Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Cloud Software Group | NetScaler ADC | 14.1 ~ 12.35 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | The vulnerability would enable an attacker to remotely obtain sensitive information from a NetScaler appliance configured as a Gateway or AAA virtual server via a very commonly connected Web interface, and without requiring authentication. This bug is nearly identical to the Citrix Bleed vulnerability (CVE-2023-4966), except it is less likely to return highly sensitive information to an attacker. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-6549.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2023-6548 | 5.5 MEDIUM | Citrix Systems ADC and NetScaler Gateway 代码注入漏洞 |
| CVE-2023-5914 | 5.4 MEDIUM | Citrix Systems StoreFront Server 跨站脚本漏洞 |
No comments yet