-
-
-
Supported CVEs through Security Advisory
-
Remediate vulnerabilities for CVE-2021-22927 and CVE-2021-22920
-
-
-
Minimum and maximum capacity for Flexed and Pooled licensing
-
Scenarios for Flexed or Pooled license expiry and connectivity issues behavior
-
Configure NetScaler Console on-prem as the Flexed or Pooled license server
This content has been machine translated dynamically.
Dieser Inhalt ist eine maschinelle Übersetzung, die dynamisch erstellt wurde. (Haftungsausschluss)
Cet article a été traduit automatiquement de manière dynamique. (Clause de non responsabilité)
Este artículo lo ha traducido una máquina de forma dinámica. (Aviso legal)
此内容已经过机器动态翻译。 放弃
このコンテンツは動的に機械翻訳されています。免責事項
이 콘텐츠는 동적으로 기계 번역되었습니다. 책임 부인
Este texto foi traduzido automaticamente. (Aviso legal)
Questo contenuto è stato tradotto dinamicamente con traduzione automatica.(Esclusione di responsabilità))
This article has been machine translated.
Dieser Artikel wurde maschinell übersetzt. (Haftungsausschluss)
Ce article a été traduit automatiquement. (Clause de non responsabilité)
Este artículo ha sido traducido automáticamente. (Aviso legal)
この記事は機械翻訳されています.免責事項
이 기사는 기계 번역되었습니다.책임 부인
Este artigo foi traduzido automaticamente.(Aviso legal)
这篇文章已经过机器翻译.放弃
Questo articolo è stato tradotto automaticamente.(Esclusione di responsabilità))
Translation failed!
Supported CVEs through Security Advisory
In your NetScaler Console on-prem, the full version of Security Advisory is supported if you have enabled Security Advisory through Cloud Connect or auto-enabled channel. For more information, see Security Advisory.
Latest supported CVEs
The following table provides the latest supported CVE details that you can identify and remediate in Security Advisory:
Release date | CVE ID | Identification | Remediation | Resource link |
---|---|---|---|---|
12 Nov 2024 | CVE-2024-8534 | Requires a combination of version scan and configuration scan. | Upgrade to the recommended build mentioned in the security bulletin. | Security Bulletin |
12 Nov 2024 | CVE-2024-8535 | Requires a combination of version scan and configuration scan. | Remediation requires a two-step process. For more information, see Remediate CVE-2024-8535 | Security Bulletin |
Note:
Security Advisory does not support NetScaler builds that have reached End of Life (EOL). We recommend you upgrade to the NetScaler supported builds or versions.
For more information on how to use NetScaler Console to upgrade NetScaler instances, see Use jobs to upgrade NetScaler instances.
Note:
It might take a couple of hours for the security advisory system scan to conclude and reflect on the impact of CVEs in the security advisory module. To see the impact sooner, you can start an on-demand scan by clicking Scan Now.
Supported CVEs
The following are the existing CVEs supported in Security Advisory:
Release date | CVE ID | Resource link |
---|---|---|
Nov 12, 2024 | CVE-2024-8534 | Security Bulletin |
Nov 12, 2024 | CVE-2024-8535 | Security Bulletin |
Jul 09, 2024 | CVE-2024-5491 | Security Bulletin |
Jul 09, 2024 | CVE-2024-5492 | Security Bulletin |
Jan 16, 2024 | CVE-2023-6549 | Security bulletin |
Jan 16, 2024 | CVE-2023-6548 | Security bulletin |
Oct 10, 2023 | CVE-2023-4967 | Security bulletin |
Oct 10, 2023 | CVE-2023-4966 | Security bulletin |
Jul 18, 2023 | CVE-2023-3519 | Security bulletin |
Jul 18, 2023 | CVE-2023-3467 | Security bulletin |
Jul 18, 2023 | CVE-2023-3466 | Security bulletin |
May 09, 2023 | CVE-2023-24488 | Security bulletin |
May 09, 2023 | CVE-2023-24487 | Security bulletin |
Dec 13, 2022 | CVE-2022-27518 | Security bulletin |
Nov 08, 2022 | CVE-2022-27516 | Security bulletin |
Nov 08, 2022 | CVE-2022-27513 | Security bulletin |
Nov 08, 2022 | CVE-2022-27510 | Security bulletin |
Jul 26, 2022 | CVE-2022-27509 | Security bulletin |
May 25, 2022 | CVE-2022-27508 | Security bulletin |
May 25, 2022 | CVE-2022-27507 | Security bulletin |
Nov 09, 2021 | CVE-2021-22956 | Security bulletin |
Nov 09, 2021 | CVE-2021-22955 | Security bulletin |
Jul 19, 2021 | CVE-2021-22927 | Security bulletin |
Jul 19, 2021 | CVE-2021-22920 | Security bulletin |
Jul 19, 2021 | CVE-2021-22919 | Security bulletin |
Jun 08, 2021 | CVE-2020-8300 | Security bulletin |
Jun 08, 2021 | CVE-2020-8299 | Security bulletin |
Sep 17, 2020 | CVE-2020-8247 | Security bulletin |
Sep 17, 2020 | CVE-2020-8246 | Security bulletin |
Sep 17, 2020 | CVE-2020-8245 | Security bulletin |
Jul 07, 2020 | CVE-2020-8197 | Security bulletin |
Jul 07, 2020 | CVE-2020-8199 | Security bulletin |
Jul 07, 2020 | CVE-2020-8195 | Security bulletin |
Jul 07, 2020 | CVE-2020-8196 | Security bulletin |
Jul 07, 2020 | CVE-2020-8193 | Security bulletin |
Jul 07, 2020 | CVE-2020-8187 | Security bulletin |
Jul 07, 2020 | CVE-2020-8191 | Security bulletin |
Jul 07, 2020 | CVE-2020-8190 | Security bulletin |
Jul 07, 2020 | CVE-2019-18177 | Security bulletin |
Jul 07, 2020 | CVE-2020-8194 | Security bulletin |
Jul 07, 2020 | CVE-2020-8198 | Security bulletin |
Dec 17, 2019 | CVE-2019-19781 | Security bulletin |
Share
Share
In this article
This Preview product documentation is Cloud Software Group Confidential.
You agree to hold this documentation confidential pursuant to the terms of your Cloud Software Group Beta/Tech Preview Agreement.
The development, release and timing of any features or functionality described in the Preview documentation remains at our sole discretion and are subject to change without notice or consultation.
The documentation is for informational purposes only and is not a commitment, promise or legal obligation to deliver any material, code or functionality and should not be relied upon in making Cloud Software Group product purchase decisions.
If you do not agree, select I DO NOT AGREE to exit.