var-201803-2076
Vulnerability from variot

Command injection vulnerability in Citrix NetScaler ADC and NetScaler Gateway 11.0 before build 70.16, 11.1 before build 55.13, and 12.0 before build 53.13; and the NetScaler Load Balancing instance distributed with NetScaler SD-WAN/CloudBridge 4000, 4100, 5000 and 5100 WAN Optimization Edition 9.3.0 allows remote attackers to execute a system command or read arbitrary files via an SSH login prompt. plural Citrix The product contains a command injection vulnerability.Information may be obtained. Citrix NetScaler ADC and NetScaler Gateway are prone to an authentication-bypass vulnerability. An attacker can exploit this issue to bypass the authentication mechanism. This may aid in further attacks. The following products are affected: Citrix NetScaler ADC and NetScaler Gateway version 12.0 builds 41.16, 41.22, 41.24, 51.24 and 53.6 Citrix NetScaler ADC and NetScaler Gateway version 11.1 builds 51.21, 51.26, 52.13, 53.11, 54.14, 54.16 and 55.10 Citrix NetScaler ADC and NetScaler Gateway version 11.0 build 70.12. Citrix NetScaler Application Delivery Controller, etc. are all products of Citrix Systems (Citrix Systems). NetScaler ADC is a service and application delivery solution (application delivery controller); NetScaler Gateway is a secure remote access solution. A command injection vulnerability exists in the management interface and NetScaler Load Balancing instances in several Citrix products. The following products are affected: NetScaler ADC 11.0 prior to 70.16, 11.1 prior to 55.13, 12.0 prior to 53.13; NetScaler Gateway 11.0 prior to 70.16, 11.1 prior to 55.13, 12.0 prior to 53.13 (management interface); SD-WAN/CloudBridge 4000 WAN Optimization Edition version 9.3.0; 4100 WAN Optimization Edition version 9.3.0; 5000 WAN Optimization Edition version 9.3.0; 5100 WAN Optimization Edition version 9.3.0 (NetScaler Load Balancing instance)

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201803-2076",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "netscaler gateway",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "citrix",
        "version": "11.1"
      },
      {
        "model": "netscaler sd-wan",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "citrix",
        "version": "9.3.0"
      },
      {
        "model": "netscaler gateway",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "citrix",
        "version": "12.0"
      },
      {
        "model": "netscaler gateway",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "citrix",
        "version": "11.0"
      },
      {
        "model": "netscaler application delivery controller",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "citrix",
        "version": "11.1"
      },
      {
        "model": "netscaler application delivery controller",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "citrix",
        "version": "12.0"
      },
      {
        "model": "netscaler application delivery controller",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "citrix",
        "version": "11.0"
      },
      {
        "model": "netscaler application delivery controller",
        "scope": null,
        "trust": 0.8,
        "vendor": "citrix",
        "version": null
      },
      {
        "model": "netscaler gateway",
        "scope": null,
        "trust": 0.8,
        "vendor": "citrix",
        "version": null
      },
      {
        "model": "netscaler sd-wan",
        "scope": null,
        "trust": 0.8,
        "vendor": "citrix",
        "version": null
      },
      {
        "model": "netscaler gateway build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "12.053.6"
      },
      {
        "model": "netscaler gateway build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "12.051.24"
      },
      {
        "model": "netscaler gateway build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "12.041.24"
      },
      {
        "model": "netscaler gateway build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "12.041.22"
      },
      {
        "model": "netscaler gateway build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "12.041.16"
      },
      {
        "model": "netscaler gateway build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "11.155.10"
      },
      {
        "model": "netscaler gateway build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "11.154.16"
      },
      {
        "model": "netscaler gateway build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "11.154.14"
      },
      {
        "model": "netscaler gateway build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "11.153.11"
      },
      {
        "model": "netscaler gateway build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "11.152.13"
      },
      {
        "model": "netscaler gateway build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "11.151.26"
      },
      {
        "model": "netscaler gateway build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "11.151.21"
      },
      {
        "model": "netscaler gateway build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "11.070.12"
      },
      {
        "model": "netscaler adc build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "12.053.6"
      },
      {
        "model": "netscaler adc build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "12.051.24"
      },
      {
        "model": "netscaler adc build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "12.041.24"
      },
      {
        "model": "netscaler adc build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "12.041.22"
      },
      {
        "model": "netscaler adc build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "12.041.16"
      },
      {
        "model": "netscaler adc build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "11.155.10"
      },
      {
        "model": "netscaler adc build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "11.154.16"
      },
      {
        "model": "netscaler adc build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "11.154.14"
      },
      {
        "model": "netscaler adc build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "11.153.11"
      },
      {
        "model": "netscaler adc build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "11.152.13"
      },
      {
        "model": "netscaler adc build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "11.151.26"
      },
      {
        "model": "netscaler adc build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "11.151.21"
      },
      {
        "model": "netscaler adc build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "11.070.12"
      },
      {
        "model": "netscaler gateway build",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "12.053.13"
      },
      {
        "model": "netscaler gateway build",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "11.155.13"
      },
      {
        "model": "netscaler gateway build",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "11.070.16"
      },
      {
        "model": "netscaler adc build",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "12.053.13"
      },
      {
        "model": "netscaler adc build",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "11.155.13"
      },
      {
        "model": "netscaler adc build",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "11.070.16"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "103186"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002511"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-031"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-5314"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:citrix:netscaler_application_delivery_controller",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:citrix:netscaler_access_gateway",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:citrix:netscaler_sd-wan",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002511"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "xcuter, blankcon, nullbr4in, loupos, koredge of NAVER BUSINESS PLATFORM.",
    "sources": [
      {
        "db": "BID",
        "id": "103186"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2018-5314",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2018-5314",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-135345",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2018-5314",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2018-5314",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2018-5314",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201803-031",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-135345",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-135345"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002511"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-031"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-5314"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Command injection vulnerability in Citrix NetScaler ADC and NetScaler Gateway 11.0 before build 70.16, 11.1 before build 55.13, and 12.0 before build 53.13; and the NetScaler Load Balancing instance distributed with NetScaler SD-WAN/CloudBridge 4000, 4100, 5000 and 5100 WAN Optimization Edition 9.3.0 allows remote attackers to execute a system command or read arbitrary files via an SSH login prompt. plural Citrix The product contains a command injection vulnerability.Information may be obtained. Citrix NetScaler ADC and NetScaler Gateway are prone to an authentication-bypass vulnerability. \nAn attacker can exploit this issue to bypass the authentication mechanism. This may aid in further attacks. \nThe following products are affected:\nCitrix NetScaler ADC and NetScaler Gateway version 12.0 builds 41.16, 41.22, 41.24, 51.24 and 53.6\nCitrix NetScaler ADC and NetScaler Gateway version 11.1 builds 51.21, 51.26, 52.13, 53.11, 54.14, 54.16 and 55.10\nCitrix NetScaler ADC and NetScaler Gateway version 11.0 build 70.12. Citrix NetScaler Application Delivery Controller, etc. are all products of Citrix Systems (Citrix Systems). NetScaler ADC is a service and application delivery solution (application delivery controller); NetScaler Gateway is a secure remote access solution. A command injection vulnerability exists in the management interface and NetScaler Load Balancing instances in several Citrix products. The following products are affected: NetScaler ADC 11.0 prior to 70.16, 11.1 prior to 55.13, 12.0 prior to 53.13; NetScaler Gateway 11.0 prior to 70.16, 11.1 prior to 55.13, 12.0 prior to 53.13 (management interface); SD-WAN/CloudBridge 4000 WAN Optimization Edition version 9.3.0; 4100 WAN Optimization Edition version 9.3.0; 5000 WAN Optimization Edition version 9.3.0; 5100 WAN Optimization Edition version 9.3.0 (NetScaler Load Balancing instance)",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-5314"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002511"
      },
      {
        "db": "BID",
        "id": "103186"
      },
      {
        "db": "VULHUB",
        "id": "VHN-135345"
      }
    ],
    "trust": 1.98
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2018-5314",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "103186",
        "trust": 2.0
      },
      {
        "db": "SECTRACK",
        "id": "1040439",
        "trust": 1.7
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002511",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-031",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-135345",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-135345"
      },
      {
        "db": "BID",
        "id": "103186"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002511"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-031"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-5314"
      }
    ]
  },
  "id": "VAR-201803-2076",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-135345"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-11-23T22:17:36.870000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "CTX232199",
        "trust": 0.8,
        "url": "https://support.citrix.com/article/CTX232199"
      },
      {
        "title": "Multiple Citrix Product Command Injection Vulnerability Fixes",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=78826"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002511"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-031"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-287",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-77",
        "trust": 0.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-135345"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002511"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-5314"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.0,
        "url": "https://support.citrix.com/article/ctx232199"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/103186"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id/1040439"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-5314"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-5314"
      },
      {
        "trust": 0.3,
        "url": "http://www.citrix.com/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-135345"
      },
      {
        "db": "BID",
        "id": "103186"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002511"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-031"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-5314"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-135345"
      },
      {
        "db": "BID",
        "id": "103186"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002511"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-031"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-5314"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-03-01T00:00:00",
        "db": "VULHUB",
        "id": "VHN-135345"
      },
      {
        "date": "2018-02-28T00:00:00",
        "db": "BID",
        "id": "103186"
      },
      {
        "date": "2018-04-16T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-002511"
      },
      {
        "date": "2018-03-02T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201803-031"
      },
      {
        "date": "2018-03-01T17:29:00.477000",
        "db": "NVD",
        "id": "CVE-2018-5314"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-10-03T00:00:00",
        "db": "VULHUB",
        "id": "VHN-135345"
      },
      {
        "date": "2018-02-28T00:00:00",
        "db": "BID",
        "id": "103186"
      },
      {
        "date": "2018-04-16T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-002511"
      },
      {
        "date": "2019-10-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201803-031"
      },
      {
        "date": "2024-11-21T04:08:34.450000",
        "db": "NVD",
        "id": "CVE-2018-5314"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-031"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Citrix Command injection vulnerability in the product",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002511"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "authorization issue",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-031"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.