Show filters
370 Total Results
Displaying 131-140 of 370
Sort by:
Attacker Value
Unknown
CVE-2019-11634
Disclosure Date: May 22, 2019 (last updated November 27, 2024)
Citrix Workspace App before 1904 for Windows has Incorrect Access Control.
0
Attacker Value
Unknown
CVE-2019-12044
Disclosure Date: May 22, 2019 (last updated November 27, 2024)
A Buffer Overflow exists in Citrix NetScaler Gateway 10.5.x before 10.5.70.x, 11.1.x before 11.1.59.10, 12.0.x before 12.0.59.8, and 12.1.x before 12.1.49.23 and Citrix Application Delivery Controller 10.5.x before 10.5.70.x, 11.1.x before 11.1.59.10, 12.0.x before 12.0.59.8, and 12.1.x before 12.1.49.23.
0
Attacker Value
Unknown
CVE-2019-7217
Disclosure Date: May 13, 2019 (last updated November 27, 2024)
Citrix ShareFile before 19.12 allows User Enumeration. It is possible to enumerate application username based on different server responses using the request to check the otp code. No authentication is required.
0
Attacker Value
Unknown
CVE-2019-7218
Disclosure Date: May 13, 2019 (last updated November 27, 2024)
Citrix ShareFile before 19.23 allows a downgrade from two-factor authentication to one-factor authentication. An attacker with access to the offline victim's otp physical token or virtual app (like google authenticator) is able to bypass the first authentication phase (username/password mechanism) and log-in using username/otp combination only (phase 2 of 2FA).
0
Attacker Value
Unknown
CVE-2019-11550
Disclosure Date: May 08, 2019 (last updated November 27, 2024)
Citrix SD-WAN 10.2.x before 10.2.1 and NetScaler SD-WAN 10.0.x before 10.0.7 have Improper Certificate Validation.
0
Attacker Value
Unknown
CVE-2019-6485
Disclosure Date: February 22, 2019 (last updated November 27, 2024)
Citrix NetScaler Gateway 12.1 before build 50.31, 12.0 before build 60.9, 11.1 before build 60.14, 11.0 before build 72.17, and 10.5 before build 69.5 and Application Delivery Controller (ADC) 12.1 before build 50.31, 12.0 before build 60.9, 11.1 before build 60.14, 11.0 before build 72.17, and 10.5 before build 69.5 allow remote attackers to obtain sensitive plaintext information because of a TLS Padding Oracle Vulnerability when CBC-based cipher suites are enabled.
0
Attacker Value
Unknown
CVE-2018-19962
Disclosure Date: December 08, 2018 (last updated November 08, 2023)
An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because small IOMMU mappings are unsafely combined into larger ones.
0
Attacker Value
Unknown
CVE-2018-19961
Disclosure Date: December 08, 2018 (last updated November 08, 2023)
An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because TLB flushes do not always occur after IOMMU mapping changes.
0
Attacker Value
Unknown
CVE-2018-19965
Disclosure Date: December 08, 2018 (last updated November 08, 2023)
An issue was discovered in Xen through 4.11.x allowing 64-bit PV guest OS users to cause a denial of service (host OS crash) because #GP[0] can occur after a non-canonical address is passed to the TLB flushing code. NOTE: this issue exists because of an incorrect CVE-2017-5754 (aka Meltdown) mitigation.
0
Attacker Value
Unknown
CVE-2018-18013
Disclosure Date: October 24, 2018 (last updated November 08, 2023)
* Xen Mobile through 10.8.0 includes a service listening on port 5001 within its firewall that accepts unauthenticated input. If this service is supplied with raw serialised Java objects, it deserialises them back into Java objects in memory, giving rise to a remote code execution vulnerability. NOTE: the vendor disputes that this is a vulnerability, stating it is "already mitigated by the internal firewall that limits access to configuration services to localhost.
0