Vulnerabilities (CVE)

Filtered by vendor Stashcat Subscribe
Filtered by product Heinekingmedia
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2017-11130 1 Stashcat 1 Heinekingmedia 2019-10-03 6.8 MEDIUM 8.1 HIGH
An issue was discovered in heinekingmedia StashCat through 1.7.5 for Android, through 0.0.80w for Web, and through 0.0.86 for Desktop. The product's protocol only tries to ensure confidentiality. In the whole protocol, no integrity or authenticity checks are done. Therefore man-in-the-middle attackers can conduct replay attacks.
CVE-2017-11135 1 Stashcat 1 Heinekingmedia 2019-10-03 5.0 MEDIUM 7.5 HIGH
An issue was discovered in heinekingmedia StashCat through 1.7.5 for Android, through 0.0.80w for Web, and through 0.0.86 for Desktop. The logout mechanism does not check for authorization. Therefore, an attacker only needs to know the device ID. This causes a denial of service. This might be interpreted as a vulnerability in customer-controlled software, in the sense that the StashCat client side has no secure way to signal that it is ending a session and that data should be deleted.
CVE-2017-11133 1 Stashcat 1 Heinekingmedia 2017-08-07 5.0 MEDIUM 7.5 HIGH
An issue was discovered in heinekingmedia StashCat through 1.7.5 for Android, through 0.0.80w for Web, and through 0.0.86 for Desktop. To encrypt messages, AES in CBC mode is used with a pseudo-random secret. This secret and the IV are generated with math.random() in previous versions and with CryptoJS.lib.WordArray.random() in newer versions, which uses math.random() internally. This is not cryptographically strong.