Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apache cloudstack 4.0.2 vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2013-2756
Apache CloudStack 4.0.0 prior to 4.0.2 and Citrix CloudPlatform (formerly Citrix CloudStack) 3.0.x prior to 3.0.6 Patch C allows remote malicious users to bypass the console proxy authentication by leveraging knowledge of the source code.
Apache Cloudstack 4.0.2
Apache Cloudstack 4.0.1
Citrix Cloudplatform 3.0.3
Citrix Cloudplatform 3.0.5
Apache Cloudstack 4.0.0
Citrix Cloudplatform 3.0.6
Citrix Cloudplatform 3.0
Citrix Cloudplatform 3.0.4
445
VMScore
CVE-2013-2758
Apache CloudStack 4.0.0 prior to 4.0.2 and Citrix CloudPlatform (formerly Citrix CloudStack) 3.0.x prior to 3.0.6 Patch C uses a hash of a predictable sequence, which makes it easier for remote malicious users to guess the console access URL via a brute force attack.
Apache Cloudstack 4.0.2
Apache Cloudstack 4.0.1
Citrix Cloudplatform 3.0.3
Citrix Cloudplatform 3.0.5
Apache Cloudstack 4.0.0
Citrix Cloudplatform 3.0.6
Citrix Cloudplatform 3.0
Citrix Cloudplatform 3.0.4
383
VMScore
CVE-2013-2136
Multiple cross-site scripting (XSS) vulnerabilities in Apache CloudStack prior to 4.1.1 allow remote malicious users to inject arbitrary web script or HTML via the (1) Physical network name to the Zone wizard; (2) New network name, (3) instance name, or (4) group to the Instance ...
Apache Cloudstack 2.0
Apache Cloudstack 2.0.1
Apache Cloudstack 2.1.5
Apache Cloudstack 2.1.6
Apache Cloudstack 2.2.12
Apache Cloudstack 2.2.13
Apache Cloudstack 2.2.9
Apache Cloudstack 3.0.0
Apache Cloudstack 2.1.10
Apache Cloudstack 2.1.2
Apache Cloudstack 2.1.9
Apache Cloudstack 2.2.0
Apache Cloudstack 2.2.3
Apache Cloudstack 2.2.5
Apache Cloudstack 2.2.6
Apache Cloudstack 4.0.0
Apache Cloudstack 4.0.1
Apache Cloudstack 2.1.0
Apache Cloudstack 2.1.1
Apache Cloudstack 2.1.7
Apache Cloudstack 2.1.8
Apache Cloudstack 2.2.14
356
VMScore
CVE-2014-0031
The (1) ListNetworkACL and (2) listNetworkACLLists APIs in Apache CloudStack prior to 4.2.1 allow remote authenticated users to list network ACLS for other users via a crafted request.
Apache Cloudstack 2.0
Apache Cloudstack 2.0.1
Apache Cloudstack 2.1.0
Apache Cloudstack 2.1.1
Apache Cloudstack 2.2.13
Apache Cloudstack 2.2.14
Apache Cloudstack 2.2.2
Apache Cloudstack 2.2.3
Apache Cloudstack
Apache Cloudstack 2.1.10
Apache Cloudstack 2.1.3
Apache Cloudstack 2.1.5
Apache Cloudstack 2.2.0
Apache Cloudstack 2.2.11
Apache Cloudstack 2.2.6
Apache Cloudstack 2.2.8
Apache Cloudstack 4.0.0
Apache Cloudstack 4.0.2
Apache Cloudstack 2.1.6
Apache Cloudstack 2.1.7
Apache Cloudstack 2.1.8
Apache Cloudstack 2.1.9
249
VMScore
CVE-2013-6398
The virtual router in Apache CloudStack prior to 4.2.1 does not preserve the source restrictions in firewall rules after being restarted, which allows remote malicious users to bypass intended restrictions via a request.
Apache Cloudstack 4.1.1
Apache Cloudstack 2.1.2
Apache Cloudstack 2.1.3
Apache Cloudstack 2.1.4
Apache Cloudstack 2.2.1
Apache Cloudstack 2.2.11
Apache Cloudstack 2.2.6
Apache Cloudstack 2.2.7
Apache Cloudstack 4.0.1
Apache Cloudstack 4.0.2
Apache Cloudstack 4.1.0
Apache Cloudstack
Apache Cloudstack 2.0
Apache Cloudstack 2.1.5
Apache Cloudstack 2.1.6
Apache Cloudstack 2.2.12
Apache Cloudstack 2.2.13
Apache Cloudstack 2.2.8
Apache Cloudstack 2.2.9
Apache Cloudstack 2.0.1
Apache Cloudstack 2.1.0
Apache Cloudstack 2.1.7
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started