Логотип exploitDog
bind:CVE-2019-5626
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-5626

Количество 2

Количество 2

nvd логотип

CVE-2019-5626

больше 6 лет назад

The Android mobile application BlueCats Reveal before 3.0.19 stores the username and password in a clear text file. This file persists until the user logs out or the session times out from non-usage (30 days of no user activity). This can allow an attacker to compromise the affected BlueCats network implementation. The attacker would first need to gain physical control of the Android device or compromise it with a malicious app.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-w7p8-rgxr-jhj7

больше 3 лет назад

The Android mobile application BlueCats Reveal before 3.0.19 stores the username and password in a clear text file. This file persists until the user logs out or the session times out from non-usage (30 days of no user activity). This can allow an attacker to compromise the affected BlueCats network implementation. The attacker would first need to gain physical control of the Android device or compromise it with a malicious app.

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-5626

The Android mobile application BlueCats Reveal before 3.0.19 stores the username and password in a clear text file. This file persists until the user logs out or the session times out from non-usage (30 days of no user activity). This can allow an attacker to compromise the affected BlueCats network implementation. The attacker would first need to gain physical control of the Android device or compromise it with a malicious app.

CVSS3: 7.8
0%
Низкий
больше 6 лет назад
github логотип
GHSA-w7p8-rgxr-jhj7

The Android mobile application BlueCats Reveal before 3.0.19 stores the username and password in a clear text file. This file persists until the user logs out or the session times out from non-usage (30 days of no user activity). This can allow an attacker to compromise the affected BlueCats network implementation. The attacker would first need to gain physical control of the Android device or compromise it with a malicious app.

CVSS3: 7.8
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу