Knowledge Base - Issues

Our knowledge-base provides a comprehensive collection of information on vulnerabilities related to cyber security.
Application checks rooted device is an IT vulnerability that allows attackers to root a mobile device and gain access to the device. This vulnerability is classified as CWE-716: Create a User with Unrestricted Privileges. According to the OWASP Testing Guide, this vulnerability can occur in Android, iOS, and Mobile App...
Application implements anti-debug techniques (CWE-16) is a resiliency vulnerability that occurs when an application implements measures to detect when it is being debugged or reverse-engineered. This vulnerability is often found in mobile apps, specifically on iOS devices where the application can detect when a debugger is attached and can take...
Cordova debug mode enabled is an IT vulnerability that is categorized under Resiliency in the Common Weakness Enumeration (CWE) directory. It is a vulnerability that affects Android and Mobile App platforms. This vulnerability occurs when the debug mode for a Cordova application is enabled. This mode allows for the application...
Debug Symbols Present in the Application (CWE-599) is a vulnerability found in iOS and Mobile App software applications. This vulnerability occurs when debug symbols are left in the final application, which can be used by attackers to reverse engineer the application and discover vulnerabilities. As listed in the OWASP Testing...
IPA contains only bitcode is an IT vulnerability that affects iOS and Mobile App. It occurs when bitcode is uploaded to an IPA file without the source code. This vulnerability is listed in the CWE directory (CWE-1911) and is described in the OWASP Testing Guide as an insecure direct object...

/ Obfuscated Methods

Obfuscated methods is a type of resiliency vulnerability that occurs in mobile applications. It is defined in the CWE directory (CWE-600) as, “The software uses obfuscated methods to protect its code, data, or resources, but the obfuscation is not strong enough to prevent the code, data, or resources from being...
Root/Jailbreak detection is a type of IT vulnerability associated with mobile applications. This type of vulnerability, according to the Common Weakness Enumeration (CWE) directory, is classified as CWE-957 - Improper Control of Interaction Frequency. This type of vulnerability occurs when a mobile application does not adequately control the frequency of...
Showing entries 1 to 7 of 7 entries.