Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-x83h-m5jg-fmmw

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The Family Location (aka com.sosocome.family) application 3.4 2014-5-20 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

The Family Location (aka com.sosocome.family) application 3.4 2014-5-20 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

EPSS

Процентиль: 28%
0.00099
Низкий

Связанные уязвимости

nvd
больше 11 лет назад

The Family Location (aka com.sosocome.family) application 3.4 2014-5-20 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

EPSS

Процентиль: 28%
0.00099
Низкий