Lucene search

K

Itrackeasy Security Vulnerabilities

cve
cve

CVE-2016-6545

Session cookies are not used for maintaining valid sessions in iTrack Easy. The user's password is passed as a POST parameter over HTTPS using a base64 encoded passwd field on every request. In this implementation, sessions can only be terminated when the user changes the associated...

9.8CVSS

9.5AI Score

0.004EPSS

2018-07-13 08:29 PM
17
cve
cve

CVE-2016-6542

The iTrack device tracking ID number, also called "LosserID" in the web API, can be obtained by being in the range of an iTrack device. The tracker ID is the device's BLE MAC...

3.7CVSS

5.3AI Score

0.002EPSS

2018-07-13 08:29 PM
18
cve
cve

CVE-2016-6546

The iTrack Easy mobile application stores the account password used to authenticate to the cloud API in base64-encoding in the cache.db file. The base64 encoding format is considered equivalent to...

7.8CVSS

8.2AI Score

0.001EPSS

2018-07-13 08:29 PM
19