2 results (0.002 seconds)

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 2

TronLink Wallet 2.2.0 stores user wallet keystore in plaintext and places them in insecure storage. An attacker can read and reuse the user keystore of a valid user via /data/data/com.tronlink.wallet/shared_prefs/<wallet-name>.xml to gain unauthorized access. TronLink Wallet versión 2.2.0, guarda el almacén de claves (keystore) de la cartera del usuario en texto plano y los coloca en un almacenamiento no seguro. Un atacante puede leer y reutilizar el almacén de claves (keystore) de un usuario válido por medio de /data/data/com.tronlink.wallet/shared_prefs/(wallet-name).xml para conseguir acceso no autorizado. • https://pastebin.com/raw/08REmV1X https://pastebin.com/raw/J9B8Lh0j • CWE-312: Cleartext Storage of Sensitive Information •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 2

The user password via the registration form of TronLink Wallet 2.2.0 is stored in the log when the class CreateWalletTwoActivity is called. Other authenticated users can read it in the log later. The logged data can be read using Logcat on the device. When using platforms prior to Android 4.1 (Jelly Bean), the log data is not sandboxed per application; any application installed on the device has the capability to read data logged by other applications. La contraseña de usuario por medio del formulario de registro de TronLink Wallet versión 2.2.0 es almacenada en el registro cuando se llama a la clase CreateWalletTwoActivity. • https://pastebin.com/a5VhaxYn https://pastebin.com/raw/rVGbwSw0 • CWE-532: Insertion of Sensitive Information into Log File •