4 results (0.003 seconds)

CVSS: 8.7EPSS: 0%CPEs: 1EXPL: 1

A command injection vulnerability in the cookieDomain and relayDomain parameters of Okta Access Gateway before 2020.9.3 allows attackers (with admin access to the Okta Access Gateway UI) to execute OS commands as a privileged system account. Una vulnerabilidad de inyección de comandos en los parámetros cookieDomain y relayDomain de Okta Access Gateway versiones anteriores a 2020.9.3, permite a atacantes (con acceso de administrador a la interfaz de usuario de Okta Access Gateway) ejecutar comandos del sistema operativo como una cuenta system privilegiada. Okta Access Gateway version 2020.5.5 suffers from multiple authenticated remote root command injection vulnerabilities. • http://packetstormsecurity.com/files/163428/Okta-Access-Gateway-2020.5.5-Authenticated-Remote-Root.html https://www.okta.com/security-advisories/cve-2021-28113 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 9.3EPSS: 96%CPEs: 3EXPL: 1

Stack-based buffer overflow in the NSEPA.NsepaCtrl.1 ActiveX control in nsepa.ocx in Citrix Access Gateway Enterprise Edition 8.1 before 8.1-67.7, 9.0 before 9.0-70.5, and 9.1 before 9.1-96.4 allows remote attackers to execute arbitrary code via crafted HTTP header data. Desbordamiento de búfer basado en pila en el control ActiveX NSEPA.NsepaCtrl.1 en nsepa.ocx en Citrix Access Gateway Enterprise Edition v8.1 anterior a v8.1-67.7, v9.0 anterior a v9.0-70.5, y v9.1 anterior a v9.1-96.4 permite a atacantes remotos ejecutar código arbitrario a través de cabeceras HTTP manipuladas. • https://www.exploit-db.com/exploits/17762 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=929 http://securityreason.com/securityalert/8358 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 0%CPEs: 3EXPL: 0

The NSEPA.NsepaCtrl.1 ActiveX control in nsepa.ocx in Citrix Access Gateway Enterprise Edition 8.1 before 8.1-67.7, 9.0 before 9.0-70.5, and 9.1 before 9.1-96.4 attempts to validate signed DLLs by checking the certificate subject, not the signature, which allows man-in-the-middle attackers to execute arbitrary code via HTTP header data referencing a DLL that was signed with a crafted certificate. El control activeX NSEPA.NsepaCtrl.1 en nsepa.ocx de Citrix Access Gateway Enterprise Edition v8.1 antes de v8.1-67.7, v9.0 antes de v9.0-70.5 y v9.1 antes de v9.1-96.4 intenta validar archivos DLL firmados mediante el control del asunto del certificado en lugar de la firma, que permite a los atancante de hombre en el medio ejecutar código arbitrario a través de datos de cabecera HTTP que referencian a una DLL firmada por un certificado manipulado. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=928 • CWE-20: Improper Input Validation •

CVSS: 9.3EPSS: 11%CPEs: 18EXPL: 3

The web authentication form in the NT4 authentication component in Citrix Access Gateway Enterprise Edition 9.2-49.8 and earlier, and the NTLM authentication component in Access Gateway Standard and Advanced Editions before Access Gateway 5.0, allows attackers to execute arbitrary commands via shell metacharacters in the password field. Vulnerabilidad no especificada en el componente de autenticación NT4 en Citrix Access Gateway Enterprise Edition v9.2-49.8 y anteriores, y el componente de autenticación NTLM en "Access Gateway Standard Edition" y "Access Gateway Advanced Edition" antes de su versión v5.0, permite a atacantes eludir la autenticación y, posiblemente, ejecutar código arbitrario a través de vectores desconocidos. Citrix Access Gateway Command Injection Enterprise Edition up to 9.2-49.8 and Standard and Advanced Editions prior to 5.0 suffer from a remote command injection vulnerability. • https://www.exploit-db.com/exploits/16916 https://www.exploit-db.com/exploits/15806 http://securityreason.com/securityalert/8119 http://support.citrix.com/article/CTX127613 http://www.exploit-db.com/exploits/16916 http://www.osvdb.org/70099 http://www.securitytracker.com/id?1024893 http://www.vsecurity.com/resources/advisory/20101221-1 •