exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 1 of 1 RSS Feed


iDEFENSE Security Advisory 2010-08-03.1
Posted Aug 6, 2010
Authored by iDefense Labs, Sean Larsson | Site idefense.com

iDefense Security Advisory 08.03.10 - Remote exploitation of a memory corruption vulnerability in Citrix Systems Inc.'s ICA Client could allow an attacker to execute arbitrary code with the privileges of the current user.

tags | advisory, remote, arbitrary
SHA-256 | 1768da12e479e45cc6ea17de1dba0a71ac403df7fd964f6721d635fd9bdc64ca
Page 1 of 1

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By