-
### Steps to reproduce
1. Use a static analyzer (like MobSF) on an exported ipa that uses SSZipArchive
### Expected behavior
No report
### Actual behavior
Binary makes use of the insecure…
-
Hi!
I noticed that V2 doesn't currently contain any requirements for:
- anti-bruteforce protection of authentication mechanisms
- re-authentication in regular intervals (so that users and/or…
-
### Finding Description
The WiFi IP address has been found within device logs.
Data written to device system logs can be accessed through several attack vectors. An attacker who is able to access th…
-
Research and track results of the following:
```
def email_md5(user):
- return hashlib.md5(user.email.lower().encode("utf-8")).hexdigest()
+ """Returns the hash of an email for the user"""
…
-
What about mentioning https://github.com/reddr/LibScout in 0x05i -> ## Checking for Weaknesses in Third Party Libraries (MSTG-CODE-5) ?
Let's verify its effectiveness first before including it.
-
**Platform:**
Android
**Description:**
I think it would be nice to add a testcase for checking that `setWebContentsDebuggingEnabled()` is enabled or not.
[Reference 1(blog.compass-security.com)](h…
-
### Finding Description
The app is allowing debuggable webviews. If an attacker gained access to an unlocked device, they can use those webviews to access data on the device. That data can even be in…
-
TD suggests STRIDE when adding threats to the data flow diagram, and one idea is that when one of STRIDE categories is suggested by TD, then the default description could have a link to the specific E…
-
### Finding Description
Broadcast receivers that are registered without specifying any permissions can potentially leak sensitive info to all other applications on the device. A malicious app install…
-
### Finding Description
The app uses a vulnerable version of the play-services-basement library.
The play-services-basement library in versions prior to 18.0.2 is affected by [CVE-2022-2390](https:/…