Page 64 of 414 results (0.006 seconds)

CVSS: 5.0EPSS: 0%CPEs: 8EXPL: 0

Apache CloudStack 4.0.0 before 4.0.2 and Citrix CloudPlatform (formerly Citrix CloudStack) 3.0.x before 3.0.6 Patch C allows remote attackers to bypass the console proxy authentication by leveraging knowledge of the source code. Apache CloudStack 4.0.0 anterior a 4.0.2 y Citrix CloudPlatform (anteriormente Citrix CloudStack) 3.0.x anterior a 3.0.6 Patch C permite a atacantes remotos evadir la autenticación de proxy de consola mediante el conocimiento del código fuente. • http://mail-archives.apache.org/mod_mbox/cloudstack-dev/201304.mbox/%3C51786984.1060300%40stratosec.co%3E http://osvdb.org/92748 http://secunia.com/advisories/53175 http://secunia.com/advisories/53204 http://support.citrix.com/article/CTX135815 http://www.securityfocus.com/bid/59463 http://www.securitytracker.com/id/1028473 https://exchange.xforce.ibmcloud.com/vulnerabilities/83781 • CWE-287: Improper Authentication •

CVSS: 5.0EPSS: 0%CPEs: 5EXPL: 0

Unspecified vulnerability in Citrix Access Gateway Standard Edition 5.0.x before 5.0.4.223524 allows remote attackers to access network resources via unknown attack vectors. Vulnerabilidad sin especificar en Citrix Access Gateway Standard Edition v5.0.x anterior a 5.0.4.223524, permite a atacantes remotos acceder a los recursos de red a través de vectores de ataque desconocidos. • http://osvdb.org/90905 http://secunia.com/advisories/52479 http://support.citrix.com/article/CTX136623 http://www.securitytracker.com/id/1028255 https://exchange.xforce.ibmcloud.com/vulnerabilities/82591 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 1.5EPSS: 0%CPEs: 2EXPL: 0

Apache CloudStack 4.0.0-incubating and Citrix CloudPlatform (formerly Citrix CloudStack) before 3.0.6 stores sensitive information in the log4j.conf log file, which allows local users to obtain (1) the SSH private key as recorded by the createSSHKeyPair API, (2) the password of an added host as recorded by the AddHost API, or the password of an added VM as recorded by the (3) DeployVM or (4) ResetPasswordForVM API. CloudStack Apache v4.0.0-incubación y Citrix CloudPlatform (anteriormente Citrix CloudStack ) anterior a v3.0.6 almacena información sensible en el archivo de registro log4j.conf, lo que permite a usuarios locales obtener (1) la clave privada SSH registradas por la API createSSHKeyPair, (2) la contraseña de un host agregado registrada por la API AddHost, o la contraseña de un VM añadido según los registrado por el DeployVM (3) o (4) API ResetPasswordForVM. • http://mail-archives.apache.org/mod_mbox/incubator-cloudstack-users/201301.mbox/%3C1BD2169F-BBFE-4E27-B50F-F17D7D08B565%40stratosec.co%3E http://osvdb.org/89070 http://osvdb.org/89146 http://osvdb.org/89147 http://seclists.org/fulldisclosure/2013/Jan/65 http://secunia.com/advisories/51366 http://secunia.com/advisories/51821 http://secunia.com/advisories/51827 http://support.citrix.com/article/CTX136163 http://www.securityfocus.com/bid/57225 http://www.securityfocus.com/bid/5 • CWE-255: Credentials Management Errors •

CVSS: 9.3EPSS: 4%CPEs: 2EXPL: 0

The XML Service interface in Citrix XenApp 6.5 and 6.5 Feature Pack 1 allows remote attackers to execute arbitrary code via unspecified vectors. La interfaz del servicio XML de Citrix XenApp v6.5 y Feature Pack 1 v6.5 permite a atacantes remotos ejecutar código de su elección a través de vectores no especificados. • http://osvdb.org/88368 http://secunia.com/advisories/51538 http://support.citrix.com/article/CTX135066 http://www.securityfocus.com/bid/56907 http://www.securitytracker.com/id?1027868 https://exchange.xforce.ibmcloud.com/vulnerabilities/80627 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Citrix XenDesktop Virtual Desktop Agent (VDA) 5.6.x before 5.6.200, when making changes to the server-side policy that control USB redirection, does not propagate changes to the VDA, which allows authenticated users to retain access to the USB device. Citrix XenDesktop Virtual Desktop Agent (VDA) v5.6.x antes de v5.6.200, al realizar cambios en la política de control de redirección USB en el lado del servidor, no propaga los cambios a la VDA, lo que permite mantener el acceso al dispositivo USB a los usuarios autenticados. • http://osvdb.org/88369 http://secunia.com/advisories/51524 http://support.citrix.com/article/CTX135813 http://www.securityfocus.com/bid/56908 http://www.securitytracker.com/id?1027869 https://exchange.xforce.ibmcloud.com/vulnerabilities/80626 •