CVE-2000-0244
CVE-2000-0244 · HIGH Severity
AV:N/AC:L/AU:N/C:C/I:C/A:C
The Citrix ICA (Independent Computing Architecture) protocol uses weak encryption (XOR) for user authentication.
Learn more about our User Device Pen Test.
AV:N/AC:L/AU:N/C:C/I:C/A:C
The Citrix ICA (Independent Computing Architecture) protocol uses weak encryption (XOR) for user authentication.
Learn more about our User Device Pen Test.