Page 3 of 25 results (0.003 seconds)

CVSS: 6.8EPSS: 5%CPEs: 2EXPL: 0

Integer overflow in the StartEpa method in the nsepacom ActiveX control (nsepa.exe) in Citrix Access Gateway Enterprise Edition Plug-in for Windows 9.x before 9.3-57.5 and 10.0 before 10.0-69.4 allows remote attackers to execute arbitrary code via a crafted Content-Length HTTP header, which triggers a heap-based buffer overflow. Desbordamiento de enteros en el método StartEpa en el control nsepacom ActiveX (nsepa.exe) en Citrix Access Gateway Enterprise Edition Plug-in para Windows 9.x anterior a 9.3-57.5 y 10.0 anterior a 10.0-69.4 permite a atacantes remotos ejecutar código arbitrario a través de una cabecera Content-Length HTTP manipulada, lo que provoca un desbordamiento de buffer basado en memoria dinámica. • http://secunia.com/advisories/45299 http://secunia.com/secunia_research/2012-26 http://support.citrix.com/article/CTX134303 https://exchange.xforce.ibmcloud.com/vulnerabilities/77317 • CWE-189: Numeric Errors •

CVSS: 9.3EPSS: 0%CPEs: 3EXPL: 0

The NSEPA.NsepaCtrl.1 ActiveX control in nsepa.ocx in Citrix Access Gateway Enterprise Edition 8.1 before 8.1-67.7, 9.0 before 9.0-70.5, and 9.1 before 9.1-96.4 attempts to validate signed DLLs by checking the certificate subject, not the signature, which allows man-in-the-middle attackers to execute arbitrary code via HTTP header data referencing a DLL that was signed with a crafted certificate. El control activeX NSEPA.NsepaCtrl.1 en nsepa.ocx de Citrix Access Gateway Enterprise Edition v8.1 antes de v8.1-67.7, v9.0 antes de v9.0-70.5 y v9.1 antes de v9.1-96.4 intenta validar archivos DLL firmados mediante el control del asunto del certificado en lugar de la firma, que permite a los atancante de hombre en el medio ejecutar código arbitrario a través de datos de cabecera HTTP que referencian a una DLL firmada por un certificado manipulado. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=928 • CWE-20: Improper Input Validation •

CVSS: 9.3EPSS: 96%CPEs: 3EXPL: 1

Stack-based buffer overflow in the NSEPA.NsepaCtrl.1 ActiveX control in nsepa.ocx in Citrix Access Gateway Enterprise Edition 8.1 before 8.1-67.7, 9.0 before 9.0-70.5, and 9.1 before 9.1-96.4 allows remote attackers to execute arbitrary code via crafted HTTP header data. Desbordamiento de búfer basado en pila en el control ActiveX NSEPA.NsepaCtrl.1 en nsepa.ocx en Citrix Access Gateway Enterprise Edition v8.1 anterior a v8.1-67.7, v9.0 anterior a v9.0-70.5, y v9.1 anterior a v9.1-96.4 permite a atacantes remotos ejecutar código arbitrario a través de cabeceras HTTP manipuladas. • https://www.exploit-db.com/exploits/17762 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=929 http://securityreason.com/securityalert/8358 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 11%CPEs: 18EXPL: 3

The web authentication form in the NT4 authentication component in Citrix Access Gateway Enterprise Edition 9.2-49.8 and earlier, and the NTLM authentication component in Access Gateway Standard and Advanced Editions before Access Gateway 5.0, allows attackers to execute arbitrary commands via shell metacharacters in the password field. Vulnerabilidad no especificada en el componente de autenticación NT4 en Citrix Access Gateway Enterprise Edition v9.2-49.8 y anteriores, y el componente de autenticación NTLM en "Access Gateway Standard Edition" y "Access Gateway Advanced Edition" antes de su versión v5.0, permite a atacantes eludir la autenticación y, posiblemente, ejecutar código arbitrario a través de vectores desconocidos. Citrix Access Gateway Command Injection Enterprise Edition up to 9.2-49.8 and Standard and Advanced Editions prior to 5.0 suffer from a remote command injection vulnerability. • https://www.exploit-db.com/exploits/16916 https://www.exploit-db.com/exploits/15806 http://securityreason.com/securityalert/8119 http://support.citrix.com/article/CTX127613 http://www.exploit-db.com/exploits/16916 http://www.osvdb.org/70099 http://www.securitytracker.com/id?1024893 http://www.vsecurity.com/resources/advisory/20101221-1 •

CVSS: 6.5EPSS: 0%CPEs: 5EXPL: 0

The default configuration of the Security global settings on the Citrix NetScaler Access Gateway appliance with Enterprise Edition firmware 9.0, 8.1, and earlier specifies Allow for the Default Authorization Action option, which might allow remote authenticated users to bypass intended access restrictions. La configuración por defecto en las características de seguridad globales en el appliance Citrix NetScaler Access Gateway con el firmware Enterprise Edition 9.0, 8.1 y versiones anteriores especifica la opción "Allow for the Default Authorization Action" lo que puede permitir a usuarios remotos autenticados evitar las restricciones de acceso previstas. • http://support.citrix.com/article/CTX118770 http://www.securityfocus.com/bid/35422 http://www.vupen.com/english/advisories/2009/1641 https://exchange.xforce.ibmcloud.com/vulnerabilities/51274 • CWE-863: Incorrect Authorization •