CVE-2023-6549

Known exploited
Improper Restriction of Operations within the Bounds of a Memory Buffer in NetScaler ADC and NetScaler Gateway allows Unauthenticated Denial of Service
Max CVSS
8.2
EPSS Score
0.60%
Published
2024-01-17
Updated
2024-01-24
CISA KEV Added
2024-01-17

CVE-2023-6548

Known exploited
Improper Control of Generation of Code ('Code Injection') in NetScaler ADC and NetScaler Gateway allows an attacker with access to NSIP, CLIP or SNIP with management interface to perform Authenticated (low privileged) remote code execution on Management Interface.
Max CVSS
8.8
EPSS Score
1.57%
Published
2024-01-17
Updated
2024-01-25
CISA KEV Added
2024-01-17
Denial of Service in NetScaler ADC and NetScaler Gateway when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA Virtual Server
Max CVSS
8.2
EPSS Score
0.05%
Published
2023-10-27
Updated
2023-11-07
Privilege Escalation to root administrator (nsroot)
Max CVSS
8.0
EPSS Score
0.04%
Published
2023-07-19
Updated
2023-07-28
Reflected Cross-Site Scripting (XSS)
Max CVSS
8.3
EPSS Score
0.05%
Published
2023-07-19
Updated
2023-07-28
Corruption of the system by a remote, unauthenticated user. The impact of this can include the reset of the administrator password at the next device reboot, allowing an attacker with ssh access to connect with the default administrator credentials after the device has rebooted.
Max CVSS
8.1
EPSS Score
0.29%
Published
2022-06-16
Updated
2023-07-18
In Citrix XenMobile Server through 10.12 RP9, there is an Authenticated Directory Traversal vulnerability, leading to remote code execution.
Max CVSS
8.8
EPSS Score
1.10%
Published
2022-04-19
Updated
2022-12-02
A session fixation vulnerability exists in Citrix ADC and Citrix Gateway 13.0-82.45 when configured SAML service provider that could allow an attacker to hijack a session.
Max CVSS
8.1
EPSS Score
0.15%
Published
2021-08-05
Updated
2021-08-16
Citrix ADC and Citrix Gateway 13.0 before 13.0-64.35, Citrix ADC and NetScaler Gateway 12.1 before 12.1-58.15, Citrix ADC 12.1-FIPS before 12.1-55.187, Citrix ADC and NetScaler Gateway 12.0, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.12, Citrix SD-WAN WANOP 11.2 before 11.2.1a, Citrix SD-WAN WANOP 11.1 before 11.1.2a, Citrix SD-WAN WANOP 11.0 before 11.0.3f, Citrix SD-WAN WANOP 10.2 before 10.2.7b are vulnerable to escalation of privileges on the management interface.
Max CVSS
8.8
EPSS Score
0.10%
Published
2020-09-18
Updated
2020-10-07
Improper access control in Citrix Workspace app for Windows 1912 CU1 and 2006.1 causes privilege escalation and code execution when the automatic updater service is running.
Max CVSS
8.8
EPSS Score
0.09%
Published
2020-07-24
Updated
2020-07-29
Privilege escalation vulnerability on Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 allows a low privileged user with management access to execute arbitrary commands.
Max CVSS
8.8
EPSS Score
0.10%
Published
2020-07-10
Updated
2021-07-21
Citrix Application Delivery Management (ADM) 12.1 before build 54.13 has Incorrect Access Control.
Max CVSS
8.8
EPSS Score
0.09%
Published
2019-10-09
Updated
2020-08-24
There is a Hazelcast Library Java Deserialization Vulnerability in Citrix XenMobile Server 10.8 before RP2 and 10.7 before RP3.
Max CVSS
8.1
EPSS Score
0.17%
Published
2018-05-23
Updated
2018-06-25
arch/x86/mm.c in Xen allows local PV guest OS users to gain host OS privileges via vectors related to map_grant_ref.
Max CVSS
8.8
EPSS Score
0.06%
Published
2017-08-24
Updated
2019-10-03
Xen allows local OS guest users to cause a denial of service (crash) or possibly obtain sensitive information or gain privileges via vectors involving transitive grants.
Max CVSS
8.8
EPSS Score
0.06%
Published
2017-08-24
Updated
2020-04-14
The xen_biovec_phys_mergeable function in drivers/xen/biomerge.c in Xen might allow local OS guest users to corrupt block device data streams and consequently obtain sensitive memory information, cause a denial of service, or gain host OS privileges by leveraging incorrect block IO merge-ability calculation.
Max CVSS
8.8
EPSS Score
0.06%
Published
2017-08-24
Updated
2019-10-03
Xen, when running on a 64-bit hypervisor, allows local x86 guest OS users to modify arbitrary memory and consequently obtain sensitive information, cause a denial of service (host crash), or execute arbitrary code on the host by leveraging broken emulation of bit test instructions.
Max CVSS
8.8
EPSS Score
0.07%
Published
2017-01-23
Updated
2017-07-01
Unauthorized redirect vulnerability in Citrix NetScaler ADC before 10.1 135.8, 10.5 61.11, 11.0 65.31/65.35F and 11.1 47.14 allows a remote attacker to steal session cookies of a legitimate AAA user via manipulation of Host header.
Max CVSS
8.8
EPSS Score
0.53%
Published
2016-10-28
Updated
2017-07-29
The PV pagetable code in arch/x86/mm.c in Xen 4.7.x and earlier allows local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries.
Max CVSS
8.8
EPSS Score
0.06%
Published
2016-08-02
Updated
2017-07-01
The VGA module in QEMU improperly performs bounds checking on banked access to video memory, which allows local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the "Dark Portal" issue.
Max CVSS
8.8
EPSS Score
0.15%
Published
2016-05-11
Updated
2021-08-04
Xen 4.6.x, 4.5.x, 4.4.x, 4.3.x, and earlier do not initialize x86 FPU stack and XMM registers when XSAVE/XRSTOR are not used to manage guest extended register state, which allows local guest domains to obtain sensitive information from other domains via unspecified vectors.
Max CVSS
8.6
EPSS Score
0.31%
Published
2016-04-13
Updated
2017-07-01
Multiple SQL injection vulnerabilities in the Administration Web UI servlets in Citrix Command Center before 5.1 Build 36.7 and 5.2 before Build 44.11 allow remote authenticated users to execute arbitrary SQL commands via unspecified vectors.
Max CVSS
8.1
EPSS Score
0.09%
Published
2016-04-14
Updated
2019-02-13

CVE-2013-3619

Public exploit
Intelligent Platform Management Interface (IPMI) with firmware for Supermicro X9 generation motherboards before SMT_X9_317 and firmware for Supermicro X8 generation motherboards before SMT X8 312 contain harcoded private encryption keys for the (1) Lighttpd web server SSL interface and the (2) Dropbear SSH daemon.
Max CVSS
8.1
EPSS Score
1.29%
Published
2020-01-02
Updated
2020-01-15
Multiple cross-site request forgery (CSRF) vulnerabilities in sample code in the XenServer Resource Kit in Citrix XenCenterWeb allow remote attackers to hijack the authentication of administrators for (1) requests that change the password via the username parameter to config/changepw.php or (2) stop a virtual machine via the stop_vmname parameter to hardstopvm.php. NOTE: some of these details are obtained from third party information.
Max CVSS
8.8
EPSS Score
1.13%
Published
2009-10-22
Updated
2024-02-08
24 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!