cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2020-13998,https://securityvulnerability.io/vulnerability/CVE-2020-13998,User Enumeration Vulnerability in Citrix XenApp by Citrix,"A vulnerability in Citrix XenApp 6.5 allows remote unauthenticated attackers to determine whether a user exists on the server when two-factor authentication (2FA) is enabled. This occurs due to the behavior of the 2FA error page, which is displayed only after a valid username is entered. As a result, attackers can exploit this mechanism to enumerate valid user accounts, posing a significant security risk. Note that this vulnerability affects products that are no longer maintained by Citrix.",Citrix,Xenapp,5.3,MEDIUM,0.001180000021122396,false,,false,false,false,,,false,false,,2020-06-11T01:59:35.000Z,0 CVE-2012-4603,https://securityvulnerability.io/vulnerability/CVE-2012-4603,Remote Code Execution Vulnerability in Citrix XenApp and Receiver,"The Citrix XenApp Online Plug-in for Windows and Citrix Receiver for Windows are susceptible to a remote code execution vulnerability. This flaw allows attackers to execute arbitrary code on a target system by persuading users to open specially crafted files from a compromised SMB or WebDAV file server. Given its potential impact on user systems, it's crucial for organizations using these products to implement appropriate security measures and keep software updated.",Citrix,"Receiver,Xenapp Online",7.8,HIGH,0.043949998915195465,false,,false,false,false,,,false,false,,2020-01-10T20:22:58.000Z,0 CVE-2016-6493,https://securityvulnerability.io/vulnerability/CVE-2016-6493,,Citrix XenApp 6.x before 6.5 HRP07 and 7.x before 7.9 and Citrix XenDesktop before 7.9 might allow attackers to weaken an unspecified security mitigation via vectors related to memory permission.,Citrix,"Xenapp,Xendesktop",9.8,CRITICAL,0.003060000017285347,false,,false,false,false,,,false,false,,2016-08-19T21:00:00.000Z,0 CVE-2016-4810,https://securityvulnerability.io/vulnerability/CVE-2016-4810,,"Citrix Studio before 7.6.1000, Citrix XenDesktop 7.x before 7.6 LTSR Cumulative Update 1 (CU1), and Citrix XenApp 7.5 and 7.6 allow attackers to set Access Policy rules on the XenDesktop Delivery Controller via unspecified vectors.",Citrix,"Xenapp,Xendesktop",7.5,HIGH,0.0010100000072270632,false,,false,false,false,,,false,false,,2016-06-01T22:00:00.000Z,0 CVE-2012-5161,https://securityvulnerability.io/vulnerability/CVE-2012-5161,,The XML Service interface in Citrix XenApp 6.5 and 6.5 Feature Pack 1 allows remote attackers to execute arbitrary code via unspecified vectors.,Citrix,Xenapp,,,0.04831000044941902,false,,false,false,false,,,false,false,,2012-12-26T22:00:00.000Z,0 CVE-2010-2991,https://securityvulnerability.io/vulnerability/CVE-2010-2991,,The IICAClient interface in the ICAClient library in the ICA Client ActiveX Object (aka ICO) component in Citrix Online Plug-in for Windows for XenApp & XenDesktop before 12.0.3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted HTML document that triggers the reading of a .ICA file.,Citrix,Online Plug-in For Windows For Xenapp \& Xendesktop,,,0.029729999601840973,false,,false,false,false,,,false,false,,2010-08-11T20:00:00.000Z,0 CVE-2010-2990,https://securityvulnerability.io/vulnerability/CVE-2010-2990,,"Citrix Online Plug-in for Windows for XenApp & XenDesktop before 11.2, Citrix Online Plug-in for Mac for XenApp & XenDesktop before 11.0, Citrix ICA Client for Linux before 11.100, Citrix ICA Client for Solaris before 8.63, and Citrix Receiver for Windows Mobile before 11.5 allow remote attackers to execute arbitrary code via (1) a crafted HTML document, (2) a crafted .ICA file, or (3) a crafted type field in an ICA graphics packet, related to a ""heap offset overflow"" issue.",Citrix,"Online Plug-in For Windows For Xenapp \& Xendesktop,Ica Client For Solaris,Receiver For Windows Mobile,Online Plug-in For Mac For Xenapp \& Xendesktop,Ica Client For Linux",,,0.026410000398755074,false,,false,false,false,,,false,false,,2010-08-11T19:00:00.000Z,0 CVE-2009-2453,https://securityvulnerability.io/vulnerability/CVE-2009-2453,,"Citrix XenApp (formerly Presentation Server) 4.5 Hotfix Rollup Pack 3 does not apply an access policy when it is defined with the Access Gateway Advanced Edition filters, which allows attackers to bypass intended access restrictions via unknown vectors.",Citrix,"Presentation Server,Xenapp",,,0.0061599998734891415,false,,false,false,false,,,false,false,,2009-07-14T14:30:00.000Z,0 CVE-2008-4676,https://securityvulnerability.io/vulnerability/CVE-2008-4676,,"Unspecified vulnerability in Citrix XenApp (formerly Presentation Server) 4.5 Feature Pack 1 and earlier, Presentation Server 4.0, and Access Essentials 1.0, 1.5, and 2.0 allows local users to gain privileges via unknown attack vectors related to creating an unspecified file. NOTE: this might be the same issue as CVE-2008-3485, but the vendor advisory is too vague to be certain.",Citrix,"Xenapp,Access Essentials,Presentation Server",,,0.0004199999966658652,false,,false,false,false,,,false,false,,2008-10-22T10:00:00.000Z,0