Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-q5m6-rrfq-4xhf

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The FOL (aka com.desire2learn.fol.mobile.app.campuslife.directory) application 3.0.729.1459 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

The FOL (aka com.desire2learn.fol.mobile.app.campuslife.directory) application 3.0.729.1459 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

EPSS

Процентиль: 28%
0.00099
Низкий

Связанные уязвимости

nvd
больше 11 лет назад

The FOL (aka com.desire2learn.fol.mobile.app.campuslife.directory) application 3.0.729.1459 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

EPSS

Процентиль: 28%
0.00099
Низкий