Unspecified vulnerability in Citrix VDI-In-A-Box 5.3.x before 5.3.8 and 5.4.x before 5.4.4 allows remote attackers to bypass authentication via unspecified vectors, related to a Java servlet.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Vdi-in-a-box | Citrix | 5.3.0 (including) | 5.3.0 (including) |
Vdi-in-a-box | Citrix | 5.3.1 (including) | 5.3.1 (including) |
Vdi-in-a-box | Citrix | 5.3.2 (including) | 5.3.2 (including) |
Vdi-in-a-box | Citrix | 5.3.3 (including) | 5.3.3 (including) |
Vdi-in-a-box | Citrix | 5.3.4 (including) | 5.3.4 (including) |
Vdi-in-a-box | Citrix | 5.3.5 (including) | 5.3.5 (including) |
Vdi-in-a-box | Citrix | 5.3.6 (including) | 5.3.6 (including) |
Vdi-in-a-box | Citrix | 5.3.7 (including) | 5.3.7 (including) |
Vdi-in-a-box | Citrix | 5.4.0 (including) | 5.4.0 (including) |
Vdi-in-a-box | Citrix | 5.4.1 (including) | 5.4.1 (including) |
Vdi-in-a-box | Citrix | 5.4.2 (including) | 5.4.2 (including) |
Vdi-in-a-box | Citrix | 5.4.3 (including) | 5.4.3 (including) |