Juiker app stores debug logs which contains sensitive information to mobile external storage. An unauthenticated physical attacker can access these files to acquire partial user information such as personal contacts.
Max CVSS
2.4
EPSS Score
0.05%
Published
2023-03-27
Updated
2023-07-21
Juiker app hard-coded its AES key in the source code. A physical attacker, after getting the Android root privilege, can use the AES key to decrypt users’ ciphertext and tamper with it.
Max CVSS
6.1
EPSS Score
0.06%
Published
2022-10-24
Updated
2022-10-25
The Juiker (aka org.itri) application 3.2.0829.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
Max CVSS
5.4
EPSS Score
0.05%
Published
2014-09-24
Updated
2014-10-04
3 vulnerabilities found