CVE-2000-0244
The Citrix ICA (Independent Computing Architecture) protocol uses weak encryption (XOR) for user authentication.
Date published : 2000-04-12
The Citrix ICA (Independent Computing Architecture) protocol uses weak encryption (XOR) for user authentication.
Date published : 2000-04-12