CVE Article

Detailed analysis of security vulnerabilities

CVE-2000-0244

Published: 2000-03-29 Severity: N/A

The Citrix ICA (Independent Computing Architecture) protocol uses weak encryption (XOR) for user authentication.

Full Description

The Citrix ICA (Independent Computing Architecture) protocol uses weak encryption (XOR) for user authentication.

View Full CVE Details
Neural Processor Active