HackApp vulnerability scanner discovered that application Tabu Buzzer App published at the βplayβ market has multiple vulnerabilities.
Are you sure these files should be here?
This app is looking for root tools.
Where do they point?
All items deleted with 'file.delete()' could be recovered.
Files created with these methods could be worldwide readable.
The app uses Android KeyStore subsystem with hardcoded authentication.
Everyone can use it to access your resources.
Code for 'DexClassLoader' could be tampered.
SD-cards and other external storages have 'worldwide read' policy.
WebView 'setJavaScriptEnabled(true)' could be exploited during cross-site scripting attacks.
Control of WebView context allows to access local files.
CPE | Name | Operator | Version |
---|---|---|---|
tabu buzzer app | le | 1.0.0 |