3 results (0.004 seconds)

CVSS: 1.9EPSS: 0%CPEs: 2EXPL: 0

Citrix Presentation Server Client for Windows before 10.200 does not clear "credential information" from process memory in unspecified circumstances, which might allow local users to gain privileges. Citrix Presentation Server Client para Windows versiones anteiores a v10.200 no limpia "información confidencial" de procesos de memoria en circunstancias sin especificar, lo cual permite a usuarios locales conseguir privilegios. • http://support.citrix.com/article/CTX116227 http://www.securitytracker.com/id?1019605 http://www.vupen.com/english/advisories/2008/0845 https://exchange.xforce.ibmcloud.com/vulnerabilities/41102 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 9.3EPSS: 1%CPEs: 1EXPL: 0

Unspecified vulnerability in Citrix Presentation Server Client for Windows before 10.0 allows remote web sites to execute arbitrary code via unspecified vectors, related to the implementation of ICA connectivity through proxy servers. Vulnerabilidad no especificada en Citrix Presentation Server Client para Windows anterior a 10.0 permiet a sitios web remotos ejecutar código de su elección a través de vectores no especificados, relacionado con la implementación de conectividad ICA a través de servidores proxy. • http://osvdb.org/33833 http://secunia.com/advisories/24350 http://support.citrix.com/article/CTX112589 http://www.kb.cert.org/vuls/id/798364 http://www.securityfocus.com/bid/22762 http://www.securitytracker.com/id?1017712 http://www.vupen.com/english/advisories/2007/0784 https://exchange.xforce.ibmcloud.com/vulnerabilities/32754 •

CVSS: 6.8EPSS: 12%CPEs: 1EXPL: 3

Heap-based buffer overflow in the SendChannelData function in wfica.ocx in Citrix Presentation Server Client before 9.230 for Windows allows remote malicious web sites to execute arbitrary code via a DataSize parameter that is less than the length of the Data buffer. Desbordamiento de búfer basado en montón en la función SendChannelData en wfica.ocx de Citrix Presentation Server Client versiones anteriores a 9.230 para Windows permite a sitios web remotos maliciosos ejecutar código de su elección mediante un parámetro DataSize que es menor que la longitud del búfer Data. • https://www.exploit-db.com/exploits/5106 http://fortconsult.net/files/fortconsult.dk/citrix_advisory_dec2006.pdf http://secunia.com/advisories/23246 http://securityreason.com/securityalert/1995 http://securitytracker.com/id?1017343 http://support.citrix.com/article/CTX111827 http://www.citrix.com/English/SS/downloads/downloads.asp?dID=2755 http://www.kb.cert.org/vuls/id/210969 http://www.securityfocus.com/archive/1/453760/100/0/threaded http://www.securityfocus.com/bid/21458 h •