Total vulnerabilities in the database
The Citrix ICA (Independent Computing Architecture) protocol uses weak encryption (XOR) for user authentication.
Software | From | Fixed in |
---|---|---|
citrix / metaframe | 1.0 | 1.0.x |
citrix / metaframe | - | 1.8.x |
citrix / winframe | 3.5_1.8_for_windows_nt | 3.5_1.8_for_windows_nt.x |