Page 2 of 64 results (0.009 seconds)

CVSS: 8.3EPSS: 0%CPEs: 8EXPL: 0

Reflected Cross-Site Scripting (XSS) • https://support.citrix.com/article/CTX561482/citrix-adc-and-citrix-gateway-security-bulletin-for-cve20233519-cve20233466-cve20233467 • CWE-20: Improper Input Validation CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.8EPSS: 96%CPEs: 8EXPL: 10

Unauthenticated remote code execution Citrix NetScaler ADC and NetScaler Gateway contains a code injection vulnerability that allows for unauthenticated remote code execution. • https://github.com/BishopFox/CVE-2023-3519 https://github.com/mr-r3b00t/CVE-2023-3519 https://github.com/SalehLardhi/CVE-2023-3519 https://github.com/Chocapikk/CVE-2023-3519 https://github.com/Mohammaddvd/CVE-2023-3519 https://github.com/d0rb/CVE-2023-3519 https://github.com/KR0N-SECURITY/CVE-2023-3519 https://github.com/passwa11/CVE-2023-3519 https://github.com/JonaNeidhart/CVE-2023-3519-BackdoorCheck http://packetstormsecurity.com/files/173997/Citrix-ADC-NetScaler-Remote-C • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.5EPSS: 0%CPEs: 28EXPL: 0

A vulnerability has been discovered in Citrix ADC (formerly known as NetScaler ADC) and Citrix Gateway (formerly known as NetScaler Gateway), and Citrix SD-WAN WANOP Edition models 4000-WO, 4100-WO, 5000-WO, and 5100-WO. These vulnerabilities, if exploited, could lead to the limited available disk space on the appliances being fully consumed. Se ha detectado una vulnerabilidad en Citrix ADC (conocido anteriormente como NetScaler ADC) y Citrix Gateway (conocido anteriormente como NetScaler Gateway), y en los modelos 4000-WO, 4100-WO, 5000-WO y 5100-WO de Citrix SD-WAN WANOP Edition. Estas vulnerabilidades, si son explotadas, podrían conllevar a el consumo total del limitado espacio de disco disponible en los dispositivos • https://support.citrix.com/article/CTX319135 • CWE-770: Allocation of Resources Without Limits or Throttling •

CVSS: 8.1EPSS: 0%CPEs: 20EXPL: 0

A session fixation vulnerability exists in Citrix ADC and Citrix Gateway 13.0-82.45 when configured SAML service provider that could allow an attacker to hijack a session. Se presenta una vulnerabilidad de fijación de sesión en Citrix ADC y Citrix Gateway versión 13.0-82.45, cuando es configurado el proveedor de servicios SAML que podría permitir a un atacante secuestrar una sesión • https://support.citrix.com/article/CTX319135 • CWE-384: Session Fixation •

CVSS: 6.5EPSS: 0%CPEs: 24EXPL: 0

Citrix ADC and Citrix/NetScaler Gateway 13.0 before 13.0-76.29, 12.1-61.18, 11.1-65.20, Citrix ADC 12.1-FIPS before 12.1-55.238, and Citrix SD-WAN WANOP Edition before 11.4.0, 11.3.2, 11.3.1a, 11.2.3a, 11.1.2c, 10.2.9a suffers from uncontrolled resource consumption by way of a network-based denial-of-service from within the same Layer 2 network segment. Note that the attacker must be in the same Layer 2 network segment as the vulnerable appliance. Citrix ADC y Citrix/NetScaler Gateway versiones 13.0 anteriores a 13.0-76.29, 12.1-61.18, 11.1-65.20, Citrix ADC versiones 12.1-FIPS anteriores a 12.1-55.238, y Citrix SD-WAN WANOP Edition versiones anteriores a 11.4.0, 11. 3.2, 11.3.1a, 11.2.3a, 11.1.2c, 10.2.9a, sufren un consumo no controlado de recursos mediante una denegación de servicio basada en la red desde el mismo segmento de red de capa 2. Tome en cuenta que el atacante debe estar en el mismo segmento de red de capa 2 que el dispositivo vulnerable • https://support.citrix.com/article/CTX297155 • CWE-400: Uncontrolled Resource Consumption •