{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T05:50:17.958","vulnerabilities":[{"cve":{"id":"CVE-2016-9678","sourceIdentifier":"cve@mitre.org","published":"2017-01-18T22:59:00.967","lastModified":"2025-04-20T01:37:25.860","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Use-after-free vulnerability in Citrix Provisioning Services before 7.12 allows attackers to execute arbitrary code via unspecified vectors."},{"lang":"es","value":"Vulnerabilidad de uso después de liberación de memoria en Citrix Provisioning Services en versiones anteriores a 7.12 permite a atacantes ejecutar código arbitrario a través de vectores no especificados."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-416"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:citrix:provisioning_services:7.0:*:*:*:*:*:*:*","matchCriteriaId":"52C4D6FE-01B4-44AB-87C7-18C020246319"},{"vulnerable":true,"criteria":"cpe:2.3:a:citrix:provisioning_services:7.1:*:*:*:*:*:*:*","matchCriteriaId":"64D32D91-F161-4E56-909C-BEE79B549BCC"},{"vulnerable":true,"criteria":"cpe:2.3:a:citrix:provisioning_services:7.6:*:*:*:*:*:*:*","matchCriteriaId":"2273F1ED-4850-4DDB-B9A7-2393E4DCDFFC"},{"vulnerable":true,"criteria":"cpe:2.3:a:citrix:provisioning_services:7.7:*:*:*:*:*:*:*","matchCriteriaId":"382FBEA9-A346-40AF-A207-423D604F9AA4"},{"vulnerable":true,"criteria":"cpe:2.3:a:citrix:provisioning_services:7.8:*:*:*:*:*:*:*","matchCriteriaId":"56A5CCAF-3881-4F2A-8CD3-677A6F234550"},{"vulnerable":true,"criteria":"cpe:2.3:a:citrix:provisioning_services:7.9:*:*:*:*:*:*:*","matchCriteriaId":"5D37E5F8-ED0D-420C-BF53-9073EA1E4B18"},{"vulnerable":true,"criteria":"cpe:2.3:a:citrix:provisioning_services:7.11:*:*:*:*:*:*:*","matchCriteriaId":"18D653FB-04BD-44B5-9B04-9492B8185925"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/95620","source":"cve@mitre.org","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securitytracker.com/id/1037625","source":"cve@mitre.org","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://support.citrix.com/article/CTX219580","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/95620","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securitytracker.com/id/1037625","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://support.citrix.com/article/CTX219580","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}