var-201708-0343
Vulnerability from variot
The TLS and DTLS processing functionality in Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway devices with firmware 9.x before 9.3 Build 68.5, 10.0 through Build 78.6, 10.1 before Build 130.13, 10.1.e before Build 130.1302.e, 10.5 before Build 55.8, and 10.5.e before Build 55.8007.e makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, a variant of CVE-2014-3566 (aka POODLE). Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway The device firmware contains an information disclosure vulnerability. This vulnerability CVE-2014-3566 ( alias POODLE) Is a different vulnerability.Information may be obtained. An attacker can exploit this issue to perform man-in-the-middle attacks and obtain sensitive information. Successful exploits will lead to other attacks. Citrix NetScaler Gateway (formerly Citrix Access Gateway Enterprise Edition) is a secure remote access solution. Devices using the following firmware versions are affected: 10.5 to 10.5.54.9, 10.5.e to 10.5 Build 54.9009.e, 10.1 to 10.1 Build 130.10, 10.1.e to 10.1 Build 129.1105.e, 10.0 To 10.0 Build 78.6
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201708-0343", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "netscaler application delivery controller", "scope": "eq", "trust": 1.0, "vendor": "citrix", "version": null }, { "model": "netscaler gateway", "scope": "eq", "trust": 1.0, "vendor": "citrix", "version": null }, { "model": "netscaler application delivery controller", "scope": null, "trust": 0.8, "vendor": "citrix", "version": null }, { "model": "netscaler gateway", "scope": null, "trust": 0.8, "vendor": "citrix", "version": null }, { "model": "netscaler", "scope": "eq", "trust": 0.6, "vendor": "citrix", "version": "10.5" }, { "model": "netscaler", "scope": "eq", "trust": 0.6, "vendor": "citrix", "version": "10.1" }, { "model": "netscaler", "scope": "eq", "trust": 0.6, "vendor": "citrix", "version": "9.2" }, { "model": "netscaler", "scope": "eq", "trust": 0.6, "vendor": "citrix", "version": "10.1e" }, { "model": "netscaler", "scope": "eq", "trust": 0.6, "vendor": "citrix", "version": "9.1" }, { "model": "netscaler", "scope": "eq", "trust": 0.6, "vendor": "citrix", "version": "10.5e" }, { "model": "netscaler", "scope": "eq", "trust": 0.6, "vendor": "citrix", "version": "10.0" }, { "model": "netscaler gateway", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "9.3.66.5" }, { "model": "netscaler gateway", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "9.3-62.4" }, { "model": "netscaler gateway build", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "9.368.3" }, { "model": "netscaler gateway", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "9.0" }, { "model": "netscaler gateway 10.5.e", "scope": null, "trust": 0.3, "vendor": "citrix", "version": null }, { "model": "netscaler gateway", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.5.54.9" }, { "model": "netscaler gateway", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.5.51.10" }, { "model": "netscaler gateway", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.5.50.10" }, { "model": "netscaler gateway build 54.9009.e", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.5" }, { "model": "netscaler gateway", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.5" }, { "model": "netscaler gateway 10.1.e", "scope": null, "trust": 0.3, "vendor": "citrix", "version": null }, { "model": "netscaler gateway", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.1.128.8" }, { "model": "netscaler gateway", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.1.123.9" }, { "model": "netscaler gateway", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.1.122.17" }, { "model": "netscaler gateway", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.1-129.11" }, { "model": "netscaler gateway", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.1-128.8003" }, { "model": "netscaler gateway", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.1-126.12" }, { "model": "netscaler gateway", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.1-120.1316" }, { "model": "netscaler gateway build", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.1130.10" }, { "model": "netscaler gateway build", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.1129.1105." }, { "model": "netscaler gateway", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.1" }, { "model": "netscaler gateway build", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.078.6" }, { "model": "netscaler gateway", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.0" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "9.3-66.5" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "9.3-64.4" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "9.3-62.4" }, { "model": "netscaler application delivery controller build", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "9.368.3" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "9.3" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "9.0" }, { "model": "netscaler application delivery controller 10.5.e", "scope": null, "trust": 0.3, "vendor": "citrix", "version": null }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.5.54.9" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.5.51.10" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.5.50.10" }, { "model": "netscaler application delivery controller build 54.9009.e", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.5" }, { "model": "netscaler application delivery controller build", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.553.9" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.5" }, { "model": "netscaler application delivery controller 10.1.e", "scope": null, "trust": 0.3, "vendor": "citrix", "version": null }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.1.128.8" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.1.122.17" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.1-129.11" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.1-128.8003" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.1-126.12" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.1-120.1316" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.1-118.7" }, { "model": "netscaler application delivery controller build", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.1130.10" }, { "model": "netscaler application delivery controller build", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.1129.1105." }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.1" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.0-77.5" }, { "model": "netscaler application delivery controller build", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.078.6" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.0" }, { "model": "netscaler gateway build", "scope": "ne", "trust": 0.3, "vendor": "citrix", "version": "9.368.5" }, { "model": "netscaler gateway build 55.8007.e", "scope": "ne", "trust": 0.3, "vendor": "citrix", "version": "10.5" }, { "model": "netscaler gateway build", "scope": "ne", "trust": 0.3, "vendor": "citrix", "version": "10.555.8" }, { "model": "netscaler gateway build", "scope": "ne", "trust": 0.3, "vendor": "citrix", "version": "10.1130.1302." }, { "model": "netscaler gateway build", "scope": "ne", "trust": 0.3, "vendor": "citrix", "version": "10.1130.13" }, { "model": "netscaler gateway build", "scope": "ne", "trust": 0.3, "vendor": "citrix", "version": "10.078.7" }, { "model": "netscaler application delivery controller build", "scope": "ne", "trust": 0.3, "vendor": "citrix", "version": "9.368.5" }, { "model": "netscaler application delivery controller build 55.8007.e", "scope": "ne", "trust": 0.3, "vendor": "citrix", "version": "10.5" }, { "model": "netscaler application delivery controller build", "scope": "ne", "trust": 0.3, "vendor": "citrix", "version": "10.555.8" }, { "model": "netscaler application delivery controller build", "scope": "ne", "trust": 0.3, "vendor": "citrix", "version": "10.1130.1302." }, { "model": "netscaler application delivery controller build", "scope": "ne", "trust": 0.3, "vendor": "citrix", "version": "10.1130.13" }, { "model": "netscaler application delivery controller build", "scope": "ne", "trust": 0.3, "vendor": "citrix", "version": "10.078.7" } ], "sources": [ { "db": "BID", "id": "79912" }, { "db": "JVNDB", "id": "JVNDB-2015-007684" }, { "db": "CNNVD", "id": "CNNVD-201601-255" }, { "db": "NVD", "id": "CVE-2015-3642" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:citrix:netscaler_application_delivery_controller_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:citrix:netscaler_gateway_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-007684" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "79912" } ], "trust": 0.3 }, "cve": "CVE-2015-3642", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2015-3642", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-81603", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "id": "CVE-2015-3642", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2015-3642", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2015-3642", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201601-255", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-81603", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-81603" }, { "db": "JVNDB", "id": "JVNDB-2015-007684" }, { "db": "CNNVD", "id": "CNNVD-201601-255" }, { "db": "NVD", "id": "CVE-2015-3642" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The TLS and DTLS processing functionality in Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway devices with firmware 9.x before 9.3 Build 68.5, 10.0 through Build 78.6, 10.1 before Build 130.13, 10.1.e before Build 130.1302.e, 10.5 before Build 55.8, and 10.5.e before Build 55.8007.e makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, a variant of CVE-2014-3566 (aka POODLE). Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway The device firmware contains an information disclosure vulnerability. This vulnerability CVE-2014-3566 ( alias POODLE) Is a different vulnerability.Information may be obtained. \nAn attacker can exploit this issue to perform man-in-the-middle attacks and obtain sensitive information. Successful exploits will lead to other attacks. Citrix NetScaler Gateway (formerly Citrix Access Gateway Enterprise Edition) is a secure remote access solution. Devices using the following firmware versions are affected: 10.5 to 10.5.54.9, 10.5.e to 10.5 Build 54.9009.e, 10.1 to 10.1 Build 130.10, 10.1.e to 10.1 Build 129.1105.e, 10.0 To 10.0 Build 78.6", "sources": [ { "db": "NVD", "id": "CVE-2015-3642" }, { "db": "JVNDB", "id": "JVNDB-2015-007684" }, { "db": "BID", "id": "79912" }, { "db": "VULHUB", "id": "VHN-81603" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-3642", "trust": 2.8 }, { "db": "BID", "id": "79912", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2015-007684", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201601-255", "trust": 0.7 }, { "db": "NSFOCUS", "id": "37282", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-81603", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-81603" }, { "db": "BID", "id": "79912" }, { "db": "JVNDB", "id": "JVNDB-2015-007684" }, { "db": "CNNVD", "id": "CNNVD-201601-255" }, { "db": "NVD", "id": "CVE-2015-3642" } ] }, "id": "VAR-201708-0343", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-81603" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:17:50.273000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CTX200378", "trust": 0.8, "url": "https://support.citrix.com/article/CTX200378" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-007684" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-81603" }, { "db": "JVNDB", "id": "JVNDB-2015-007684" }, { "db": "NVD", "id": "CVE-2015-3642" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "http://support.citrix.com/article/ctx200378" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-3642" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3642" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/79912" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/37282" }, { "trust": 0.3, "url": "http://www.citrix.com" } ], "sources": [ { "db": "VULHUB", "id": "VHN-81603" }, { "db": "BID", "id": "79912" }, { "db": "JVNDB", "id": "JVNDB-2015-007684" }, { "db": "CNNVD", "id": "CNNVD-201601-255" }, { "db": "NVD", "id": "CVE-2015-3642" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-81603" }, { "db": "BID", "id": "79912" }, { "db": "JVNDB", "id": "JVNDB-2015-007684" }, { "db": "CNNVD", "id": "CNNVD-201601-255" }, { "db": "NVD", "id": "CVE-2015-3642" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-08-02T00:00:00", "db": "VULHUB", "id": "VHN-81603" }, { "date": "2015-01-20T00:00:00", "db": "BID", "id": "79912" }, { "date": "2017-09-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-007684" }, { "date": "2015-01-20T00:00:00", "db": "CNNVD", "id": "CNNVD-201601-255" }, { "date": "2017-08-02T19:29:00.477000", "db": "NVD", "id": "CVE-2015-3642" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-08-09T00:00:00", "db": "VULHUB", "id": "VHN-81603" }, { "date": "2016-02-02T20:26:00", "db": "BID", "id": "79912" }, { "date": "2017-09-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-007684" }, { "date": "2017-08-03T00:00:00", "db": "CNNVD", "id": "CNNVD-201601-255" }, { "date": "2024-11-21T02:29:33.240000", "db": "NVD", "id": "CVE-2015-3642" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201601-255" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Citrix NetScaler ADC and NetScaler Gateway Information disclosure vulnerability in device firmware", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-007684" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-201601-255" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.