cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2016-6493,https://securityvulnerability.io/vulnerability/CVE-2016-6493,,Citrix XenApp 6.x before 6.5 HRP07 and 7.x before 7.9 and Citrix XenDesktop before 7.9 might allow attackers to weaken an unspecified security mitigation via vectors related to memory permission.,Citrix,"Xenapp,Xendesktop",9.8,CRITICAL,0.003060000017285347,false,false,false,false,,false,false,2016-08-19T21:00:00.000Z,0 CVE-2016-4810,https://securityvulnerability.io/vulnerability/CVE-2016-4810,,"Citrix Studio before 7.6.1000, Citrix XenDesktop 7.x before 7.6 LTSR Cumulative Update 1 (CU1), and Citrix XenApp 7.5 and 7.6 allow attackers to set Access Policy rules on the XenDesktop Delivery Controller via unspecified vectors.",Citrix,"Xenapp,Xendesktop",7.5,HIGH,0.0010100000072270632,false,false,false,false,,false,false,2016-06-01T22:00:00.000Z,0 CVE-2014-4700,https://securityvulnerability.io/vulnerability/CVE-2014-4700,,"Citrix XenDesktop 7.x, 5.x, and 4.x, when pooled random desktop groups is enabled and ShutdownDesktopsAfterUse is disabled, allows local guest users to gain access to another user's desktop via unspecified vectors.",Citrix,Xendesktop,,,0.00279999990016222,false,false,false,false,,false,false,2014-07-11T14:00:00.000Z,0 CVE-2013-6077,https://securityvulnerability.io/vulnerability/CVE-2013-6077,,"Citrix XenDesktop 7.0, when upgraded from XenDesktop 5.x, does not properly enforce policy rule permissions, which allows remote attackers to bypass intended restrictions.",Citrix,Xendesktop,,,0.0024399999529123306,false,false,false,false,,false,false,2013-11-05T18:55:00.000Z,0 CVE-2012-6314,https://securityvulnerability.io/vulnerability/CVE-2012-6314,,"Citrix XenDesktop Virtual Desktop Agent (VDA) 5.6.x before 5.6.200, when making changes to the server-side policy that control USB redirection, does not propagate changes to the VDA, which allows authenticated users to retain access to the USB device.",Citrix,Xendesktop,,,0.0024399999529123306,false,false,false,false,,false,false,2012-12-26T22:00:00.000Z,0 CVE-2010-2991,https://securityvulnerability.io/vulnerability/CVE-2010-2991,,The IICAClient interface in the ICAClient library in the ICA Client ActiveX Object (aka ICO) component in Citrix Online Plug-in for Windows for XenApp & XenDesktop before 12.0.3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted HTML document that triggers the reading of a .ICA file.,Citrix,Online Plug-in For Windows For Xenapp \& Xendesktop,,,0.029729999601840973,false,false,false,false,,false,false,2010-08-11T20:00:00.000Z,0 CVE-2010-2990,https://securityvulnerability.io/vulnerability/CVE-2010-2990,,"Citrix Online Plug-in for Windows for XenApp & XenDesktop before 11.2, Citrix Online Plug-in for Mac for XenApp & XenDesktop before 11.0, Citrix ICA Client for Linux before 11.100, Citrix ICA Client for Solaris before 8.63, and Citrix Receiver for Windows Mobile before 11.5 allow remote attackers to execute arbitrary code via (1) a crafted HTML document, (2) a crafted .ICA file, or (3) a crafted type field in an ICA graphics packet, related to a ""heap offset overflow"" issue.",Citrix,"Online Plug-in For Windows For Xenapp \& Xendesktop,Ica Client For Solaris,Receiver For Windows Mobile,Online Plug-in For Mac For Xenapp \& Xendesktop,Ica Client For Linux",,,0.027650000527501106,false,false,false,false,,false,false,2010-08-11T19:00:00.000Z,0