Signature update version 131

New signatures rules are generated for the vulnerabilities identified in the week 2024-06-14. You can download and configure these signature rules to protect your appliance from security vulnerable attacks.

Signature version

Signature version 131 applicable for NetScaler 11.1, NetScaler 12.0, Citrix ADC 12.1, Citrix ADC 13.0, NetScaler 13.1, NetScaler 14.1 platforms.


Enabling Post body and Response body signature rules might affect NetScaler CPU.

Common Vulnerability Entry (CVE) insight

Following is a list of signature rules, CVE IDs, and its description.

Signature rule CVE ID Description
998481 CVE-2024-4956 WEB-MISC Sonatype Nexus Repository Prior to 3.68.1 - Unauthenticated Path Traversal Vulnerability (CVE-2024-4956)
998482 CVE-2024-4577 WEB-MISC PHP Prior to 8.1.29, 8.2.20 and 8.3.8 - Command Injection Vulnerability (CVE-2024-4577)
998483 CVE-2024-4358 WEB-MISC Progress Telerik Report Server - Authentication Bypass Vulnerability (CVE-2024-4358)
998484 CVE-2024-2879 WEB-WORDPRESS Wordpress plugin LayerSlider Versions 7.9.11 and 7.10.0 - SQL Injection Vulnerability (CVE-2024-2879)
998485 CVE-2024-23917 WEB-MISC JetBrains TeamCity Prior to 2023.11.3 - Authentication Bypass Vulnerability (CVE-2024-23917)
998486 CVE-2024-21683 WEB-MISC Atlassian Confluence Prior to 8.9.1 - Remote Code Execution Vulnerability (CVE-2024-21683)
998487 CVE-2024-0507 WEB-MISC GitHub Enterprise Server - Command Injection Vulnerability (CVE-2024-0507)
998488 CVE-2023-46729 WEB-MISC Sentry Next.JS Prior to 7.77.0 - SSRF Via SDK Tunnel Vulnerability (CVE-2023-46729)
Signature update version 131