HackApp vulnerability scanner discovered that application ParkTAG Social Parking published at the βplayβ market has multiple vulnerabilities.
Were do they point?
The app uses Android KeyStore subsystem.
Are you sure these files should be here?
All items deleted with 'file.delete()' could be recovered.
SD-cards and other external storages have 'worldwide read' policy.
Code for 'DexClassLoader' could be tampered.
Control of WebView context allows to access local files.
WebView 'setJavaScriptEnabled(true)' could be exploited during cross-site scripting attacks.
Other applications could access the interfaces.
Check certificate validation. Do not create or redefine X509Certificate class methods by yourself, if you don't understand risks. Use the existing API.
Everyone can use it to access your resources.
CPE | Name | Operator | Version |
---|---|---|---|
parktag social parking | le | 15.51.2 |