11 results (0.007 seconds)

CVSS: 8.7EPSS: 0%CPEs: 1EXPL: 1

A command injection vulnerability in the cookieDomain and relayDomain parameters of Okta Access Gateway before 2020.9.3 allows attackers (with admin access to the Okta Access Gateway UI) to execute OS commands as a privileged system account. Una vulnerabilidad de inyección de comandos en los parámetros cookieDomain y relayDomain de Okta Access Gateway versiones anteriores a 2020.9.3, permite a atacantes (con acceso de administrador a la interfaz de usuario de Okta Access Gateway) ejecutar comandos del sistema operativo como una cuenta system privilegiada. Okta Access Gateway version 2020.5.5 suffers from multiple authenticated remote root command injection vulnerabilities. • http://packetstormsecurity.com/files/163428/Okta-Access-Gateway-2020.5.5-Authenticated-Remote-Root.html https://www.okta.com/security-advisories/cve-2021-28113 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 9.3EPSS: 11%CPEs: 18EXPL: 3

The web authentication form in the NT4 authentication component in Citrix Access Gateway Enterprise Edition 9.2-49.8 and earlier, and the NTLM authentication component in Access Gateway Standard and Advanced Editions before Access Gateway 5.0, allows attackers to execute arbitrary commands via shell metacharacters in the password field. Vulnerabilidad no especificada en el componente de autenticación NT4 en Citrix Access Gateway Enterprise Edition v9.2-49.8 y anteriores, y el componente de autenticación NTLM en "Access Gateway Standard Edition" y "Access Gateway Advanced Edition" antes de su versión v5.0, permite a atacantes eludir la autenticación y, posiblemente, ejecutar código arbitrario a través de vectores desconocidos. Citrix Access Gateway Command Injection Enterprise Edition up to 9.2-49.8 and Standard and Advanced Editions prior to 5.0 suffer from a remote command injection vulnerability. • https://www.exploit-db.com/exploits/16916 https://www.exploit-db.com/exploits/15806 http://securityreason.com/securityalert/8119 http://support.citrix.com/article/CTX127613 http://www.exploit-db.com/exploits/16916 http://www.osvdb.org/70099 http://www.securitytracker.com/id?1024893 http://www.vsecurity.com/resources/advisory/20101221-1 •

CVSS: 10.0EPSS: 0%CPEs: 4EXPL: 0

Unspecified vulnerability in Citrix Access Gateway Standard Edition 4.5.7 and earlier and Advanced Edition 4.5 HF2 and earlier allows attackers to bypass authentication and gain "access to network resources" via unspecified vectors. Vulnerabilidad no especificada en Citrix Access Gateway Standard Edition 4.5.7 y versiones anteriores y Advanced Edition 4.5 HF2 y versiones anteriores permite a atacantes remotos evitar la autenticación y conseguir "acceso a los recursos de red" a través de vectores no especificados. • http://secunia.com/advisories/30175 http://support.citrix.com/article/CTX116930 http://www.securityfocus.com/bid/29174 http://www.securitytracker.com/id?1020025 http://www.vupen.com/english/advisories/2008/1474/references https://exchange.xforce.ibmcloud.com/vulnerabilities/42356 • CWE-287: Improper Authentication •

CVSS: 5.0EPSS: 1%CPEs: 4EXPL: 0

The web portal interface in Citrix Access Gateway (aka Citrix Advanced Access Control) before Advanced Edition 4.5 HF1 places a session ID in the URL, which allows context-dependent attackers to hijack sessions by reading "residual information", including the a referer log, browser history, or browser cache. El interfaz del portal web de Citrix Access Gateway (también conocido como Citrix Advanced Access Control) versiones anteriores a Advanced Edition 4.5 HF1, sitúa un ID de sesión en el URL, lo cual permite a atacantes locales o remotos dependientes del contexto secuestrar sesiones al leer "información residual", incluyendo un fichero de trazas utilizado, historial del navegador, o la caché del navegador. • http://osvdb.org/45288 http://secunia.com/advisories/26143 http://securitytracker.com/id?1018435 http://support.citrix.com/article/CTX112803 http://support.citrix.com/article/CTX113814 http://www.securityfocus.com/archive/1/482626/100/100/threaded http://www.securityfocus.com/bid/24975 http://www.vupen.com/english/advisories/2007/2583 https://exchange.xforce.ibmcloud.com/vulnerabilities/35510 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 6.8EPSS: 0%CPEs: 2EXPL: 0

Citrix Access Gateway Advanced Edition before firmware 4.5.5 allows attackers to redirect users to arbitrary web sites and conduct phishing attacks via unknown vectors. Citrix Access Gateway Advanced Edition anterior a software empotrado (firmware) 4.5.5 permite a atacantes remotos redireccionar usuarios a sitios web de su elección y llevar a cabo ataques de phishing a través de vectores desconocidos. • http://osvdb.org/37840 http://secunia.com/advisories/26143 http://support.citrix.com/article/CTX113816 http://support.citrix.com/article/CTX114028 http://www.securityfocus.com/bid/24975 http://www.securitytracker.com/id?1018435 http://www.vupen.com/english/advisories/2007/2583 https://exchange.xforce.ibmcloud.com/vulnerabilities/35512 •