Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fp53-c7pw-qg7g

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The Ask.com (aka com.ask.android) application 2.2.5 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

The Ask.com (aka com.ask.android) application 2.2.5 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

EPSS

Процентиль: 28%
0.00099
Низкий

Связанные уязвимости

nvd
больше 11 лет назад

The Ask.com (aka com.ask.android) application 2.2.5 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

EPSS

Процентиль: 28%
0.00099
Низкий