Vulnerabilities
Vulnerable Software
The Citrix ICA (Independent Computing Architecture) protocol uses weak encryption (XOR) for user authentication.
CVSS Score
10.0
EPSS Score
0.009
Published
2000-03-29


Contact Us

Shodan ® - All rights reserved