Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-m9w3-px53-mf59

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The familyconnect (aka com.comcast.plaxo.familyconnect.app) application 1.5.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

The familyconnect (aka com.comcast.plaxo.familyconnect.app) application 1.5.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

EPSS

Процентиль: 28%
0.00099
Низкий

Связанные уязвимости

nvd
больше 11 лет назад

The familyconnect (aka com.comcast.plaxo.familyconnect.app) application 1.5.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

EPSS

Процентиль: 28%
0.00099
Низкий