Browse all 3 CVE security advisories affecting NetSclaer. AI-powered Chinese analysis, POCs, and references for each vulnerability.
NetSclaer is a widely deployed application delivery and load balancing platform that optimizes web traffic and enhances application performance. Historically, it has been susceptible to critical vulnerabilities including remote code execution, cross-site scripting, and privilege escalation, often stemming from improper input validation and authentication flaws. The platform gained significant attention in 2021 when multiple zero-day vulnerabilities (CVE-2021-22947, CVE-2021-22948, CVE-2021-22949) were exploited in attacks, allowing attackers to achieve remote code execution with minimal user interaction. These incidents highlighted the critical nature of proper patch management and network segmentation for organizations relying on this technology.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-8534 | Memory safety vulnerability leading to memory corruption and Denial of Service — NetScaler ADCCWE-119 | 7.5AI | HighAI | 2024-11-12 |
| CVE-2024-6236 | Denial of Service — NetScaler Console | 7.5AI | HighAI | 2024-07-10 |
| CVE-2024-5492 | Open redirect vulnerability allows a remote unauthenticated attacker to redirect users to arbitrary websites — NetScaler ADC | 6.1AI | MediumAI | 2024-07-10 |
This page lists every published CVE security advisory associated with NetSclaer. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.