Page 66 of 414 results (0.016 seconds)

CVSS: 10.0EPSS: 1%CPEs: 2EXPL: 0

Citrix Cloud.com CloudStack, and Apache CloudStack pre-release, allows remote attackers to make arbitrary API calls by leveraging the system user account, as demonstrated by API calls to delete VMs. Citrix Cloud.com CloudStack, y Apache CloudStack pre-release, permite a atacantes remotos a realizar llamadas a la API aprovechando la cuenta system, como se demostró mediante llamadas a la API para eliminar VMs. • http://archives.neohapsis.com/archives/bugtraq/2012-10/0062.html http://cloudstack.org/blog/185-cloudstack-configuration-vulnerability-discovered.html http://markmail.org/thread/yfuxgymdqwg3kcg4 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 4.7EPSS: 0%CPEs: 4EXPL: 0

XENMEM_populate_physmap in Xen 4.0, 4.1, and 4.2, and Citrix XenServer 6.0.2 and earlier, when translating paging mode is not used, allows local PV OS guest kernels to cause a denial of service (BUG triggered and host crash) via invalid flags such as MEMF_populate_on_demand. XENMEM_populate_physmap en Xen v4.0, v4.1, y v4.2, y Citrix XenServer v6.0.2 y anteriores, cuando el modo de traducción de página no se utiliza, permite a los kernels locales PV del SO invitado causar una denegación de servicio (caída del host) a través flags inválidos como MEMF_populate_on_demand. • http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html http://lists.opensuse.org/opensuse-security-announce/2012-11 • CWE-16: Configuration •

CVSS: 2.1EPSS: 0%CPEs: 8EXPL: 0

The set_debugreg hypercall in include/asm-x86/debugreg.h in Xen 4.0, 4.1, and 4.2, and Citrix XenServer 6.0.2 and earlier, when running on x86-64 systems, allows local OS guest users to cause a denial of service (host crash) by writing to the reserved bits of the DR7 debug control register. La hiperllamada et_debugreg en include/asm-x86/debugreg.h en Xen v4.0, v4.1, y v4.2, y Citrix XenServer v6.0.2 y anteriores, cuando se ejecuta sobre systemas x86-64, permite a usuarios locales del SO invitado generar una denegación de servicio (caída del host) mediante la escritura de ciertos bits reservados para el registro de control DR • http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html http://lists.opensuse.org/opensuse-security-announce/2012-09 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 9.3EPSS: 34%CPEs: 5EXPL: 0

Heap-based buffer overflow in the StartEpa method in the nsepacom ActiveX control (nsepa.exe) in Citrix Access Gateway Enterprise Edition Plug-in for Windows 9.x before 9.3-57.5 and 10.0 before 10.0-69.4 allows remote attackers to execute arbitrary code via a long CSEC HTTP response header. Desbordamiento de buffer basado en memoria dinámica en el método StartEpa en el control nsepacom ActiveX (nsepa.exe) en Citrix Access Gateway Enterprise Edition Plug-in para Windows 9.x anterior a 9.3-57.5 y 10.0 anterior a 10.0-69.4 permite a atacantes remotos ejecutar código arbitrario a través de una cabecera larga de respuesta CSEC HTTP. • http://archives.neohapsis.com/archives/bugtraq/2012-08/0009.html http://osvdb.org/show/osvdb/84433 http://secunia.com/secunia_research/2012-27 http://support.citrix.com/article/CTX134303 https://exchange.xforce.ibmcloud.com/vulnerabilities/77316 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 6.8EPSS: 5%CPEs: 2EXPL: 0

Integer overflow in the StartEpa method in the nsepacom ActiveX control (nsepa.exe) in Citrix Access Gateway Enterprise Edition Plug-in for Windows 9.x before 9.3-57.5 and 10.0 before 10.0-69.4 allows remote attackers to execute arbitrary code via a crafted Content-Length HTTP header, which triggers a heap-based buffer overflow. Desbordamiento de enteros en el método StartEpa en el control nsepacom ActiveX (nsepa.exe) en Citrix Access Gateway Enterprise Edition Plug-in para Windows 9.x anterior a 9.3-57.5 y 10.0 anterior a 10.0-69.4 permite a atacantes remotos ejecutar código arbitrario a través de una cabecera Content-Length HTTP manipulada, lo que provoca un desbordamiento de buffer basado en memoria dinámica. • http://secunia.com/advisories/45299 http://secunia.com/secunia_research/2012-26 http://support.citrix.com/article/CTX134303 https://exchange.xforce.ibmcloud.com/vulnerabilities/77317 • CWE-189: Numeric Errors •