8 results (0.018 seconds)

CVSS: 7.5EPSS: 0%CPEs: 28EXPL: 0

05 Aug 2021 — A vulnerability has been discovered in Citrix ADC (formerly known as NetScaler ADC) and Citrix Gateway (formerly known as NetScaler Gateway), and Citrix SD-WAN WANOP Edition models 4000-WO, 4100-WO, 5000-WO, and 5100-WO. These vulnerabilities, if exploited, could lead to the limited available disk space on the appliances being fully consumed. Se ha detectado una vulnerabilidad en Citrix ADC (conocido anteriormente como NetScaler ADC) y Citrix Gateway (conocido anteriormente como NetScaler Gateway), y en los... • https://support.citrix.com/article/CTX319135 • CWE-770: Allocation of Resources Without Limits or Throttling •

CVSS: 8.1EPSS: 0%CPEs: 20EXPL: 0

05 Aug 2021 — A session fixation vulnerability exists in Citrix ADC and Citrix Gateway 13.0-82.45 when configured SAML service provider that could allow an attacker to hijack a session. Se presenta una vulnerabilidad de fijación de sesión en Citrix ADC y Citrix Gateway versión 13.0-82.45, cuando es configurado el proveedor de servicios SAML que podría permitir a un atacante secuestrar una sesión • https://support.citrix.com/article/CTX319135 • CWE-384: Session Fixation •

CVSS: 6.5EPSS: 0%CPEs: 24EXPL: 0

16 Jun 2021 — Citrix ADC and Citrix/NetScaler Gateway 13.0 before 13.0-76.29, 12.1-61.18, 11.1-65.20, Citrix ADC 12.1-FIPS before 12.1-55.238, and Citrix SD-WAN WANOP Edition before 11.4.0, 11.3.2, 11.3.1a, 11.2.3a, 11.1.2c, 10.2.9a suffers from uncontrolled resource consumption by way of a network-based denial-of-service from within the same Layer 2 network segment. Note that the attacker must be in the same Layer 2 network segment as the vulnerable appliance. Citrix ADC y Citrix/NetScaler Gateway versiones 13.0 anterio... • https://support.citrix.com/article/CTX297155 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 6.5EPSS: 15%CPEs: 20EXPL: 1

16 Jun 2021 — Citrix ADC and Citrix/NetScaler Gateway before 13.0-82.41, 12.1-62.23, 11.1-65.20 and Citrix ADC 12.1-FIPS before 12.1-55.238 suffer from improper access control allowing SAML authentication hijack through a phishing attack to steal a valid user session. Note that Citrix ADC or Citrix Gateway must be configured as a SAML SP or a SAML IdP for this to be possible. Citrix ADC y Citrix/NetScaler Gateway versiones anteriores a 13.0-82.41, 12.1-62.23, 11.1-65.20 y Citrix ADC 12.1-FIPS versiones anteriores a 12.1-... • https://github.com/stuartcarroll/CitrixADC-CVE-2020-8300 • CWE-284: Improper Access Control •

CVSS: 7.5EPSS: 1%CPEs: 10EXPL: 0

02 Jan 2020 — Hardcoded WSMan credentials in Intelligent Platform Management Interface (IPMI) with firmware for Supermicro X9 generation motherboards before 3.15 (SMT_X9_315) and firmware for Supermicro X8 generation motherboards before SMT X8 312. Credenciales WSMan embebidas en Intelligent Platform Management Interface (IPMI) con firmware para tarjetas madres generación X9 Supermicro versiones anteriores a la versión 3.15 (SMT_X9_315) y firmware para tarjetas madres generación X8 Supermicro versiones anteriores a la ve... • http://support.citrix.com/article/CTX216642 • CWE-522: Insufficiently Protected Credentials •

CVSS: 8.1EPSS: 9%CPEs: 10EXPL: 1

02 Jan 2020 — Intelligent Platform Management Interface (IPMI) with firmware for Supermicro X9 generation motherboards before SMT_X9_317 and firmware for Supermicro X8 generation motherboards before SMT X8 312 contain harcoded private encryption keys for the (1) Lighttpd web server SSL interface and the (2) Dropbear SSH daemon. Intelligent Platform Management Interface (IPMI) con firmware para las tarjetas madres generación X9 Supermicro versiones anteriores a SMT_X9_317 y el firmware para las tarjetas madres generación ... • https://packetstorm.news/files/id/181030 • CWE-798: Use of Hard-coded Credentials •

CVSS: 10.0EPSS: 88%CPEs: 345EXPL: 23

25 Sep 2014 — GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a ... • https://packetstorm.news/files/id/128650 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') CWE-228: Improper Handling of Syntactically Invalid Structure •

CVSS: 10.0EPSS: 94%CPEs: 345EXPL: 135

24 Sep 2014 — GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." N... • https://packetstorm.news/files/id/181111 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') CWE-94: Improper Control of Generation of Code ('Code Injection') •