Dug Song

3 exploits Active since Mar 2000
EIP-2026-103960 EXPLOITDB text WRITEUP
Kerberos 4 4.0/5 5.0 - KDC Spoofing
CVE-2000-0244 EXPLOITDB c WORKING POC
Citrix ICA - Info Disclosure
The Citrix ICA (Independent Computing Architecture) protocol uses weak encryption (XOR) for user authentication.
EIP-2026-103881 EXPLOITDB c WORKING POC
Check Point Software Firewall-1 3.0/1 4.0 / Cisco PIX Firewall 4.x/5.x - 'ALG' Client