Описание
The Citrix ICA (Independent Computing Architecture) protocol uses weak encryption (XOR) for user authentication.
The Citrix ICA (Independent Computing Architecture) protocol uses weak encryption (XOR) for user authentication.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2000-0244
- http://www.securityfocus.com/bid/1077
- http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.BSO.4.20.0003290949280.2640-100000%40naughty.monkey.org
- http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.BSO.4.20.0003290949280.2640-100000@naughty.monkey.org
EPSS
Процентиль: 86%
0.02731
Низкий
CVE ID
Связанные уязвимости
nvd
почти 26 лет назад
The Citrix ICA (Independent Computing Architecture) protocol uses weak encryption (XOR) for user authentication.
EPSS
Процентиль: 86%
0.02731
Низкий