3 results (0.015 seconds)

CVSS: 9.3EPSS: 2%CPEs: 5EXPL: 0

Citrix Online Plug-in for Windows for XenApp & XenDesktop before 11.2, Citrix Online Plug-in for Mac for XenApp & XenDesktop before 11.0, Citrix ICA Client for Linux before 11.100, Citrix ICA Client for Solaris before 8.63, and Citrix Receiver for Windows Mobile before 11.5 allow remote attackers to execute arbitrary code via (1) a crafted HTML document, (2) a crafted .ICA file, or (3) a crafted type field in an ICA graphics packet, related to a "heap offset overflow" issue. Citrix Online Plug-in para Windows para XenApp & XenDesktop anterior v11.2, Citrix Online Plug-in para Mac para XenApp & XenDesktop anterior v11.0, Citrix ICA Client para Linux anterior v11.100, Citrix ICA Client para Solaris anterior v8.63, y Citrix Receiver para Windows Mobile before v11.5 permite a atacantes remotos ejecutar código de su elección a través de (1) un documento HTML manipulado, (2) un fichero .ICA manipulado, o (3) un tipo de campo manipulado, en un paquete gráfico ICA, relacionado con el tema de "desbordamiento de pila offset". • http://archives.neohapsis.com/archives/fulldisclosure/2010-08/0040.html http://secunia.com/advisories/40808 http://support.citrix.com/article/CTX125975 http://www.securityfocus.com/archive/1/512861/100/0/threaded • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 23%CPEs: 1EXPL: 0

Heap-based buffer overflow in Citrix Program Neighborhood client 9.0 and earlier allows remote attackers to execute arbitrary code via a long name value in an Application Set response. • http://secunia.com/advisories/18068 http://securityreason.com/securityalert/266 http://securitytracker.com/id?1015373 http://support.citrix.com/kb/entry.jspa?externalID=CTX108354 http://www.idefense.com/application/poi/display?id=357&type=vulnerabilities http://www.osvdb.org/21816 http://www.securityfocus.com/bid/15907 http://www.vupen.com/english/advisories/2005/2944 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Citrix Independent Computing Architecture (ICA) Client for Windows 6.1 allows remote malicious web sites to execute arbitrary code via a .ICA file, which is downloaded and automatically executed by the client. El cliente Citrix Independent Computing Architecture (ICA) para Windows 6.1 permite a sitios web remotos con intenciones maliciosas, la ejecución de código arbitrario mediante un fichero .ICA, que es descargado y automáticamente ejecutado por el cliente. • http://www.securityfocus.com/archive/1/245342 http://www.securityfocus.com/cgi-bin/vulns-item.pl?section=info&id=3688 https://exchange.xforce.ibmcloud.com/vulnerabilities/7697 •