HackApp vulnerability scanner discovered that application Neo Watch Face published at the βplayβ market has multiple vulnerabilities.
Other applications could access the interfaces.
Control of WebView context allows to access local files.
SD-cards and other external storages have 'worldwide read' policy.
WebView 'setJavaScriptEnabled(true)' could be exploited during cross-site scripting attacks.
Files created with these methods could be worldwide readable.
Are you sure these files should be here?
All items deleted with 'file.delete()' could be recovered.
Were do they point?
CPE | Name | Operator | Version |
---|---|---|---|
neo watch face | le | 1.3.3 |