Vulnerabilities > Ireadercity

DATE CVE VULNERABILITY TITLE RISK
2014-10-20 CVE-2014-7591 Cryptographic Issues vulnerability in Ireadercity Demon 3.0.2
The Demon (aka com.ireadercity.c24) application 3.0.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
5.4
2014-10-20 CVE-2014-7509 Cryptographic Issues vulnerability in Ireadercity A Very Short History of Japan 3.0.2
The A Very Short History of Japan (aka com.ireadercity.c51) application 3.0.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
5.4
2014-10-20 CVE-2014-7499 Cryptographic Issues vulnerability in Ireadercity Sword 3.0.2
The Sword (aka com.ireadercity.c25) application 3.0.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
5.4
2014-10-20 CVE-2014-7493 Cryptographic Issues vulnerability in Ireadercity 100 Books 3.0.2
The 100 Books (aka com.ireadercity.c20) application 3.0.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
5.4
2014-10-20 CVE-2014-7491 Cryptographic Issues vulnerability in Ireadercity Short Stories 3.0.2
The Short Stories (aka com.ireadercity.c48) application 3.0.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
5.4
2014-10-19 CVE-2014-7084 Cryptographic Issues vulnerability in Ireadercity Hesheng 80 3.0.2
The Hesheng 80 (aka com.ireadercity.c29) application 3.0.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
5.4