Логотип exploitDog
bind:CVE-2014-5600
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2014-5600

Количество 2

Количество 2

nvd логотип

CVE-2014-5600

больше 11 лет назад

The familyconnect (aka com.comcast.plaxo.familyconnect.app) application 1.5.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVSS2: 5.4
EPSS: Низкий
github логотип

GHSA-m9w3-px53-mf59

больше 3 лет назад

The familyconnect (aka com.comcast.plaxo.familyconnect.app) application 1.5.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2014-5600

The familyconnect (aka com.comcast.plaxo.familyconnect.app) application 1.5.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVSS2: 5.4
0%
Низкий
больше 11 лет назад
github логотип
GHSA-m9w3-px53-mf59

The familyconnect (aka com.comcast.plaxo.familyconnect.app) application 1.5.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу