Unspecified vulnerability in Citrix VDI-In-A-Box 5.3.x before 5.3.8 and 5.4.x before 5.4.4 allows remote attackers to bypass authentication via unspecified vectors, related to a Java servlet.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Vdi-in-a-box | Citrix | 5.3.0 | 5.3.0 |
Vdi-in-a-box | Citrix | 5.3.4 | 5.3.4 |
Vdi-in-a-box | Citrix | 5.4.0 | 5.4.0 |
Vdi-in-a-box | Citrix | 5.3.5 | 5.3.5 |
Vdi-in-a-box | Citrix | 5.3.6 | 5.3.6 |
Vdi-in-a-box | Citrix | 5.3.7 | 5.3.7 |
Vdi-in-a-box | Citrix | 5.4.3 | 5.4.3 |
Vdi-in-a-box | Citrix | 5.4.2 | 5.4.2 |
Vdi-in-a-box | Citrix | 5.3.1 | 5.3.1 |
Vdi-in-a-box | Citrix | 5.3.2 | 5.3.2 |
Vdi-in-a-box | Citrix | 5.3.3 | 5.3.3 |
Vdi-in-a-box | Citrix | 5.4.1 | 5.4.1 |