CVSSv2
CVE-2014-0031
The (1) ListNetworkACL and (2) listNetworkACLLists APIs in Apache CloudStack prior to 4.2.1 allow remote authenticated users to list network ACLS for other users via a crafted request.
Apache Cloudstack 2.0
Apache Cloudstack 2.0.1
Apache Cloudstack 2.1.0
Apache Cloudstack 2.1.1
Apache Cloudstack 2.2.13
Apache Cloudstack 2.2.14
Apache Cloudstack 2.2.2
Apache Cloudstack 2.2.3
Apache Cloudstack
Apache Cloudstack 2.1.10
Apache Cloudstack 2.1.3
Apache Cloudstack 2.1.5
Apache Cloudstack 2.2.0
Apache Cloudstack 2.2.11
Apache Cloudstack 2.2.6
Apache Cloudstack 2.2.8
Apache Cloudstack 4.0.0
Apache Cloudstack 4.0.2
Apache Cloudstack 2.1.6
Apache Cloudstack 2.1.7
Apache Cloudstack 2.1.8
Apache Cloudstack 2.1.9
2.8
CVSSv2
CVE-2013-6398
The virtual router in Apache CloudStack prior to 4.2.1 does not preserve the source restrictions in firewall rules after being restarted, which allows remote malicious users to bypass intended restrictions via a request.
Apache Cloudstack 4.1.1
Apache Cloudstack 2.1.2
Apache Cloudstack 2.1.3
Apache Cloudstack 2.1.4
Apache Cloudstack 2.2.1
Apache Cloudstack 2.2.11
Apache Cloudstack 2.2.6
Apache Cloudstack 2.2.7
Apache Cloudstack 4.0.1
Apache Cloudstack 4.0.2
Apache Cloudstack 4.1.0
Apache Cloudstack
Apache Cloudstack 2.0
Apache Cloudstack 2.1.5
Apache Cloudstack 2.1.6
Apache Cloudstack 2.2.12
Apache Cloudstack 2.2.13
Apache Cloudstack 2.2.8
Apache Cloudstack 2.2.9
Apache Cloudstack 2.0.1
Apache Cloudstack 2.1.0
Apache Cloudstack 2.1.7
1.5
CVSSv2
CVE-2012-5616
Apache CloudStack 4.0.0-incubating and Citrix CloudPlatform (formerly Citrix CloudStack) prior to 3.0.6 stores sensitive information in the log4j.conf log file, which allows local users to obtain (1) the SSH private key as recorded by the createSSHKeyPair API, (2) the password of...
Citrix Cloudplatform
Apache Cloudstack 4.0.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30051
remote
CVE-2024-27954
CVE-2023-51483
CVE-2023-47782
SSRF
CVE-2024-24715
CVE-2023-52424
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started