Логотип exploitDog
bind:CVE-2012-3886
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2012-3886

Количество 2

Количество 2

nvd логотип

CVE-2012-3886

больше 13 лет назад

AirDroid 1.0.4 beta uses the MD5 algorithm for values in the checklogin key parameter and 7bb cookie, which makes it easier for remote attackers to obtain cleartext data by sniffing the local wireless network and then conducting a (1) brute-force attack or (2) rainbow-table attack.

CVSS2: 5
EPSS: Низкий
github логотип

GHSA-hf39-c8p3-whjw

больше 3 лет назад

AirDroid 1.0.4 beta uses the MD5 algorithm for values in the checklogin key parameter and 7bb cookie, which makes it easier for remote attackers to obtain cleartext data by sniffing the local wireless network and then conducting a (1) brute-force attack or (2) rainbow-table attack.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2012-3886

AirDroid 1.0.4 beta uses the MD5 algorithm for values in the checklogin key parameter and 7bb cookie, which makes it easier for remote attackers to obtain cleartext data by sniffing the local wireless network and then conducting a (1) brute-force attack or (2) rainbow-table attack.

CVSS2: 5
0%
Низкий
больше 13 лет назад
github логотип
GHSA-hf39-c8p3-whjw

AirDroid 1.0.4 beta uses the MD5 algorithm for values in the checklogin key parameter and 7bb cookie, which makes it easier for remote attackers to obtain cleartext data by sniffing the local wireless network and then conducting a (1) brute-force attack or (2) rainbow-table attack.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу