Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cloudstack vulnerabilities and exploits
(subscribe to this query)
890
VMScore
CVE-2012-4501
Citrix Cloud.com CloudStack, and Apache CloudStack pre-release, allows remote malicious users to make arbitrary API calls by leveraging the system user account, as demonstrated by API calls to delete VMs.
Apache Cloudstack -
Citrix Cloudstack -
668
VMScore
CVE-2019-17562
A buffer overflow vulnerability has been found in the baremetal component of Apache CloudStack. This applies to all versions before 4.13.1. The vulnerability is due to the lack of validation of the mac parameter in baremetal virtual router. If you insert an arbitrary shell comman...
Apache Cloudstack
668
VMScore
CVE-2016-6813
Apache CloudStack 4.1 to 4.8.1.0 and 4.9.0.0 contain an API call designed to allow a user to register for the developer API. If a malicious user is able to determine the ID of another (non-"root") CloudStack user, the malicious user may be able to reset the API keys for...
Apache Cloudstack
Apache Cloudstack 4.9.0
668
VMScore
CVE-2013-2757
Citrix CloudPlatform (formerly Citrix CloudStack) 3.0.x prior to 3.0.6 Patch C does not properly restrict access to VNC ports on the management network, which allows remote malicious users to have unspecified impact via unknown vectors.
Citrix Cloudplatform 3.0.6
Citrix Cloudplatform 3.0
Citrix Cloudplatform 3.0.5
Citrix Cloudplatform 3.0.3
Citrix Cloudplatform 3.0.4
534
VMScore
CVE-2015-3252
Apache CloudStack prior to 4.5.2 does not properly preserve VNC passwords when migrating KVM virtual machines, which allows remote malicious users to gain access by connecting to the VNC server.
Apache Cloudstack
516
VMScore
CVE-2016-3085
Apache CloudStack 4.5.x prior to 4.5.2.1, 4.6.x prior to 4.6.2.1, 4.7.x prior to 4.7.1.1, and 4.8.x prior to 4.8.0.1, when SAML-based authentication is enabled and used, allow remote malicious users to bypass authentication and access the user interface via vectors related to the...
Apache Cloudstack 4.7.0
Apache Cloudstack 4.5.2
Apache Cloudstack 4.5.1
Apache Cloudstack 4.6.2
Apache Cloudstack 4.6.1
Apache Cloudstack 4.6.0
Apache Cloudstack 4.8
445
VMScore
CVE-2014-9593
Apache CloudStack prior to 4.3.2 and 4.4.x prior to 4.4.2 allows remote malicious users to obtain private keys via a listSslCerts API call.
Apache Cloudstack
Apache Cloudstack 4.4.1
Apache Cloudstack 4.4.0
445
VMScore
CVE-2014-7807
Apache CloudStack 4.3.x prior to 4.3.2 and 4.4.x prior to 4.4.2 allows remote malicious users to bypass authentication via a login request without a password, which triggers an unauthenticated bind.
Apache Cloudstack 4.3.0
Apache Cloudstack 4.3.1
Apache Cloudstack 4.4.0
Apache Cloudstack 4.4.1
445
VMScore
CVE-2013-2756
Apache CloudStack 4.0.0 prior to 4.0.2 and Citrix CloudPlatform (formerly Citrix CloudStack) 3.0.x prior to 3.0.6 Patch C allows remote malicious users to bypass the console proxy authentication by leveraging knowledge of the source code.
Apache Cloudstack 4.0.2
Apache Cloudstack 4.0.1
Citrix Cloudplatform 3.0.3
Citrix Cloudplatform 3.0.5
Apache Cloudstack 4.0.0
Citrix Cloudplatform 3.0.6
Citrix Cloudplatform 3.0
Citrix Cloudplatform 3.0.4
445
VMScore
CVE-2013-2758
Apache CloudStack 4.0.0 prior to 4.0.2 and Citrix CloudPlatform (formerly Citrix CloudStack) 3.0.x prior to 3.0.6 Patch C uses a hash of a predictable sequence, which makes it easier for remote malicious users to guess the console access URL via a brute force attack.
Apache Cloudstack 4.0.2
Apache Cloudstack 4.0.1
Citrix Cloudplatform 3.0.3
Citrix Cloudplatform 3.0.5
Apache Cloudstack 4.0.0
Citrix Cloudplatform 3.0.6
Citrix Cloudplatform 3.0
Citrix Cloudplatform 3.0.4
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7073
CVE-2024-5496
CVE-2024-5495
XPath injection
bypass
CVE-2024-30043
CVE-2024-24919
denial of service
CVE-2024-35468
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »