Vendor | Product | Version |
---|---|---|
citrix | gateway | 12.1 ≤ 𝑥 < 12.1-65.21 |
citrix | gateway | 13.0 ≤ 𝑥 < 13.0-88.12 |
citrix | gateway | 13.1 ≤ 𝑥 < 13.1-33.41 |
citrix | application_delivery_controller_firmware | 12.1 ≤ 𝑥 < 12.1-65.21 |
citrix | application_delivery_controller_firmware | 13.0 ≤ 𝑥 < 13.0-88.12 |
citrix | application_delivery_controller_firmware | 13.1 ≤ 𝑥 < 13.1-33.47 |
citrix | application_delivery_controller_firmware | 12.1 ≤ 𝑥 < 12.1-55.289 |
citrix | application_delivery_controller_firmware | 12.1 ≤ 𝑥 < 12.1-55.289 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-288 - Authentication Bypass Using an Alternate Path or ChannelA product requires authentication, but the product has an alternate path or channel that does not require authentication.
- CWE-287 - Improper AuthenticationWhen an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.