-
I have not queried or clicked anything using puppeteer, simply connected to the browser seems enough for cloudflare to block access to a site.
I have used the simplest possible example in puppeteer…
-
### Finding Description
We were able to decompile your application down to its java source code, which an attacker would be able to do as well.
This could allow access to any sensitive information co…
-
### Finding Description
Sensitive data was found to be contained within crypto calls. This finding is to show the presence of data being hashed or encrypted, but does not indicate an issue in using t…
-
### Finding Description
The application registers custom URL schemes in the `Info.plist` file.
Custom URL schemes can be used for deep linking within an application but are also frequently used to pa…
-
```
import undetected_chromedriver as uc
driver = uc.Chrome(headless=True,use_subprocess=False)
driver.get('https://nowsecure.nl')
driver.save_screenshot('nowsecure.png')
```
i tried this code…
-
it literally does nothing!
import undetected_chromedriver as uc
driver = uc.Chrome()
driver.get('https://nowsecure.nl')
>>>
python 3.9.9
Windows 10
-
### Finding Description
The application is not published on the Play Store suggesting that security updates are not applied automatically.
### Steps to Reproduce
This check determines if the app is…
-
### Finding Description
The application is vulnerable to Path Traversal attack, also known as Directory Traversal or Dot Dot Slash attacks. Traversal attacks within Android allow attackers to specify…
-
### Finding Description
The application was found to be using a vulnerable version of the OkHttp library.
This indicates that an attacker could bypass certificate pinning by sending a certificate cha…
-
### Finding Description
This static test pulls all the components declared in the Android Manifest along with their intent filters and permissions.
### Steps to Reproduce
This static test pulls all…