var-201507-0089
Vulnerability from variot
The Management Interface in Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway 10.1 before 10.1.132.8, 10.5 before Build 56.15, and 10.5.e before Build 56.1505.e allows remote authenticated users to execute arbitrary shell commands via shell metacharacters in the filter parameter to rapi/ipsec_logs. Supplementary information : CWE Vulnerability type by CWE-77: Improper Neutralization of Special Elements used in a Command ( Command injection ) Has been identified. Citrix Access Gateway is a universal SSL VPN device. An attacker may leverage this issue to execute arbitrary shell commands in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions. The following products and versions are affected: Citrix Systems NetScaler ADC and NetScaler Gateway 10.1 prior to 10.1.132.8, 10.5 prior to Build 56.15, and 10.5.e prior to Build 56.1505.e
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201507-0089", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "netscaler application delivery controller", "scope": "eq", "trust": 1.9, "vendor": "citrix", "version": "10.5" }, { "model": "netscaler gateway", "scope": "eq", "trust": 1.6, "vendor": "citrix", "version": "10.1.128" }, { "model": "netscaler gateway", "scope": "eq", "trust": 1.6, "vendor": "citrix", "version": "10.1.126" }, { "model": "netscaler gateway", "scope": "eq", "trust": 1.6, "vendor": "citrix", "version": "10.1.125" }, { "model": "netscaler gateway", "scope": "eq", "trust": 1.6, "vendor": "citrix", "version": "10.1.127" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 1.6, "vendor": "citrix", "version": "10.1.128" }, { "model": "netscaler gateway", "scope": "eq", "trust": 1.6, "vendor": "citrix", "version": "10.1.124" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 1.6, "vendor": "citrix", "version": "10.1.127" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 1.6, "vendor": "citrix", "version": "10.1.126" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 1.6, "vendor": "citrix", "version": "10.1.129" }, { "model": "netscaler gateway", "scope": "eq", "trust": 1.3, "vendor": "citrix", "version": "10.5.51.10" }, { "model": "netscaler gateway", "scope": "eq", "trust": 1.3, "vendor": "citrix", "version": "10.5.50.10" }, { "model": "netscaler gateway", "scope": "eq", "trust": 1.3, "vendor": "citrix", "version": "10.5" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 1.3, "vendor": "citrix", "version": "10.1" }, { "model": "netscaler gateway", "scope": "eq", "trust": 1.0, "vendor": "citrix", "version": "10.5e" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 1.0, "vendor": "citrix", "version": "10.5e" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 1.0, "vendor": "citrix", "version": "10.1.123" }, { "model": "netscaler gateway", "scope": "eq", "trust": 1.0, "vendor": "citrix", "version": "10.1.123" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 1.0, "vendor": "citrix", "version": "10.1.122" }, { "model": "netscaler gateway", "scope": "eq", "trust": 1.0, "vendor": "citrix", "version": "10.1.122" }, { "model": "netscaler gateway", "scope": "eq", "trust": 1.0, "vendor": "citrix", "version": "10.1.129" }, { "model": "netscaler gateway", "scope": "eq", "trust": 1.0, "vendor": "citrix", "version": "10.1.120.1316.e" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 1.0, "vendor": "citrix", "version": "10.1.120.1316.e" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 1.0, "vendor": "citrix", "version": "10.1.124" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 1.0, "vendor": "citrix", "version": "10.1.125" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 1.0, "vendor": "citrix", "version": "10.1.121" }, { "model": "netscaler gateway", "scope": "eq", "trust": 1.0, "vendor": "citrix", "version": "10.1.121" }, { "model": "netscaler application delivery controller", "scope": "lt", "trust": 0.8, "vendor": "citrix", "version": "10.1" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 0.8, "vendor": "citrix", "version": "10.5.e build 56.1505.e" }, { "model": "netscaler gateway", "scope": "lt", "trust": 0.8, "vendor": "citrix", "version": "10.1" }, { "model": "netscaler gateway", "scope": "eq", "trust": 0.8, "vendor": "citrix", "version": "10.1.132.8" }, { "model": "netscaler gateway", "scope": "lt", "trust": 0.8, "vendor": "citrix", "version": "10.5" }, { "model": "netscaler gateway", "scope": "eq", "trust": 0.8, "vendor": "citrix", "version": "10.5 build 56.15" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 0.8, "vendor": "citrix", "version": "10.1.132.8" }, { "model": "netscaler application delivery controller", "scope": null, "trust": 0.8, "vendor": "citrix", "version": null }, { "model": "netscaler gateway", "scope": "lt", "trust": 0.8, "vendor": "citrix", "version": "10.5.e" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 0.8, "vendor": "citrix", "version": "10.5 build 56.15" }, { "model": "netscaler application delivery controller", "scope": "lt", "trust": 0.8, "vendor": "citrix", "version": "10.5.e" }, { "model": "netscaler gateway", "scope": "eq", "trust": 0.8, "vendor": "citrix", "version": "10.5.e build 56.1505.e" }, { "model": "netscaler gateway", "scope": null, "trust": 0.8, "vendor": "citrix", "version": null }, { "model": "netscaler application delivery controller", "scope": "lt", "trust": 0.8, "vendor": "citrix", "version": "10.5" }, { "model": "netscaler adc/netscaler gateway", "scope": null, "trust": 0.6, "vendor": "citrix", "version": null }, { "model": "netscaler adc/netscaler gateway build", "scope": "lt", "trust": 0.6, "vendor": "citrix", "version": "10.556.15" }, { "model": "netscaler adc/netscaler gateway \u003c10.5.e build 56.1505.e", "scope": null, "trust": 0.6, "vendor": "citrix", "version": null }, { "model": "netscaler adc/netscaler gateway", "scope": "lt", "trust": 0.6, "vendor": "citrix", "version": "10.1.132.8" }, { "model": "netscaler gateway 10.5.e build", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "54.9009" }, { "model": "netscaler gateway 10.5.e build", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "53-9010" }, { "model": "netscaler gateway", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.5-50.10" }, { "model": "netscaler gateway", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.1.128.8" }, { "model": "netscaler gateway", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.1.123.9" }, { "model": "netscaler gateway", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.1.122.17" }, { "model": "netscaler gateway", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.1-129.11" }, { "model": "netscaler gateway", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.1-128.8003" }, { "model": "netscaler gateway", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.1-126.12" }, { "model": "netscaler gateway", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.1-120.1316" }, { "model": "netscaler gateway", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.1" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.5.51.10" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.5.50.10" }, { "model": "netscaler application delivery controller build", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.555.8" }, { "model": "netscaler application delivery controller build", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.553.9" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.1.128.8" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.1.122.17" }, { "model": "netscaler gateway 10.5.e build", "scope": "ne", "trust": 0.3, "vendor": "citrix", "version": "56.1505" }, { "model": "netscaler gateway build", "scope": "ne", "trust": 0.3, "vendor": "citrix", "version": "10.556.15" }, { "model": "netscaler gateway", "scope": "ne", "trust": 0.3, "vendor": "citrix", "version": "10.1.132.8" }, { "model": "netscaler application delivery controller 10.5.e build", "scope": "ne", "trust": 0.3, "vendor": "citrix", "version": "56.1505" }, { "model": "netscaler application delivery controller build", "scope": "ne", "trust": 0.3, "vendor": "citrix", "version": "10.556.15" }, { "model": "netscaler application delivery controller", "scope": "ne", "trust": 0.3, "vendor": "citrix", "version": "10.1.132.8" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-04434" }, { "db": "CNVD", "id": "CNVD-2015-04578" }, { "db": "BID", "id": "75505" }, { "db": "JVNDB", "id": "JVNDB-2015-003889" }, { "db": "CNNVD", "id": "CNNVD-201507-228" }, { "db": "NVD", "id": "CVE-2015-5080" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:citrix:netscaler_application_delivery_controller_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:citrix:netscaler_gateway_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-003889" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Daniel Jensen of Security Assessment", "sources": [ { "db": "BID", "id": "75505" }, { "db": "CNNVD", "id": "CNNVD-201507-228" } ], "trust": 0.9 }, "cve": "CVE-2015-5080", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "CVE-2015-5080", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2015-04434", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2015-04578", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "VHN-83041", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2015-5080", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2015-5080", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2015-04434", "trust": 0.6, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2015-04578", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201507-228", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-83041", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-04434" }, { "db": "CNVD", "id": "CNVD-2015-04578" }, { "db": "VULHUB", "id": "VHN-83041" }, { "db": "JVNDB", "id": "JVNDB-2015-003889" }, { "db": "CNNVD", "id": "CNNVD-201507-228" }, { "db": "NVD", "id": "CVE-2015-5080" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Management Interface in Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway 10.1 before 10.1.132.8, 10.5 before Build 56.15, and 10.5.e before Build 56.1505.e allows remote authenticated users to execute arbitrary shell commands via shell metacharacters in the filter parameter to rapi/ipsec_logs. Supplementary information : CWE Vulnerability type by CWE-77: Improper Neutralization of Special Elements used in a Command ( Command injection ) Has been identified. Citrix Access Gateway is a universal SSL VPN device. \nAn attacker may leverage this issue to execute arbitrary shell commands in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions. The following products and versions are affected: Citrix Systems NetScaler ADC and NetScaler Gateway 10.1 prior to 10.1.132.8, 10.5 prior to Build 56.15, and 10.5.e prior to Build 56.1505.e", "sources": [ { "db": "NVD", "id": "CVE-2015-5080" }, { "db": "JVNDB", "id": "JVNDB-2015-003889" }, { "db": "CNVD", "id": "CNVD-2015-04434" }, { "db": "CNVD", "id": "CNVD-2015-04578" }, { "db": "BID", "id": "75505" }, { "db": "VULHUB", "id": "VHN-83041" } ], "trust": 3.06 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-5080", "trust": 4.0 }, { "db": "BID", "id": "75505", "trust": 2.0 }, { "db": "SECTRACK", "id": "1032762", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2015-003889", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201507-228", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2015-04434", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2015-04578", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-83041", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-04434" }, { "db": "CNVD", "id": "CNVD-2015-04578" }, { "db": "VULHUB", "id": "VHN-83041" }, { "db": "BID", "id": "75505" }, { "db": "JVNDB", "id": "JVNDB-2015-003889" }, { "db": "CNNVD", "id": "CNNVD-201507-228" }, { "db": "NVD", "id": "CVE-2015-5080" } ] }, "id": "VAR-201507-0089", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2015-04434" }, { "db": "CNVD", "id": "CNVD-2015-04578" }, { "db": "VULHUB", "id": "VHN-83041" } ], "trust": 2.3 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 1.2 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-04434" }, { "db": "CNVD", "id": "CNVD-2015-04578" } ] }, "last_update_date": "2024-11-23T22:59:32.540000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CTX201149", "trust": 0.8, "url": "http://support.citrix.com/article/CTX201149" }, { "title": "Patch for Citrix NetScaler ADC and NetScaler Gateway Remote Arbitrary Command Execution Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/60712" }, { "title": "Patch for Citrix NetScaler ADC and NetScaler Gateway Remote Arbitrary Shell Command Execution Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/60934" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-04434" }, { "db": "CNVD", "id": "CNVD-2015-04578" }, { "db": "JVNDB", "id": "JVNDB-2015-003889" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-77", "trust": 1.1 }, { "problemtype": "CWE-Other", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-83041" }, { "db": "JVNDB", "id": "JVNDB-2015-003889" }, { "db": "NVD", "id": "CVE-2015-5080" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.2, "url": "http://support.citrix.com/article/ctx201149" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/75505" }, { "trust": 1.7, "url": "http://security-assessment.com/files/documents/advisory/citrix-netscaler-final.pdf" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1032762" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-5080" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-5080" }, { "trust": 0.3, "url": "https://www.citrix.com/products/netscaler-application-delivery-controller/overview.html" }, { "trust": 0.3, "url": "https://www.citrix.com/products/netscaler-gateway/overview.html" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-04434" }, { "db": "CNVD", "id": "CNVD-2015-04578" }, { "db": "VULHUB", "id": "VHN-83041" }, { "db": "BID", "id": "75505" }, { "db": "JVNDB", "id": "JVNDB-2015-003889" }, { "db": "CNNVD", "id": "CNNVD-201507-228" }, { "db": "NVD", "id": "CVE-2015-5080" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2015-04434" }, { "db": "CNVD", "id": "CNVD-2015-04578" }, { "db": "VULHUB", "id": "VHN-83041" }, { "db": "BID", "id": "75505" }, { "db": "JVNDB", "id": "JVNDB-2015-003889" }, { "db": "CNNVD", "id": "CNNVD-201507-228" }, { "db": "NVD", "id": "CVE-2015-5080" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-07-13T00:00:00", "db": "CNVD", "id": "CNVD-2015-04434" }, { "date": "2015-07-16T00:00:00", "db": "CNVD", "id": "CNVD-2015-04578" }, { "date": "2015-07-16T00:00:00", "db": "VULHUB", "id": "VHN-83041" }, { "date": "2015-06-30T00:00:00", "db": "BID", "id": "75505" }, { "date": "2015-07-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-003889" }, { "date": "2015-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-201507-228" }, { "date": "2015-07-16T14:59:05.933000", "db": "NVD", "id": "CVE-2015-5080" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-07-13T00:00:00", "db": "CNVD", "id": "CNVD-2015-04434" }, { "date": "2015-07-16T00:00:00", "db": "CNVD", "id": "CNVD-2015-04578" }, { "date": "2016-12-07T00:00:00", "db": "VULHUB", "id": "VHN-83041" }, { "date": "2015-06-30T00:00:00", "db": "BID", "id": "75505" }, { "date": "2015-07-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-003889" }, { "date": "2015-07-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201507-228" }, { "date": "2024-11-21T02:32:17.817000", "db": "NVD", "id": "CVE-2015-5080" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201507-228" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Citrix NetScaler Application Delivery Controller and NetScaler Gateway of Management Interface In any shell Command execution vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-003889" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Input Validation Error", "sources": [ { "db": "BID", "id": "75505" } ], "trust": 0.3 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.