CVE-2012-2567

The Xelex MobileTrack application 2.3.7 and earlier for Android uses hardcoded credentials, which allows remote attackers to obtain sensitive information via an unencrypted (1) FTP or (2) HTTP session.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:xelex:mobiletrack:*:*:*:*:*:*:*:*
cpe:2.3:o:google:android:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:39

Type Values Removed Values Added
References () http://blog.mobiledefense.com/2012/05/mobile-defense-finds-two-security-vulnerabilities-in-xelex-mobiletrack/ - () http://blog.mobiledefense.com/2012/05/mobile-defense-finds-two-security-vulnerabilities-in-xelex-mobiletrack/ -
References () http://secunia.com/advisories/49268 - () http://secunia.com/advisories/49268 -
References () http://www.kb.cert.org/vuls/id/464683 - US Government Resource () http://www.kb.cert.org/vuls/id/464683 - US Government Resource
References () http://www.securityfocus.com/bid/53634 - () http://www.securityfocus.com/bid/53634 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/75783 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/75783 -

Information

Published : 2012-05-22 15:55

Updated : 2024-11-21 01:39


NVD link : CVE-2012-2567

Mitre link : CVE-2012-2567

CVE.ORG link : CVE-2012-2567


JSON object : View

Products Affected

google

  • android

xelex

  • mobiletrack
CWE
CWE-255

Credentials Management Errors