Lucene search

K
hackappHackapp.orgHACKAPP:SMILEYS.WHATSAPP.STICKERS.MSN.APK
HistoryApr 01, 2016 - 8:54 a.m.

Smileys whats App - Dynamic Code Loading, External URLs, SD-card access vulnerabilities

2016-04-0108:54:41
Hackapp.org
hackapp.com
8

HackApp vulnerability scanner discovered that application Smileys whats App published at the β€˜play’ market has multiple vulnerabilities.

Name

Smileys whats App

Vendor

Ringtones Sound

Link

SMILEYS.WHATSAPP.STICKERS.MSN.APK

Store

play

Version

1.0.06
  • NOTICE
  • Unsafe deleting

    All items deleted with 'file.delete()' could be recovered.

  • External URLs

    Were do they point?

  • Suspicious files

    Are you sure these files should be here?

  • MEDIUM
  • WebView files access

    Control of WebView context allows to access local files.

  • WebView JavaScript enabled

    WebView 'setJavaScriptEnabled(true)' could be exploited during cross-site scripting attacks.

  • Dynamic Code Loading

    Code for 'DexClassLoader' could be tampered.

  • SD-card access

    SD-cards and other external storages have 'worldwide read' policy.

CPENameOperatorVersion
smileys whats apple1.0.06