Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apache cloudstack 4.0.0 vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2013-2758
Apache CloudStack 4.0.0 prior to 4.0.2 and Citrix CloudPlatform (formerly Citrix CloudStack) 3.0.x prior to 3.0.6 Patch C uses a hash of a predictable sequence, which makes it easier for remote malicious users to guess the console access URL via a brute force attack.
Apache Cloudstack 4.0.2
Apache Cloudstack 4.0.1
Citrix Cloudplatform 3.0.3
Citrix Cloudplatform 3.0.5
Apache Cloudstack 4.0.0
Citrix Cloudplatform 3.0.6
Citrix Cloudplatform 3.0
Citrix Cloudplatform 3.0.4
445
VMScore
CVE-2013-2756
Apache CloudStack 4.0.0 prior to 4.0.2 and Citrix CloudPlatform (formerly Citrix CloudStack) 3.0.x prior to 3.0.6 Patch C allows remote malicious users to bypass the console proxy authentication by leveraging knowledge of the source code.
Apache Cloudstack 4.0.2
Apache Cloudstack 4.0.1
Citrix Cloudplatform 3.0.3
Citrix Cloudplatform 3.0.5
Apache Cloudstack 4.0.0
Citrix Cloudplatform 3.0.6
Citrix Cloudplatform 3.0
Citrix Cloudplatform 3.0.4
383
VMScore
CVE-2013-2136
Multiple cross-site scripting (XSS) vulnerabilities in Apache CloudStack prior to 4.1.1 allow remote malicious users to inject arbitrary web script or HTML via the (1) Physical network name to the Zone wizard; (2) New network name, (3) instance name, or (4) group to the Instance ...
Apache Cloudstack 2.0
Apache Cloudstack 2.0.1
Apache Cloudstack 2.1.5
Apache Cloudstack 2.1.6
Apache Cloudstack 2.2.12
Apache Cloudstack 2.2.13
Apache Cloudstack 2.2.9
Apache Cloudstack 3.0.0
Apache Cloudstack 2.1.10
Apache Cloudstack 2.1.2
Apache Cloudstack 2.1.9
Apache Cloudstack 2.2.0
Apache Cloudstack 2.2.3
Apache Cloudstack 2.2.5
Apache Cloudstack 2.2.6
Apache Cloudstack 4.0.0
Apache Cloudstack 4.0.1
Apache Cloudstack 2.1.0
Apache Cloudstack 2.1.1
Apache Cloudstack 2.1.7
Apache Cloudstack 2.1.8
Apache Cloudstack 2.2.14
356
VMScore
CVE-2014-0031
The (1) ListNetworkACL and (2) listNetworkACLLists APIs in Apache CloudStack prior to 4.2.1 allow remote authenticated users to list network ACLS for other users via a crafted request.
Apache Cloudstack 2.0
Apache Cloudstack 2.0.1
Apache Cloudstack 2.1.0
Apache Cloudstack 2.1.1
Apache Cloudstack 2.2.13
Apache Cloudstack 2.2.14
Apache Cloudstack 2.2.2
Apache Cloudstack 2.2.3
Apache Cloudstack
Apache Cloudstack 2.1.10
Apache Cloudstack 2.1.3
Apache Cloudstack 2.1.5
Apache Cloudstack 2.2.0
Apache Cloudstack 2.2.11
Apache Cloudstack 2.2.6
Apache Cloudstack 2.2.8
Apache Cloudstack 4.0.0
Apache Cloudstack 4.0.2
Apache Cloudstack 2.1.6
Apache Cloudstack 2.1.7
Apache Cloudstack 2.1.8
Apache Cloudstack 2.1.9
249
VMScore
CVE-2013-6398
The virtual router in Apache CloudStack prior to 4.2.1 does not preserve the source restrictions in firewall rules after being restarted, which allows remote malicious users to bypass intended restrictions via a request.
Apache Cloudstack 4.1.1
Apache Cloudstack 2.1.2
Apache Cloudstack 2.1.3
Apache Cloudstack 2.1.4
Apache Cloudstack 2.2.1
Apache Cloudstack 2.2.11
Apache Cloudstack 2.2.6
Apache Cloudstack 2.2.7
Apache Cloudstack 4.0.1
Apache Cloudstack 4.0.2
Apache Cloudstack 4.1.0
Apache Cloudstack
Apache Cloudstack 2.0
Apache Cloudstack 2.1.5
Apache Cloudstack 2.1.6
Apache Cloudstack 2.2.12
Apache Cloudstack 2.2.13
Apache Cloudstack 2.2.8
Apache Cloudstack 2.2.9
Apache Cloudstack 2.0.1
Apache Cloudstack 2.1.0
Apache Cloudstack 2.1.7
134
VMScore
CVE-2012-5616
Apache CloudStack 4.0.0-incubating and Citrix CloudPlatform (formerly Citrix CloudStack) prior to 3.0.6 stores sensitive information in the log4j.conf log file, which allows local users to obtain (1) the SSH private key as recorded by the createSSHKeyPair API, (2) the password of...
Citrix Cloudplatform
Apache Cloudstack 4.0.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30043
camera
CVE-2023-40404
CVE-2024-2793
client side
CVE-2024-4469
CVE-2024-3565
CVE-2024-29825
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started