HackApp vulnerability scanner discovered that application Brilhante Victoria Jogos published at the βplayβ market has multiple vulnerabilities.
Were do they point?
Are you sure these files should be here?
All items deleted with 'file.delete()' could be recovered.
Control of WebView context allows to access local files.
Code for 'DexClassLoader' could be tampered.
WebView 'setJavaScriptEnabled(true)' could be exploited during cross-site scripting attacks.
This app uses self defined certificate verifier. If it is not properly configured it could allow attackers to do MITM attacks with their valid certificate without your knowledge.
Check certificate validation. Do not create or redefine X509Certificate class methods by yourself, if you don't understand risks. Use the existing API.
CPE | Name | Operator | Version |
---|---|---|---|
brilhante victoria jogos | le | 1.0 |