HackApp vulnerability scanner discovered that application T Truck Simulator published at the βplayβ market has multiple vulnerabilities.
SD-cards and other external storages have 'worldwide read' policy.
WebView 'setJavaScriptEnabled(true)' could be exploited during cross-site scripting attacks.
Code for 'DexClassLoader' could be tampered.
Control of WebView context allows to access local files.
Were do they point?
Are you sure these files should be here?
Native code (.so) usage 'System.loadLibrary();' is found.
All items deleted with 'file.delete()' could be recovered.
CPE | Name | Operator | Version |
---|---|---|---|
t truck simulator | le | 1.1 |