From 37337a9ae0576415d5871efa9c6adfe8bfc3099f Mon Sep 17 00:00:00 2001 From: pussycat0x <65701233+pussycat0x@users.noreply.github.com> Date: Thu, 23 Oct 2025 20:28:34 +0530 Subject: [PATCH 1/2] Update CVE-2023-3519.yaml --- http/cves/2023/CVE-2023-3519.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/http/cves/2023/CVE-2023-3519.yaml b/http/cves/2023/CVE-2023-3519.yaml index 38c59c28531..6bc92336eb2 100644 --- a/http/cves/2023/CVE-2023-3519.yaml +++ b/http/cves/2023/CVE-2023-3519.yaml @@ -2,7 +2,7 @@ id: CVE-2023-3519 info: name: Citrix NetScaler ADC and NetScaler Gateway - Remote Code Execution - author: pussycat0x + author: pussycat0x,ritikchaddha severity: critical description: | critical unauthenticated remote code execution (RCE) vulnerability affecting Citrix ADC (NetScaler ADC) and Citrix Gateway appliances configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server. Exploitation can lead to arbitrary code execution. @@ -44,4 +44,4 @@ http: - "status_code == 200" - "contains(body, 'SAML Assertion verification failed;')" condition: and -# digest: 4b0a0048304602210082114a6508b906bbecd33aae588a91d9892e61a39c37df676abda9400a8de6f0022100fd710506981cf9f8bf419f3ea7e273ac435cd135beec9524e26c089840c88e2f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a0048304602210082114a6508b906bbecd33aae588a91d9892e61a39c37df676abda9400a8de6f0022100fd710506981cf9f8bf419f3ea7e273ac435cd135beec9524e26c089840c88e2f:922c64590222798bb761d5b6d8e72950 From 6dc6a27a20fe53756b02bca9e7595faa0fc2d5cc Mon Sep 17 00:00:00 2001 From: pussycat0x <65701233+pussycat0x@users.noreply.github.com> Date: Thu, 23 Oct 2025 20:30:23 +0530 Subject: [PATCH 2/2] Update CVE-2023-3519.yaml --- http/cves/2023/CVE-2023-3519.yaml | 1 - 1 file changed, 1 deletion(-) diff --git a/http/cves/2023/CVE-2023-3519.yaml b/http/cves/2023/CVE-2023-3519.yaml index 6bc92336eb2..acdff2a92d2 100644 --- a/http/cves/2023/CVE-2023-3519.yaml +++ b/http/cves/2023/CVE-2023-3519.yaml @@ -44,4 +44,3 @@ http: - "status_code == 200" - "contains(body, 'SAML Assertion verification failed;')" condition: and -# digest: 4b0a0048304602210082114a6508b906bbecd33aae588a91d9892e61a39c37df676abda9400a8de6f0022100fd710506981cf9f8bf419f3ea7e273ac435cd135beec9524e26c089840c88e2f:922c64590222798bb761d5b6d8e72950