Page 2 of 12 results (0.004 seconds)

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

Apache CloudStack before 4.3.2 and 4.4.x before 4.4.2 allows remote attackers to obtain private keys via a listSslCerts API call. Apache CloudStack anterior a 4.3.2 y 4.4.x anterior a 4.4.2 permite a atacantes remotos obtener claves privados a través de una llamada a la API listSslCerts. • http://docs.cloudstack.apache.org/projects/cloudstack-release-notes/en/4.3.2/about.html http://docs.cloudstack.apache.org/projects/cloudstack-release-notes/en/4.4.2/fixed_issues.html#issues-fixed-in-release http://secunia.com/advisories/62216 https://issues.apache.org/jira/browse/CLOUDSTACK-7952 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 4.0EPSS: 0%CPEs: 35EXPL: 0

The (1) ListNetworkACL and (2) listNetworkACLLists APIs in Apache CloudStack before 4.2.1 allow remote authenticated users to list network ACLS for other users via a crafted request. Las APIs (1) ListNetworkACL y (2) listNetworkACLLists en Apache CloudStack anteriores a 4.2.1 permite a usuarios autenticados remotamente listar networkACLS para otros usuarios a través de una petición manipulada. • http://secunia.com/advisories/55960 https://blogs.apache.org/cloudstack/entry/cve_2014_0031_cloudstack_listnetworkacl https://issues.apache.org/jira/browse/CLOUDSTACK-5145 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 2.8EPSS: 0%CPEs: 35EXPL: 0

The virtual router in Apache CloudStack before 4.2.1 does not preserve the source restrictions in firewall rules after being restarted, which allows remote attackers to bypass intended restrictions via a request. El router virtual en Apache CloudStack anteriores a 4.2.1 no mantiene las restricciones de orígenes en reglas del firewall después de ser reiniciado, lo cual permite a atacantes remotos eludir restricciones intencionadas a través de una petición. • http://secunia.com/advisories/55960 http://secunia.com/advisories/60284 http://support.citrix.com/article/CTX140989 http://www.securityfocus.com/bid/69432 http://www.securitytracker.com/id/1030762 https://blogs.apache.org/cloudstack/entry/cve_2013_6398_cloudstack_virtual https://issues.apache.org/jira/browse/CLOUDSTACK-5263 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 4.3EPSS: 0%CPEs: 33EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in Apache CloudStack before 4.1.1 allow remote attackers to inject arbitrary web script or HTML via the (1) Physical network name to the Zone wizard; (2) New network name, (3) instance name, or (4) group to the Instance wizard; (5) unspecified "multi-edit fields;" and (6) unspecified "list view" edit fields related to global settings. Múltiples vulnerabilidades XSS en Apache CloudStack 4.1.1, permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarias a través de (1) un nombre físico de red mediante el asistente de zona, (2) un nombre nuevo de red, (3) un nombre de instancia o (4) grupo en el asistente de instancias; (5) campos "multiedit" sin especificar y (6) campos editables del tipo "list view" sin especificar relacionados con los parámetros globales. • http://archives.neohapsis.com/archives/bugtraq/2013-08/0034.html http://archives.neohapsis.com/archives/bugtraq/2013-08/0047.html http://osvdb.org/96074 http://osvdb.org/96075 http://osvdb.org/96076 http://osvdb.org/96077 http://osvdb.org/96078 http://secunia.com/advisories/54399 http://www.securityfocus.com/bid/61638 https://exchange.xforce.ibmcloud.com/vulnerabilities/86258 https://issues.apache.org/jira/browse/CLOUDSTACK-2936 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.0EPSS: 0%CPEs: 8EXPL: 0

Apache CloudStack 4.0.0 before 4.0.2 and Citrix CloudPlatform (formerly Citrix CloudStack) 3.0.x before 3.0.6 Patch C uses a hash of a predictable sequence, which makes it easier for remote attackers to guess the console access URL via a brute force attack. Apache CloudStack 4.0.0 anterior a 4.0.2 y Citrix CloudPlatform (anteriormente Citrix CloudStack) 3.0.x anterior a 3.0.6 Patch C utiliza un hash de una secuencia previsible, lo que facilita a atacantes remotos adivinar la URL de acceso de consola a través de un ataque de fuerza bruta. • http://mail-archives.apache.org/mod_mbox/cloudstack-dev/201304.mbox/%3C51786984.1060300%40stratosec.co%3E http://osvdb.org/92749 http://secunia.com/advisories/53175 http://secunia.com/advisories/53204 http://support.citrix.com/article/CTX135815 http://www.securityfocus.com/bid/59464 http://www.securitytracker.com/id/1028473 https://exchange.xforce.ibmcloud.com/vulnerabilities/83782 • CWE-310: Cryptographic Issues •