Описание
Hak5 WiFi Pineapple 2.0 through 2.3 uses predictable CSRF tokens.
Ссылки
- ExploitThird Party AdvisoryVDB Entry
- ExploitThird Party AdvisoryVDB Entry
- ExploitThird Party AdvisoryVDB Entry
- ExploitThird Party AdvisoryVDB Entry
- ExploitThird Party AdvisoryVDB Entry
- ExploitThird Party AdvisoryVDB Entry
Уязвимые конфигурации
Конфигурация 1
Одновременно
Одно из
cpe:2.3:o:hak5:wi-fi_pineapple_firmware:2.0:*:*:*:*:*:*:*
cpe:2.3:o:hak5:wi-fi_pineapple_firmware:2.1:*:*:*:*:*:*:*
cpe:2.3:o:hak5:wi-fi_pineapple_firmware:2.2:*:*:*:*:*:*:*
cpe:2.3:o:hak5:wi-fi_pineapple_firmware:2.3:*:*:*:*:*:*:*
cpe:2.3:h:hak5:wi-fi_pineapple:-:*:*:*:*:*:*:*
EPSS
Процентиль: 98%
0.4762
Средний
7.5 High
CVSS3
4.3 Medium
CVSS2
Дефекты
CWE-284
Связанные уязвимости
CVSS3: 7.5
github
больше 3 лет назад
Hak5 WiFi Pineapple 2.0 through 2.3 uses predictable CSRF tokens.
EPSS
Процентиль: 98%
0.4762
Средний
7.5 High
CVSS3
4.3 Medium
CVSS2
Дефекты
CWE-284