Filtered by vendor Citrix
Subscribe
Total
414 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2003-1157 | 1 Citrix | 1 Metaframe | 2024-11-20 | 4.3 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in login.asp in Citrix MetaFrame XP Server 1.0 allows remote attackers to inject arbitrary web script or HTML via the NFuse_Message parameter. | |||||
CVE-2002-2426 | 1 Citrix | 3 Access Essentials, Metaframe Presentation Server, Presentation Server | 2024-11-20 | 4.3 MEDIUM | N/A |
Cross-site request forgery (CSRF) vulnerability in Citrix Presentation Server 4.0 and 4.5, MetaFrame Presentation Server 3.0, and Access Essentials 1.0 through 2.0 allows remote attackers to execute arbitrary published applications, and possibly other programs, as authenticated users via the InitialProgram key in an ICA connection. NOTE: some of these details are obtained from third party information. | |||||
CVE-2002-0504 | 1 Citrix | 1 Nfuse | 2024-11-20 | 7.5 HIGH | N/A |
Cross-site scripting vulnerability in Citrix NFuse 1.6 and earlier does not quote results from the getLastError method, which allows remote attackers to execute script in other clients via the NFuse_Application parameter to (1) launch.jsp or (2) launch.asp. | |||||
CVE-2002-0503 | 1 Citrix | 1 Nfuse | 2024-11-20 | 5.0 MEDIUM | N/A |
Directory traversal vulnerability in boilerplate.asp for Citrix NFuse 1.5 allows remote authenticated users to read arbitrary files via a .. (dot dot) in the NFuse_Template parameter. | |||||
CVE-2002-0502 | 1 Citrix | 1 Nfuse | 2024-11-20 | 5.0 MEDIUM | N/A |
Citrix NFuse 1.6 may allow remote attackers to list applications without authentication by accessing the applist.asp page. | |||||
CVE-2002-0301 | 1 Citrix | 1 Nfuse | 2024-11-20 | 5.0 MEDIUM | N/A |
Citrix NFuse 1.6 allows remote attackers to bypass authentication and obtain sensitive information by directly calling launch.asp with invalid NFUSE_USER and NFUSE_PASSWORD parameters. | |||||
CVE-2001-1192 | 1 Citrix | 1 Ica Client | 2024-11-20 | 7.5 HIGH | N/A |
Citrix Independent Computing Architecture (ICA) Client for Windows 6.1 allows remote malicious web sites to execute arbitrary code via a .ICA file, which is downloaded and automatically executed by the client. | |||||
CVE-2001-0908 | 1 Citrix | 1 Metaframe | 2024-11-20 | 7.5 HIGH | N/A |
CITRIX Metaframe 1.8 logs the Client Address (IP address) that is provided by the client instead of obtaining it from the packet headers, which allows clients to spoof their public IP address, e.g. through Network Address Translation (NAT). | |||||
CVE-2001-0760 | 1 Citrix | 1 Nfuse | 2024-11-20 | 5.0 MEDIUM | N/A |
Citrix Nfuse 1.51 allows remote attackers to obtain the absolute path of the web root via a malformed request to launch.asp that does not provide the session field. | |||||
CVE-2001-0716 | 1 Citrix | 1 Metaframe | 2024-11-20 | 5.0 MEDIUM | N/A |
Citrix MetaFrame 1.8 Server with Service Pack 3, and XP Server Service Pack 1 and earlier, allows remote attackers to cause a denial of service (crash) via a large number of incomplete connections to the server. | |||||
CVE-2000-0244 | 1 Citrix | 2 Metaframe, Winframe | 2024-11-20 | 10.0 HIGH | N/A |
The Citrix ICA (Independent Computing Architecture) protocol uses weak encryption (XOR) for user authentication. | |||||
CVE-2024-7890 | 1 Citrix | 1 Workspace | 2024-10-22 | N/A | 7.3 HIGH |
Local privilege escalation allows a low-privileged user to gain SYSTEM privileges in Citrix Workspace app for Windows | |||||
CVE-2024-7889 | 1 Citrix | 1 Workspace | 2024-10-22 | N/A | 7.3 HIGH |
Local privilege escalation allows a low-privileged user to gain SYSTEM privileges in Citrix Workspace app for Windows | |||||
CVE-2024-42423 | 2 Citrix, Dell | 2 Workspace, Thinos | 2024-09-20 | N/A | 7.1 HIGH |
Citrix Workspace App version 23.9.0.24.4 on Dell ThinOS 2311 contains an Incorrect Authorization vulnerability when Citrix CEB is enabled for WebLogin. A local unauthenticated user with low privileges may potentially exploit this vulnerability to bypass existing controls and perform unauthorized actions leading to information disclosure and tampering. |