Page 3 of 12 results (0.002 seconds)

CVSS: 3.3EPSS: 0%CPEs: 2EXPL: 0

The NTT DOCOMO overseas usage application 2.0.0 through 2.0.4 for Android does not properly connect to Wi-Fi access points, which allows remote attackers to obtain sensitive information by leveraging presence in an 802.11 network's coverage area. El NTT DOCOMO usado en aplicaciones en el exterior v2.0.0 hasta v2.0.4 para Android no se conecta correctamente a puntos de acceso Wi-Fi, lo que permite a atacantes remotos obtener información sensible mediante el aprovechamiento de presencia en la zona de cobertura de una red 802.11 • http://jvn.jp/en/jp/JVN44035194/995312/index.html http://jvn.jp/en/jp/JVN44035194/index.html http://jvndb.jvn.jp/jvndb/JVNDB-2013-000075 https://exchange.xforce.ibmcloud.com/vulnerabilities/86361 https://play.google.com/store/apps/details?id=com.nttdocomo.android.gs.utility • CWE-287: Improper Authentication •

CVSS: 5.8EPSS: 0%CPEs: 21EXPL: 0

The NTT DOCOMO sp mode mail application 5400 and earlier for Android does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. La aplicación de correo para Android NTT DoCoMo sp mode v5400 y anteriores no verifica correctamente los certificados X.509 de servidores SSL, lo que permite falsificar servidores a atacantes man-in-the-middle y obtener información sensible a través de un certificado hecho a mano. • http://jvn.jp/en/jp/JVN82029095/index.html http://jvndb.jvn.jp/jvndb/JVNDB-2012-000037 http://osvdb.org/81629 http://secunia.com/advisories/48955 http://www.securityfocus.com/bid/53254 https://exchange.xforce.ibmcloud.com/vulnerabilities/75159 • CWE-310: Cryptographic Issues •