HackApp vulnerability scanner discovered that application DaOffice Chat published at the βplayβ market has multiple vulnerabilities.
Files created with these methods could be worldwide readable.
The app should be compliant with open source license requirements.
Check certificate validation. Do not create or redefine X509Certificate class methods by yourself, if you don't understand risks. Use the existing API.
Other applications could access the interfaces.
SD-cards and other external storages have 'worldwide read' policy.
The app uses Android KeyStore subsystem.
All items deleted with 'file.delete()' could be recovered.
Were do they point?
Are you sure these files should be here?
CPE | Name | Operator | Version |
---|---|---|---|
daoffice chat | le | 3.1.0 |