Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
citrix access gateway vulnerabilities and exploits
(subscribe to this query)
6.6
CVSSv2
CVE-2022-21827
An improper privilege vulnerability has been discovered in Citrix Gateway Plug-in for Windows (Citrix Secure Access for Windows) <21.9.1.2 what could allow an attacker who has gained local access to a computer with Citrix Gateway Plug-in installed, to corrupt or delete files a...
Citrix Gateway Plug-in
6.5
CVSSv2
CVE-2020-8197
Privilege escalation vulnerability on Citrix ADC and Citrix Gateway versions prior to 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 allows a low privileged user with management access to execute arbitrary commands.
Citrix Application Delivery Controller Firmware
Citrix Netscaler Gateway Firmware
Citrix Gateway Firmware
1 Article
6.5
CVSSv2
CVE-2006-6572
Unspecified vulnerability in Citrix Advanced Access Control (AAC) Option 4.0, and Access Gateway 4.2 with Advanced Access Control 4.2, prior to 20061114, when the Browser-Only access feature is enabled, allows remote authenticated users to bypass access policies via a certain log...
Citrix Access Gateway 4.0
Citrix Access Gateway 4.2
6.3
CVSSv2
CVE-2009-2213
The default configuration of the Security global settings on the Citrix NetScaler Access Gateway appliance with Enterprise Edition firmware 9.0, 8.1, and previous versions specifies Allow for the Default Authorization Action option, which might allow remote authenticated users to...
Citrix Netscaler Access Gateway Firmware
Citrix Netscaler Access Gateway Firmware 7.0
Citrix Netscaler Access Gateway Firmware 8.0
Citrix Netscaler Access Gateway Firmware 9.0
Citrix Netscaler Access Gateway -
6
CVSSv2
CVE-2006-6573
Unspecified vulnerability in Citrix Access Gateway 4.5 Advanced Edition, and 4.2 with Advanced Access Control (AAC) 4.2, when deployed on the Access Gateway appliance 4.2 up to and including 4.2.2 allows remote authenticated users to "gain access to data" and obtain sen...
Citrix Access Gateway 4.2
Citrix Access Gateway 4.5
Citrix Access Gateway 4.2.1
Citrix Access Gateway 4.2.2
5.8
CVSSv2
CVE-2019-0140
Buffer overflow in firmware for Intel(R) Ethernet 700 Series Controllers before version 7.0 may allow an unauthenticated user to potentially enable an escalation of privilege via an adjacent access.
Intel Ethernet Controller X710-tm4 Firmware
Intel Ethernet Controller X710-at2 Firmware
Intel Ethernet Controller Xxv710-am2 Firmware
Intel Ethernet Controller Xxv710-am1 Firmware
Intel Ethernet Controller X710-bm2 Firmware
Intel Ethernet Controller 710-bm1 Firmware
Intel Ethernet 700 Series Software
5.4
CVSSv2
CVE-2013-2767
Unspecified vulnerability in Citrix NetScaler Access Gateway Enterprise Edition (AGEE) prior to 9.3.62.4 and 10.x up to and including 10.0.74.4, and NetScaler AGEE Common Criteria build prior to 9.3.53.6, allows remote malicious users to bypass intended intranet access restrictio...
Citrix Netscaler Access Gateway Firmware 10.0
Citrix Netscaler Access Gateway Firmware 10.0.74.4
Citrix Netscaler Access Gateway Firmware 9.3
Citrix Netscaler Access Gateway Firmware 9.2
Citrix Netscaler Access Gateway Firmware 9.1
Citrix Netscaler Access Gateway Firmware
Citrix Netscaler Access Gateway -
5.1
CVSSv2
CVE-2006-4846
Unspecified vulnerability in Citrix Access Gateway with Advanced Access Control (AAC) 4.2 prior to 20060914, when AAC is configured to use LDAP authentication, allows remote malicious users to bypass authentication via unknown vectors.
Citrix Access Gateway 4.2
5
CVSSv2
CVE-2020-8193
Improper access control in Citrix ADC and Citrix Gateway versions prior to 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions prior to 11.1.1a, 11.0.3d and 10.2.7 allows unauthenticated access to certain URL endpoints.
Citrix Application Delivery Controller Firmware
Citrix Netscaler Gateway Firmware
Citrix Gateway Firmware
Citrix Sd-wan Wanop
4 Github repositories
5
CVSSv2
CVE-2019-11478
Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fi...
Linux Linux Kernel
F5 Big-ip Advanced Firewall Manager
F5 Big-ip Advanced Firewall Manager 15.0.0
F5 Big-ip Access Policy Manager
F5 Big-ip Access Policy Manager 15.0.0
F5 Big-ip Application Acceleration Manager
F5 Big-ip Application Acceleration Manager 15.0.0
F5 Big-ip Link Controller
F5 Big-ip Link Controller 15.0.0
F5 Big-ip Policy Enforcement Manager
F5 Big-ip Policy Enforcement Manager 15.0.0
F5 Big-ip Webaccelerator
F5 Big-ip Webaccelerator 15.0.0
F5 Big-ip Application Security Manager
F5 Big-ip Application Security Manager 15.0.0
F5 Big-ip Local Traffic Manager
F5 Big-ip Local Traffic Manager 15.0.0
F5 Big-ip Fraud Protection Service
F5 Big-ip Fraud Protection Service 15.0.0
F5 Big-ip Global Traffic Manager
F5 Big-ip Global Traffic Manager 15.0.0
F5 Big-ip Analytics
4 Github repositories
1 Article
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
inject
CVE-2024-34001
CVE-2024-37018
LFI
CVE-2024-1275
CVE-2024-1086
CSRF
CVE-2024-31030
CVE-2024-24919
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »