Page 2 of 9 results (0.007 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

Citrix Metaframe Presentation Server 3.0 and 4.0 allows remote attackers to bypass policy restrictions by downloading the launch.ica file and changing the client device name (ClientName). • http://marc.info/?l=bugtraq&m=112811189420696&w=2 http://secunia.com/advisories/17032 http://securityreason.com/securityalert/39 http://securitytracker.com/id?1014994 http://support.citrix.com/kb/entry%21default.jspa?categoryID=275&externalID=CTX107705 http://www.grupoitpro.com.ar/ctxpoliciesbypass.txt http://www.securityfocus.com/bid/14989 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Unknown vulnerability in Citrix MetaFrame Conferencing Manager 3.0 allows conference members to bypass organizer restrictions to control the keyboard and mouse. • http://securitytracker.com/id?1013457 http://support.citrix.com/kb/entry.jspa?externalID=CTX105574 http://www.securityfocus.com/bid/12821 https://exchange.xforce.ibmcloud.com/vulnerabilities/19723 •

CVSS: 4.3EPSS: 0%CPEs: 6EXPL: 0

Cross-site request forgery (CSRF) vulnerability in Citrix Presentation Server 4.0 and 4.5, MetaFrame Presentation Server 3.0, and Access Essentials 1.0 through 2.0 allows remote attackers to execute arbitrary published applications, and possibly other programs, as authenticated users via the InitialProgram key in an ICA connection. NOTE: some of these details are obtained from third party information. • http://packetstormsecurity.org/0210-exploits/hackingcitrix.txt http://secunia.com/advisories/27633 http://support.citrix.com/article/CTX115245 http://www.gnucitizen.org/blog/citrix-owning-the-legitimate-backdoor http://www.securityfocus.com/bid/26451 http://www.securitytracker.com/id?1018962 http://www.vupen.com/english/advisories/2007/3870 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 5.0EPSS: 1%CPEs: 3EXPL: 0

Citrix MetaFrame 1.8 Server with Service Pack 3, and XP Server Service Pack 1 and earlier, allows remote attackers to cause a denial of service (crash) via a large number of incomplete connections to the server. • http://www.securityfocus.com/bid/3440 http://xforce.iss.net/alerts/advise99.php https://exchange.xforce.ibmcloud.com/vulnerabilities/7068 •