Knowledge Base - Issues

Our knowledge-base provides a comprehensive collection of information on vulnerabilities related to cyber security.

/ Abuse of Mobile Network Connection

Abuse of Mobile Network Connection is a configuration management vulnerability, which can occur in Android, iOS, and Mobile App applications. According to the CWE directory, this vulnerability occurs when the application connects to a mobile network to access services, but the data is not properly protected, allowing an attacker to...
AddJavaScriptInterface Remote Code Execution is a vulnerability in Android and mobile application that allows attackers to execute arbitrary code on the device. It is a type of Input Validation vulnerability, identified by the Common Weakness Enumeration (CWE) directory as CWE-494. It is also included in the OWASP Testing Guide, which...
Android Class Load Hijacking is a vulnerability that enables an attacker to gain control of a mobile application's runtime environment by exploiting the application's class loader. This vulnerability is identified in the Common Weakness Enumeration (CWE) directory as CWE-427 and is also described in the OWASP Testing Guide as a...
Android Class Loading Hijacking (CWE-919) is a vulnerability that affects the authorization process in Android and mobile app development. It is a type of vulnerability in which an attacker is able to exploit an application's class loading procedure to inject malicious code into the application. This malicious code can then...

/ APK Files List

APK files list is an Information Gathering vulnerability (CWE-200) that occurs in Mobile App and Android. It is a vulnerability that allows an attacker to view the list of installed applications on a user's device. This can be used in a variety of ways to gain further access to the...
Application checks rooted device is an IT vulnerability that allows attackers to root a mobile device and gain access to the device. This vulnerability is classified as CWE-716: Create a User with Unrestricted Privileges. According to the OWASP Testing Guide, this vulnerability can occur in Android, iOS, and Mobile App...
Application signed with an expired certificate is an authentication vulnerability that occurs when an application, such as an app on Android, iOS, or a Mobile App, is signed with an expired certificate, allowing users to execute a malicious application. This vulnerability has been identified in the Common Weakness Enumeration (CWE)...
Attribute hasFragileUserData not set is a vulnerability for Mobile App and Android applications found in the Common Weakness Enumeration (CWE) directory. It is categorized as a Platform Usage vulnerability. This vulnerability occurs when an application does not explicitly declare a sensitive user data attribute (e.g. username, password, etc.) so that...
Attribute requestLegacyExternalStorage set is a Configuration Management vulnerability, which usually occurs in Android and mobile applications. It is defined in the Common Weakness Enumeration (CWE) directory as "CWE-732: Incorrect Permission Assignment for Critical Resource". This means that the application does not assign the correct permissions to sensitive or critical resources,...

/ Attribute Usescleartexttraffic Set

Attribute usesCleartextTraffic set is a type of IT vulnerability that is classified as a Network Communication vulnerability. This vulnerability is present in both Android and Mobile App systems, as well as in other similar systems. According to the CWE/SANS TOP 25 Most Dangerous Software Errors directory, this vulnerability occurs when...

/ Backup Mode Disabled

Backup mode disabled is a vulnerability within the Configuration Management category of the Common Weakness Enumeration (CWE-16). It is related to a lack of secure configuration management, where the configuration of a system is not set up correctly. This can lead to the system becoming vulnerable to attack. Specifically, the...
Broadcast receiver dynamic registration is a type of authorization vulnerability that occurs in mobile applications and Android operating systems. This vulnerability occurs when an application registers a broadcast receiver dynamically, and does not properly control the intent filters (CWE-284). This can lead to an attacker sending a malicious intent to...
Call to dynamic code loading API is a type of authorization vulnerability that affects Android, iOS and Mobile Apps. This vulnerability allows attackers to bypass authentication measures, such as user accounts, by loading code into the application dynamically. This type of attack is classified as CWE-285 (Improper Authorization) according to...
Cordova Cross-site Scripting (XSS) is a type of vulnerability classified by CWE-79, Cross-site Scripting, which occurs in Android, iOS, and Mobile App platforms. XSS vulnerabilities occur when an application or webpage does not sanitize user input properly, allowing malicious code to be executed as part of the application. This type...
Cordova debug mode enabled is an IT vulnerability that is categorized under Resiliency in the Common Weakness Enumeration (CWE) directory. It is a vulnerability that affects Android and Mobile App platforms. This vulnerability occurs when the debug mode for a Cordova application is enabled. This mode allows for the application...

/ Credentials Exposed in Logs

Credentials exposed in logs is a type of Information Leakage vulnerability. This vulnerability occurs when a mobile app, for either iOS or Android, transmits sensitive data such as login credentials in an insecure format, usually in plaintext, over an insecure network. This type of vulnerability is listed in the CWE...

/ Dependency Confusion

Dependency Confusion is a type of authorization vulnerability where an attacker can use a form of name confusion to insert malicious code into a system. Dependency Confusion occurs when an application looks for a dependency library with a specific name, and an attacker is able to manipulate the library search...

/ Facebook SDK Debug Mode Enabled

Facebook SDK debug mode enabled is a configuration management vulnerability (CWE-732) that affects Android, iOS and Mobile App software. This vulnerability occurs when the debug mode of the Facebook SDK is enabled, which allows attackers to bypass security measures, modify data, and take control of the application. Reference to the...
Insecure File Provider Paths Setting is a vulnerability categorized as an Input Validation vulnerability (CWE-20) that occurs in Android and Mobile App ecosystems. This vulnerability can allow attackers to access files on a device through file provider paths that are not properly configured. It can also allow attackers to manipulate...
Insecure Filesystem Access is a type of authorization vulnerability that occurs when an application does not restrict access to the filesystem of a device, such as a computer or mobile phone. This type of vulnerability can be exploited by malicious actors to access files stored on the device, including confidential...
Insecure hostname validation check (CWE-295) is a type of input validation vulnerability that occurs when an application or system does not properly validate the hostname of requests from a client. This vulnerability is common in mobile applications (iOS and Android) and can lead to man-in-the-middle attacks. According to the OWASP...

/ Insecure Password Storage

Insecure password storage is a vulnerability of the Identity Management CWE-257 category, which occurs in Android, iOS and Mobile App. It is defined as the lack of encryption and secure storage of user credentials, such as passwords, on client systems. This can allow attackers to gain access to sensitive user...
Insecure Shared Preferences Permissions is a type of Authorization vulnerability as identified in the Common Weakness Enumeration (CWE) directory that affects Android and Mobile App systems. It occurs when access to shared preferences is misconfigured, allowing malicious actors to access and modify shared preferences without authentication or authorization. This can...

/ Insecure Whitelist

Insecure whitelist is a common configuration management vulnerability, listed as CWE-759, which occurs when an application or system incorrectly implements a whitelisting process. This vulnerability is common in Android, iOS and Mobile App environments and can be used to bypass authentication and authorization controls. According to the OWASP Testing Guide,...

/ Insecure Whitelist Configuration

Insecure whitelist configuration is a type of vulnerability in Configuration Management that allows an attacker to access a system by bypassing a whitelist. This vulnerability is registered in the Common Weakness Enumeration (CWE) directory as CWE-639. It is also described in the OWASP Testing Guide. This vulnerability affects Android, iOS,...
No sensitive data stored outside App is a vulnerability (CWE-311) that can arise when an application does not properly secure the data that it stores on remote systems or out of its own scope. This can lead to data theft or data leakage to malicious actors. The vulnerability can occur...

/ Notification Spoofing

Notification spoofing is an authorization vulnerability which occurs when a malicious user impersonates another user or an application and sends an unauthorized notification. This type of attack is usually done by sending a malicious notification to a user or application, often in order to gain access to sensitive data or...

/ Port Open on Localhost

Port open on localhost is a vulnerability that allows attackers to connect to the localhost of a system and exploit it. It is commonly found on Android, iOS, and mobile applications. This vulnerability has been assigned the Common Weakness Enumeration (CWE) identifier CWE-22. The Open Web Application Security Project (OWASP)...
Protected Health Information (PHI) is personal health information that is subject to specific laws and regulations to protect the privacy of individuals. It includes medical history, diagnosis and treatment information, personal information such as name and address, and financial information. The vulnerability occurs when PHI is stored on a mobile...
Recorded calls to dangerous WebView settings API is a vulnerability in Android and Mobile App that allows attackers to record audio on the device without authorization. This vulnerability is categorized as an Authorization vulnerability and is identified by the Common Weakness Enumeration (CWE) as CWE-284. According to the OWASP Testing...
## Description Secure Network Configuration Settings is a vulnerability that occurs when mobile apps or devices, such as those running Android, fail to properly configure the network settings. According to the Common Weakness Enumeration (CWE) directory, this vulnerability is classified under CWE-327, which is defined as "Inadequate Encryption Strength". The Open...
Services declared without permissions is a vulnerability of the Authorization category (CWE-285) which affects Android and Mobile App systems. It occurs when an application declares a service in its AndroidManifest.xml file, but does not assign a permission to access the service. This can allow any application to access the service,...

/ Task Hijacking

Task Hijacking is an authorization vulnerability that occurs in Android and Mobile App. It is a type of privilege escalation that allows an attacker to access or manipulate a user’s tasks or threads. This vulnerability is listed in the Common Weakness Enumeration (CWE) directory under ID CWE-270. The OWASP Testing...

/ Undeclared Permissions

Undeclared Permissions is a type of Authorization vulnerability that occurs in Android or a mobile app. This vulnerability occurs when an application requests permissions that are not declared in the manifest file. According to the Common Weakness Enumeration (CWE) directory, this vulnerability falls under CWE-284: Improper Access Control. The OWASP...
Untrusted External Storage File Access is a type of Authorization vulnerability (CWE-862) where an application fails to properly verify the access permissions of external storage files, allowing an attacker to access or modify the data without proper authorization. This is an issue that particularly affects Android and mobile application users,...
Unused permissions (overprivileged) is an authorization vulnerability in Android and mobile apps, where the application has been granted more permissions than it requires for its intended purpose. This type of vulnerability is classified under CWE-284, Improper Access Control, and is described in the OWASP Testing Guide as “Application is granted...
Use of an insecure Bluetooth connection is a network communication vulnerability (CWE-18) that affects Android, iOS and Mobile App platforms. According to the OWASP Testing Guide, this vulnerability occurs when an application uses an insecure Bluetooth connection to communicate with devices or other applications. This can lead to the leakage...

/ Use of Deprecated Component

Use of Wifi API that contains or leaks sensitive PII is a vulnerability categorized in the Common Weakness Enumeration (CWE) directory as CWE-918: Server-Side Request Forgery (SSRF). This vulnerability exists within Android and Mobile App, where the application and its API are susceptible to leaking sensitive personally identifiable information (PII)....

/ Webview Loadurl Injection

Webview loadurl injection is a type of Input Validation vulnerability as defined by the Common Weakness Enumeration (CWE) directory. It is an attack that allows malicious code to be injected into a web view component, which is used to display web content in mobile apps. This type of attack is...

/ Webview Remote Debugging Enabled

Webview Remote Debugging Enabled is a type of configuration management vulnerability listed in the CWE directory as CWE-91. It is related to the OWASP Testing Guide as it can be exploited by malicious actors to gain access to sensitive data. This vulnerability is most commonly found in Android and Mobile...
Showing entries 1 to 42 of 42 entries.