4 results (0.003 seconds)

CVSS: 8.7EPSS: 0%CPEs: 1EXPL: 1

A command injection vulnerability in the cookieDomain and relayDomain parameters of Okta Access Gateway before 2020.9.3 allows attackers (with admin access to the Okta Access Gateway UI) to execute OS commands as a privileged system account. Una vulnerabilidad de inyección de comandos en los parámetros cookieDomain y relayDomain de Okta Access Gateway versiones anteriores a 2020.9.3, permite a atacantes (con acceso de administrador a la interfaz de usuario de Okta Access Gateway) ejecutar comandos del sistema operativo como una cuenta system privilegiada. Okta Access Gateway version 2020.5.5 suffers from multiple authenticated remote root command injection vulnerabilities. • http://packetstormsecurity.com/files/163428/Okta-Access-Gateway-2020.5.5-Authenticated-Remote-Root.html https://www.okta.com/security-advisories/cve-2021-28113 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 9.3EPSS: 11%CPEs: 18EXPL: 3

The web authentication form in the NT4 authentication component in Citrix Access Gateway Enterprise Edition 9.2-49.8 and earlier, and the NTLM authentication component in Access Gateway Standard and Advanced Editions before Access Gateway 5.0, allows attackers to execute arbitrary commands via shell metacharacters in the password field. Vulnerabilidad no especificada en el componente de autenticación NT4 en Citrix Access Gateway Enterprise Edition v9.2-49.8 y anteriores, y el componente de autenticación NTLM en "Access Gateway Standard Edition" y "Access Gateway Advanced Edition" antes de su versión v5.0, permite a atacantes eludir la autenticación y, posiblemente, ejecutar código arbitrario a través de vectores desconocidos. Citrix Access Gateway Command Injection Enterprise Edition up to 9.2-49.8 and Standard and Advanced Editions prior to 5.0 suffer from a remote command injection vulnerability. • https://www.exploit-db.com/exploits/16916 https://www.exploit-db.com/exploits/15806 http://securityreason.com/securityalert/8119 http://support.citrix.com/article/CTX127613 http://www.exploit-db.com/exploits/16916 http://www.osvdb.org/70099 http://www.securitytracker.com/id?1024893 http://www.vsecurity.com/resources/advisory/20101221-1 •

CVSS: 10.0EPSS: 0%CPEs: 4EXPL: 0

Unspecified vulnerability in Citrix Access Gateway Standard Edition 4.5.7 and earlier and Advanced Edition 4.5 HF2 and earlier allows attackers to bypass authentication and gain "access to network resources" via unspecified vectors. Vulnerabilidad no especificada en Citrix Access Gateway Standard Edition 4.5.7 y versiones anteriores y Advanced Edition 4.5 HF2 y versiones anteriores permite a atacantes remotos evitar la autenticación y conseguir "acceso a los recursos de red" a través de vectores no especificados. • http://secunia.com/advisories/30175 http://support.citrix.com/article/CTX116930 http://www.securityfocus.com/bid/29174 http://www.securitytracker.com/id?1020025 http://www.vupen.com/english/advisories/2008/1474/references https://exchange.xforce.ibmcloud.com/vulnerabilities/42356 • CWE-287: Improper Authentication •

CVSS: 4.3EPSS: 1%CPEs: 2EXPL: 0

The Citrix EPA ActiveX control (aka the "endpoint checking control" or CCAOControl Object) before 4.5.0.0 in npCtxCAO.dll in Citrix Access Gateway Standard Edition before 4.5.5 and Advanced Edition before 4.5 HF1 allows remote attackers to download and execute arbitrary programs onto a client system. El control ActiveX Citrix EPA (también conocido como el "endpoint checking control" ó Objeto CCAOControl) versiones anteriores a 4.5.0.0 en npCtxCAO.dll de Citrix Access Gateway Standard Edition versiones anteriores a 4.5.5 y Advanced Edition versiones anteriores a 4.5 HF1, permite a atacantes remotos descargar y ejecutar programas de su elección en un sistema cliente. • http://osvdb.org/37845 http://secunia.com/advisories/26143 http://securityreason.com/securityalert/2916 http://support.citrix.com/article/CTX113815 http://support.citrix.com/article/CTX114028 http://www.securityfocus.com/archive/1/474204/100/0/threaded http://www.securityfocus.com/bid/24865 http://www.securityfocus.com/bid/24975 http://www.symantec.com/content/en/us/enterprise/research/SYMSA-2007-006.txt http://www.vupen.com/english/advisories/2007/2583 https://exchange.xf •