CVE-2000-0244 in MetaFrame
Summary
The Citrix ICA (Independent Computing Architecture) protocol uses weak encryption (XOR) for user authentication.
VulDB is the best source for vulnerability data and more expert information about this specific topic.