Show filters
370 Total Results
Displaying 11-20 of 370
Sort by:
Attacker Value
Very High

CVE-2014-6271

Disclosure Date: September 24, 2014 (last updated July 25, 2024)
GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.
Attacker Value
Low

CVE-2024-8069

Disclosure Date: November 12, 2024 (last updated November 13, 2024)
Limited remote code execution with privilege of a NetworkService Account access in Citrix Session Recording if the attacker is an authenticated user on the same intranet as the session recording server
1
Attacker Value
Very High

CVE-2022-27518

Disclosure Date: December 13, 2022 (last updated October 18, 2023)
Unauthenticated remote arbitrary code execution
Attacker Value
Unknown

CVE-2023-24483

Disclosure Date: February 15, 2023 (last updated October 08, 2023)
A vulnerability has been identified that, if exploited, could result in a local user elevating their privilege level to NT AUTHORITY\SYSTEM on a Citrix Virtual Apps and Desktops Windows VDA.
Attacker Value
Unknown

CVE-2021-22928

Disclosure Date: August 05, 2021 (last updated February 23, 2025)
A vulnerability has been identified in Citrix Virtual Apps and Desktops that could, if exploited, allow a user of a Windows VDA that has either Citrix Profile Management or Citrix Profile Management WMI Plugin installed to escalate their privilege level on that Windows VDA to SYSTEM.
Attacker Value
Unknown

CVE-2020-8300

Disclosure Date: June 16, 2021 (last updated February 22, 2025)
Citrix ADC and Citrix/NetScaler Gateway before 13.0-82.41, 12.1-62.23, 11.1-65.20 and Citrix ADC 12.1-FIPS before 12.1-55.238 suffer from improper access control allowing SAML authentication hijack through a phishing attack to steal a valid user session. Note that Citrix ADC or Citrix Gateway must be configured as a SAML SP or a SAML IdP for this to be possible.
Attacker Value
Unknown

CVE-2020-8273

Disclosure Date: November 16, 2020 (last updated February 22, 2025)
Privilege escalation of an authenticated user to root in Citrix SD-WAN center versions before 11.2.2, 11.1.2b and 10.2.8.
Attacker Value
Unknown

CVE-2025-1223

Disclosure Date: February 20, 2025 (last updated February 20, 2025)
An attacker can gain application privileges in order to perform limited modification and/or read arbitrary data in Citrix Secure Access Client for Mac
0
Attacker Value
Unknown

CVE-2025-1222

Disclosure Date: February 20, 2025 (last updated February 20, 2025)
An attacker can gain application privileges in order to perform limited modification and/or read arbitrary data in Citrix Secure Access Client for Mac
0
Attacker Value
Unknown

CVE-2024-8068

Disclosure Date: November 12, 2024 (last updated November 13, 2024)
Privilege escalation to NetworkService Account access in Citrix Session Recording when an attacker is an authenticated user in the same Windows Active Directory domain as the session recording server domain
0