Remote desktop takeover via phishing
The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Gateway | Citrix | 12.1 (including) | 12.1-65.21 (excluding) |
| Gateway | Citrix | 13.0 (including) | 13.0-88.12 (excluding) |
| Gateway | Citrix | 13.1 (including) | 13.1-33.41 (excluding) |