CVE-2000-0244
Currently unrated
Summary
The Citrix ICA (Independent Computing Architecture) protocol uses weak encryption (XOR) for user authentication.
References
Timeline
Vulnerability Reserved
Vulnerability published
The Citrix ICA (Independent Computing Architecture) protocol uses weak encryption (XOR) for user authentication.
Vulnerability Reserved
Vulnerability published