Vulnerabilities (CVE)

Filtered by vendor Tronlink Subscribe
Filtered by product Wallet
Total 2 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-13096 1 Tronlink 1 Wallet 2023-12-10 5.0 MEDIUM 9.8 CRITICAL
TronLink Wallet 2.2.0 stores user wallet keystore in plaintext and places them in insecure storage. An attacker can read and reuse the user keystore of a valid user via /data/data/com.tronlink.wallet/shared_prefs/<wallet-name>.xml to gain unauthorized access.
CVE-2019-13098 2 Google, Tronlink 2 Android, Wallet 2023-12-10 4.0 MEDIUM 6.5 MEDIUM
The user password via the registration form of TronLink Wallet 2.2.0 is stored in the log when the class CreateWalletTwoActivity is called. Other authenticated users can read it in the log later. The logged data can be read using Logcat on the device. When using platforms prior to Android 4.1 (Jelly Bean), the log data is not sandboxed per application; any application installed on the device has the capability to read data logged by other applications.