From 1cd5ced90024ee5f6f5f312de14cd89aac2bf482 Mon Sep 17 00:00:00 2001 From: MostInterestingBotInTheWorld <98333686+MostInterestingBotInTheWorld@users.noreply.github.com> Date: Tue, 4 Apr 2023 15:57:52 -0400 Subject: [PATCH] Enhancement: cves/2020/CVE-2020-8194.yaml by md --- cves/2020/CVE-2020-8194.yaml | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/cves/2020/CVE-2020-8194.yaml b/cves/2020/CVE-2020-8194.yaml index a2146b54f0..efcc3f709b 100644 --- a/cves/2020/CVE-2020-8194.yaml +++ b/cves/2020/CVE-2020-8194.yaml @@ -1,13 +1,13 @@ id: CVE-2020-8194 info: - name: Citrix ADC & NetScaler Gateway Reflected Code Injection + name: Citrix ADC and Citrix NetScaler Gateway - Remote Code Injection author: dwisiswant0 severity: medium - description: Reflected code injection in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and - 10.2.7 allows the modification of a file download. + description: Citrix ADC and NetScaler Gateway are susceptible to remote code injection. An attacker can potentially execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials. Affected versions are before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18. Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 allow modification of a file download. reference: - https://support.citrix.com/article/CTX276688 + - https://nvd.nist.gov/vuln/detail/CVE-2020-8194 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N cvss-score: 6.5 @@ -37,3 +37,5 @@ requests: - type: status status: - 200 + +# Enhanced by md on 2023/04/04