Логотип exploitDog
bind:CVE-2018-5298
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-5298

Количество 2

Количество 2

nvd логотип

CVE-2018-5298

около 8 лет назад

In the Procter & Gamble "Oral-B App" (aka com.pg.oralb.oralbapp) application 5.0.0 for Android, AES encryption with static parameters is used to secure the locally stored shared preferences. An attacker can gain access to locally stored user data more easily by leveraging access to the preferences XML file.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-3hj5-hhq7-f54x

больше 3 лет назад

In the Procter & Gamble "Oral-B App" (aka com.pg.oralb.oralbapp) application 5.0.0 for Android, AES encryption with static parameters is used to secure the locally stored shared preferences. An attacker can gain access to locally stored user data more easily by leveraging access to the preferences XML file.

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2018-5298

In the Procter & Gamble "Oral-B App" (aka com.pg.oralb.oralbapp) application 5.0.0 for Android, AES encryption with static parameters is used to secure the locally stored shared preferences. An attacker can gain access to locally stored user data more easily by leveraging access to the preferences XML file.

CVSS3: 7.5
0%
Низкий
около 8 лет назад
github логотип
GHSA-3hj5-hhq7-f54x

In the Procter & Gamble "Oral-B App" (aka com.pg.oralb.oralbapp) application 5.0.0 for Android, AES encryption with static parameters is used to secure the locally stored shared preferences. An attacker can gain access to locally stored user data more easily by leveraging access to the preferences XML file.

CVSS3: 7.5
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу