Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
citrix metaframe 1.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2006-5861
The Independent Management Architecture (IMA) service (ImaSrv.exe) in Citrix MetaFrame XP 1.0 and 2.0, and Presentation Server 3.0 and 4.0, allows remote malicious users to cause a denial of service (service exit) via a crafted packet that causes the service to access an unmapped...
Citrix Metaframe Presentation Server 4.0
Citrix Metaframe 2.0
Citrix Metaframe Presentation Server 3.0
Citrix Metaframe 1.0
NA
CVE-2006-5821
Heap-based buffer overflow in the IMA_SECURE_DecryptData1 function in ImaSystem.dll for Citrix MetaFrame XP 1.0 and 2.0, and Presentation Server 3.0 and 4.0, allows remote malicious users to execute arbitrary code via requests to the Independent Management Architecture (IMA) serv...
Citrix Metaframe Presentation Server 4.0
Citrix Metaframe 1.0
Citrix Metaframe 3.0
NA
CVE-2007-0444
Stack-based buffer overflow in the print provider library (cpprov.dll) in Citrix Presentation Server 4.0, MetaFrame Presentation Server 3.0, and MetaFrame XP 1.0 allows local users and remote malicious users to execute arbitrary code via long arguments to the (1) EnumPrintersW an...
Citrix Metaframe Presentation Server 4.0
Citrix Metaframe Presentation Server 3.0
Citrix Metaframe 1.0
1 EDB exploit
NA
CVE-2000-0244
The Citrix ICA (Independent Computing Architecture) protocol uses weak encryption (XOR) for user authentication.
Citrix Metaframe 1.0
Citrix Metaframe
Citrix Winframe 3.5 1.8 For Windows Nt
1 EDB exploit
NA
CVE-2007-2850
The Session Reliability Service (XTE) in Citrix MetaFrame Presentation Server 3.0, Presentation Server 4.0, and Access Essentials 1.0 and 1.5, allows remote malicious users to bypass network security policies and connect to arbitrary TCP ports via a modified address:port string.
Citrix Access Essentials 1.0
Citrix Metaframe 4.0
Citrix Metaframe 3.0
Citrix Access Essentials 1.5
NA
CVE-2005-3971
Cross-site scripting (XSS) vulnerability in the login form in Citrix MetaFrame Secure Access Manager 2.0 up to and including 2.2 and NFuse Elite 1.0 allows remote malicious users to inject arbitrary web script or HTML via the username field.
Citrix Metaframe Secure Access Manager 2.0
Citrix Metaframe Secure Access Manager 2.2
Citrix Metaframe Secure Access Manager 2.1
Citrix Nfuse 1.0
NA
CVE-2003-1157
Cross-site scripting (XSS) vulnerability in login.asp in Citrix MetaFrame XP Server 1.0 allows remote malicious users to inject arbitrary web script or HTML via the NFuse_Message parameter.
Citrix Metaframe 1.0
1 EDB exploit
NA
CVE-2006-3779
Citrix MetaFrame up to XP 1.0 Feature 1, except when running on Windows Server 2003, installs a registry key with an insecure ACL, which allows remote authenticated users to gain privileges.
Citrix Metaframe 1.8
Citrix Presentation Server 4.0
Citrix Metaframe Presentation Server 3.0
NA
CVE-2008-0356
Buffer overflow in the Independent Management Architecture (IMA) service in Citrix Presentation Server (MetaFrame Presentation Server) 4.5 and previous versions, Access Essentials 2.0 and previous versions, and Desktop Server 1.0 allows remote malicious users to execute arbitrary...
Citrix Metaframe Presentation Server
Citrix Presentation Server
Citrix Desktop Server 1.0
Citrix Access Essentials
NA
CVE-2008-2300
Unspecified vulnerability in Citrix Presentation Server 4.5 and previous versions, Citrix Access Essentials 2.0 and previous versions, and Citrix Desktop Server 1.0 allows remote authenticated users to access unauthorized desktops via unknown attack vectors.
Citrix Metaframe Presentation Server 4.0
Citrix Access Essentials 1.0
Citrix Desktop Server 1.0
Citrix Citrix Presentation Server
Citrix Access Essentials 1.5
Citrix Access Essentials
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37316
firmware
CVE-2024-30078
CVE-2024-5995
remote code execution
logic flaw
CVE-2024-20693
CVE-2024-37315
CVE-2024-5464
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »