HackApp vulnerability scanner discovered that application CoPilot GPS - Navigation published at the βplayβ market has multiple vulnerabilities.
Base64 encoded string could include authentication credentials.
SD-cards and other external storages have 'worldwide read' policy.
WebView 'setJavaScriptEnabled(true)' could be exploited during cross-site scripting attacks.
Other applications could access the interfaces.
Control of WebView context allows to access local files.
These credentials could be used for authentication.
Can't parse these files. Corrupted? Check manually.
Are you sure these files should be here?
All items deleted with 'file.delete()' could be recovered.
Where do they point?
CPE | Name | Operator | Version |
---|---|---|---|
copilot gps - navigation | le | Varies with device |