From 56b6283fd68e0cbdf74dec98e125649d4606f6c1 Mon Sep 17 00:00:00 2001 From: MostInterestingBotInTheWorld <98333686+MostInterestingBotInTheWorld@users.noreply.github.com> Date: Tue, 3 May 2022 12:54:47 -0400 Subject: [PATCH] Enhancement: cves/2019/CVE-2019-19781.yaml by mp --- cves/2019/CVE-2019-19781.yaml | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/cves/2019/CVE-2019-19781.yaml b/cves/2019/CVE-2019-19781.yaml index ed45e501f6..165b722dfe 100644 --- a/cves/2019/CVE-2019-19781.yaml +++ b/cves/2019/CVE-2019-19781.yaml @@ -1,12 +1,13 @@ id: CVE-2019-19781 info: - name: Citrix ADC Directory Traversal + name: Citrix ADC & Gateway - Directory Traversal author: organiccrap,geeknik severity: critical - description: An issue was discovered in Citrix Application Delivery Controller (ADC) and Gateway 10.5, 11.1, 12.0, 12.1, and 13.0. They allow Directory Traversal. + description: Citrix Application Delivery Controller (ADC) and Gateway 10.5, 11.1, 12.0, 12.1, and 13.0 are susceptible to directory traversal vulnerabilities. reference: - https://support.citrix.com/article/CTX267027 + - https://nvd.nist.gov/vuln/detail/CVE-2019-19781 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 @@ -28,3 +29,5 @@ requests: - type: word words: - "[global]" + +# Enhanced by mp on 2022/05/03