Page 3 of 11 results (0.004 seconds)

CVSS: 10.0EPSS: 0%CPEs: 4EXPL: 2

The Citrix ICA (Independent Computing Architecture) protocol uses weak encryption (XOR) for user authentication. • https://www.exploit-db.com/exploits/19821 http://www.securityfocus.com/bid/1077 http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.BSO.4.20.0003290949280.2640-100000%40naughty.monkey.org •