The Dino Village (aka com.tappocket.dinovillage) application 1.6 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
                
            References
                    | Link | Resource | 
|---|---|
| http://www.kb.cert.org/vuls/id/582497 | US Government Resource | 
| http://www.kb.cert.org/vuls/id/590153 | US Government Resource | 
| https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing | |
| http://www.kb.cert.org/vuls/id/582497 | US Government Resource | 
| http://www.kb.cert.org/vuls/id/590153 | US Government Resource | 
| https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing | 
Configurations
                    History
                    No history.
Information
                Published : 2014-10-16 19:55
Updated : 2025-04-12 10:46
NVD link : CVE-2014-6997
Mitre link : CVE-2014-6997
CVE.ORG link : CVE-2014-6997
JSON object : View
Products Affected
                itiw-webdev
- dino_village
CWE
                
                    
                        
                        CWE-310
                        
            Cryptographic Issues
