Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cloudstack vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2022-35741
Apache CloudStack version 4.5.0 and later has a SAML 2.0 authentication Service Provider plugin which is found to be vulnerable to XML external entity (XXE) injection. This plugin is not enabled by default and the attacker would require that this plugin be enabled to exploit the ...
Apache Cloudstack
Apache Cloudstack 4.17.0.0
9.8
CVSSv3
CVE-2019-17562
A buffer overflow vulnerability has been found in the baremetal component of Apache CloudStack. This applies to all versions before 4.13.1. The vulnerability is due to the lack of validation of the mac parameter in baremetal virtual router. If you insert an arbitrary shell comman...
Apache Cloudstack
9.8
CVSSv3
CVE-2016-6813
Apache CloudStack 4.1 to 4.8.1.0 and 4.9.0.0 contain an API call designed to allow a user to register for the developer API. If a malicious user is able to determine the ID of another (non-"root") CloudStack user, the malicious user may be able to reset the API keys for...
Apache Cloudstack
Apache Cloudstack 4.9.0
9.8
CVSSv3
CVE-2015-3252
Apache CloudStack prior to 4.5.2 does not properly preserve VNC passwords when migrating KVM virtual machines, which allows remote malicious users to gain access by connecting to the VNC server.
Apache Cloudstack
7.5
CVSSv3
CVE-2022-26779
Apache CloudStack before 4.16.1.0 used insecure random number generation for project invitation tokens. If a project invite is created based only on an email address, a random token is generated. An attacker with knowledge of the project ID and the fact that the invite is sent, c...
Apache Cloudstack
6.5
CVSSv3
CVE-2016-3085
Apache CloudStack 4.5.x prior to 4.5.2.1, 4.6.x prior to 4.6.2.1, 4.7.x prior to 4.7.1.1, and 4.8.x prior to 4.8.0.1, when SAML-based authentication is enabled and used, allow remote malicious users to bypass authentication and access the user interface via vectors related to the...
Apache Cloudstack 4.7.0
Apache Cloudstack 4.5.2
Apache Cloudstack 4.5.1
Apache Cloudstack 4.6.2
Apache Cloudstack 4.6.1
Apache Cloudstack 4.6.0
Apache Cloudstack 4.8
4.9
CVSSv3
CVE-2015-3251
Apache CloudStack prior to 4.5.2 might allow remote authenticated administrators to obtain sensitive password information for root accounts of virtual machines via unspecified vectors related to API calls.
Apache Cloudstack 4.5.1
Apache Cloudstack 4.4.4
4.3
CVSSv3
CVE-2013-4317
In Apache CloudStack 4.1.0 and 4.1.1, when calling the CloudStack API call listProjectAccounts as a regular, non-administrative user, the user is able to see information for accounts other than their own.
Apache Cloudstack 4.1.0
Apache Cloudstack 4.1.1
NA
CVE-2024-29006
By default the CloudStack management server honours the x-forwarded-for HTTP header and logs it as the source IP of an API request. This could lead to authentication bypass and other operational problems should an attacker decide to spoof their IP address this way. Users are reco...
NA
CVE-2024-29007
The CloudStack management server and secondary storage VM could be tricked into making requests to restricted or random resources by means of following 301 HTTP redirects presented by external servers when downloading templates or ISOs. Users are recommended to upgrade to version...
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7073
CVE-2024-5496
CVE-2024-5495
XPath injection
bypass
CVE-2024-30043
CVE-2024-24919
denial of service
CVE-2024-35468
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »