The Ogaki Kyoritsu Bank Smartphone Passbook application 1.0.0 for Android creates a log file containing input data from the user, which allows attackers to obtain sensitive information by reading a file.
References
Link | Resource |
---|---|
http://jvn.jp/en/jp/JVN48659722/index.html | Vendor Advisory |
http://jvndb.jvn.jp/jvndb/JVNDB-2015-000016 | Vendor Advisory |
http://www.okb.co.jp/okdirect/sp_passbook/information01.html | Vendor Advisory |
http://jvn.jp/en/jp/JVN48659722/index.html | Vendor Advisory |
http://jvndb.jvn.jp/jvndb/JVNDB-2015-000016 | Vendor Advisory |
http://www.okb.co.jp/okdirect/sp_passbook/information01.html | Vendor Advisory |
Configurations
History
21 Nov 2024, 02:23
Type | Values Removed | Values Added |
---|---|---|
References | () http://jvn.jp/en/jp/JVN48659722/index.html - Vendor Advisory | |
References | () http://jvndb.jvn.jp/jvndb/JVNDB-2015-000016 - Vendor Advisory | |
References | () http://www.okb.co.jp/okdirect/sp_passbook/information01.html - Vendor Advisory |
Information
Published : 2015-02-15 02:59
Updated : 2025-04-12 10:46
NVD link : CVE-2015-0875
Mitre link : CVE-2015-0875
CVE.ORG link : CVE-2015-0875
JSON object : View
Products Affected
okb.co.jp
- smartphone_passbook
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor