CVE-2000-0244

Currently unrated

Key Information:

Vendor
Citrix
Vendor
CVE Published:
29 March 2000

Summary

The Citrix ICA (Independent Computing Architecture) protocol uses weak encryption (XOR) for user authentication.

References

Timeline

  • Vulnerability Reserved

  • Vulnerability published

Collectors

NVD DatabaseMitre Database
.