Remote desktop takeover via phishing
The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Gateway | Citrix | 12.1 (including) | 12.1-65.21 (excluding) |
Gateway | Citrix | 13.0 (including) | 13.0-88.12 (excluding) |
Gateway | Citrix | 13.1 (including) | 13.1-33.41 (excluding) |