Submeter #615253: Aftership(https://www.aftership.com/mobile-app) AfterShip 5.24.1 Task Hijackinginformação

TítuloAftership(https://www.aftership.com/mobile-app) AfterShip 5.24.1 Task Hijacking
DescriçãoTask Hijacking allows malicious apps to inherit permissions of vulnerable apps and is usually used for phishing login credentials of victims,its used by malicious actors to manipulate or take over tasks in Android, leading to significant vulnerabilities, This vulnerability applies to all Android versions before Android 11. The AndroidManifest.xml configuration needs to be modified to mitigate this attack.
Fonte⚠️ https://github.com/KMov-g/androidapps/blob/main/com.aftership.AfterShip.md
Utilizador
 fxizenta (UID 28116)
Submissão13/07/2025 09h29 (há 10 meses)
Moderação19/08/2025 07h20 (1 month later)
EstadoAceite
Entrada VulDB320514 [AfterShip Package Tracker App até 5.24.1 em Android com.aftership.AfterShip AndroidManifest.xml Local Privilege Escalation]
Pontos19

Might our Artificial Intelligence support you?

Check our Alexa App!