Description
Due to lack of a security policy, the WARP Mobile Client (<=6.29) for Android was susceptible to this vulnerability which allowed a malicious app installed on a victim's device to exploit a peculiarity in an Android function, wherein under certain conditions, the malicious app could dictate the task behaviour of the WARP app.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-12322 | Due to lack of a security policy, the WARP Mobile Client (<=6.29) for Android was susceptible to this vulnerability which allowed a malicious app installed on a victim's device to exploit a peculiarity in an Android function, wherein under certain conditions, the malicious app could dictate the task behaviour of the WARP app. |
References
History
Mon, 30 Sep 2024 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: cloudflare
Published:
Updated: 2024-09-30T17:47:12.727Z
Reserved: 2023-01-12T11:58:45.802Z
Link: CVE-2023-0238
Updated: 2024-08-02T05:02:44.005Z
Status : Modified
Published: 2023-08-29T15:15:07.773
Modified: 2024-11-21T07:36:47.893
Link: CVE-2023-0238
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD