CVE-2000-0244
Currently unrated
Summary
The Citrix ICA (Independent Computing Architecture) protocol uses weak encryption (XOR) for user authentication.
References
Timeline
Vulnerability Reserved
Vulnerability published
Collectors
NVD DatabaseMitre Database