Vulnerabilities
Vulnerable Software
Citrix:  >> Winframe  Security Vulnerabilities
The Citrix ICA (Independent Computing Architecture) protocol uses weak encryption (XOR) for user authentication.
CVSS Score
10.0
EPSS Score
0.009
Published
2000-03-29


Contact Us

Shodan ® - All rights reserved