An issue was discovered in the MensaMax (aka com.breustedt.mensamax) application 4.3 for Android. The use of a Hard-coded DES Cryptographic Key allows an attacker who decodes the application to decrypt transmitted data such as the login username and password.
References
Link | Resource |
---|---|
https://advisories.e2security.de/2018/E2SA-2018-01.txt | Exploit Third Party Advisory |
https://seclists.org/bugtraq/2018/Oct/3 | Exploit Mailing List Third Party Advisory |
https://advisories.e2security.de/2018/E2SA-2018-01.txt | Exploit Third Party Advisory |
https://seclists.org/bugtraq/2018/Oct/3 | Exploit Mailing List Third Party Advisory |
Configurations
History
21 Nov 2024, 03:51
Type | Values Removed | Values Added |
---|---|---|
References | () https://advisories.e2security.de/2018/E2SA-2018-01.txt - Exploit, Third Party Advisory | |
References | () https://seclists.org/bugtraq/2018/Oct/3 - Exploit, Mailing List, Third Party Advisory |
Information
Published : 2018-10-02 18:29
Updated : 2024-11-21 03:51
NVD link : CVE-2018-15753
Mitre link : CVE-2018-15753
CVE.ORG link : CVE-2018-15753
JSON object : View
Products Affected
mensamax
- mensamax
CWE
CWE-798
Use of Hard-coded Credentials