logo

Database

Security

Weaknesses

Explore standardized categories of recurring software weaknesses, that serve as a basis for the security analysis performed by Fluid Attacks. This catalog is an ever-evolving effort as new types arise every day.

Unexpected Injection

001

SQL injection - C Sharp SQL API

Dynamic SQL statements are generated without the required data validation and without using parameterized statements or stored procedures.

Remediation time: 15 min

Default score:

1.3

Low

Requirements:

169

/

173

Functionality Abuse

002

Asymmetric denial of service

The server is rendered unresponsive as a result of one of the following: - An amplification attack, which uses a single request to produce multiple responses. - A single malicious request that breaks the application or consumes an enormous amount of resources.

Remediation time: 60 min

Default score:

6.9

Medium

Requirements:

072

/

327

Functionality Abuse

003

Symmetric denial of service

The server is rendered unresponsive by successively repeating a request which consumes a lot of resources or takes too long to be processed.

Remediation time: 60 min

Default score:

6.6

Medium

Requirements:

072

/

327

Unexpected Injection

004

Remote command execution

The system builds OS commands using inputs that can be manipulated externally, it does not correctly neutralize special elements that could modify the OS command.

Remediation time: 30 min

Default score:

8.9

High

Requirements:

173

/

265

/

266

Access Subversion

005

Privilege escalation

Due to an insecure role configuration, it is possible to obtain administrative access or privileges using a standard user account.

Remediation time: 60 min

Default score:

6.6

Medium

Requirements:

035

Access Subversion

006

Authentication mechanism absence or evasion

The system lacks an authentication mechanism or has one that can be bypassed. Therefore, an attacker can access resources that should be protected without having an active session.

Remediation time: 60 min

Default score:

6.9

Medium

Requirements:

227

/

228

/

229

/

231

/

235

/

264

/

319

Access Subversion

007

Cross-site request forgery

The applications configuration allows an attacker to trick authenticated users into executing actions without their consent.

Remediation time: 30 min

Default score:

5.1

Medium

Requirements:

029

/

174

Unexpected Injection

008

Reflected cross-site scripting (XSS)

The web application dynamically generates web content without validating the source of the potentially untrusted data.

Remediation time: 45 min

Default score:

5.1

Medium

Requirements:

029

/

173

Information Collection

009

Sensitive information in source code

The source code repository contains sensitive information such as usernames, passwords, email addresses and IP addresses, among others. Alternatively, while values may be password=123 o aws.secret_key=test, they reveal the bad practice of storing sensitive information in the repository with no encryption, and sooner or later they can be replaced for real sensitive values.

Remediation time: 30 min

Default score:

1.3

Low

Requirements:

145

/

156

/

266

Unexpected Injection

010

Stored cross-site scripting (XSS)

It is possible to persistently inject JavaScript code into the application fields. This could allow an attacker to compromise the session of any user who enters the platform or to distribute malicious software.

Remediation time: 45 min

Default score:

4.8

Medium

Requirements:

029

/

173

Information Collection

011

Use of software with known vulnerabilities

The system uses the version of a software or dependency with known vulnerabilities.

Remediation time: 60 min

Default score:

1.3

Low

Requirements:

262

Unexpected Injection

012

SQL injection - Java Persistence API

Dynamic SQL statements are generated without the required data validation and without using parameterized statements or stored procedures. When using LIKE-conditions with values that are coming from a not secure source in the Java Persistence API, the values should be sanitized so they can't contain any wildcards and thereby allow attackers to select more data than they should be able to. For this purpose the escape(String) method is available.

Remediation time: 10 min

Default score:

5.7

Medium

Requirements:

169

/

173

Access Subversion

013

Insecure object reference

The systems authorization mechanism does not prevent one user from accessing another users data by modifying the key value that identifies it.

Remediation time: 60 min

Default score:

2.1

Low

Requirements:

176

Functionality Abuse

014

Insecure functionality

A functionality that is part of the system can be leveraged by an attacker in order to negatively impact it.

Remediation time: 60 min

Default score:

2.3

Low

Requirements:

266

Protocol Manipulation

015

Insecure authentication method - Basic

The server uses Basic authentication over an insecure channel.

Remediation time: 120 min

Default score:

2.1

Low

Requirements:

030

/

228

/

319

Information Collection

016

Insecure encryption algorithm - SSL/TLS

The server allows the usage of insecure TLS protocol versions.

Remediation time: 100 min

Default score:

1.2

Low

Requirements:

148

/

149

/

150

/

181

/

336

Information Collection

017

Sensitive information sent insecurely

The system sends sensitive information through a channel or method which does not guarantee its confidentiality or integrity.

Remediation time: 60 min

Default score:

5.3

Medium

Requirements:

032

/

181

Access Subversion

018

Improper authentication for shared folders

The folders that are shared over the network do not require any authentication to be accessed.

Remediation time: 60 min

Default score:

8.2

High

Requirements:

229

/

264

Information Collection

019

Administrative credentials stored in cache memory

It is possible to retrieve administrative credentials from the systems cache memory.

Remediation time: 30 min

Default score:

5.6

Medium

Requirements:

177

Information Collection

020

Non-encrypted confidential information

Confidential information is stored in plain text allowing an attacker to view it without any type of encryption.

Remediation time: 90 min

Default score:

2.1

Low

Requirements:

134

/

135

/

185

/

229

/

264

/

300

Unexpected Injection

021

XPath injection

Dynamic XPath statements are generated without the required data validation.

Remediation time: 60 min

Default score:

9.3

Critical

Requirements:

173

Information Collection

022

Use of an insecure channel

The system transmits information through a channel without encryption.

Remediation time: 15 min

Default score:

1.9

Low

Requirements:

181

Deceptive Interactions

023

Uncontrolled external site redirect - Host Header Injection

The server processes requests with the Host header set and redirects clients to any destination.

Remediation time: 10 min

Default score:

2.1

Low

Requirements:

173

/

324

Access Subversion

024

Unrestricted access between network segments - AWS

The infrastructure definition for network segments in the AWS context is too permissive.

Remediation time: 120 min

Default score:

1.2

Low

Requirements:

255

Information Collection

025

Call interception

It is possible to intercept calls made using the VoIP platform because the communication is not encrypted.

Remediation time: 60 min

Default score:

5.3

Medium

Requirements:

181

Information Collection

026

User enumeration

The system provides different responses for existent and non-existent users, allowing an attacker to enumerate valid users via error messages, response times, frames count, among other techniques.

Remediation time: 15 min

Default score:

6.9

Medium

Requirements:

225

Access Subversion

027

Insecure file upload

The system allows the upload of files with two extensions or with unsafe ones, such as .html, .php or .exe. Furthermore, the system does not validate whether or not the file is free from malicious code.

Remediation time: 30 min

Default score:

2.1

Low

Requirements:

040

/

041

Information Collection

028

Insecure temporary files

The system uses temporary files to store sensitive information. Alternatively, the system deploys sensitive temporary files to the production environment.

Remediation time: 30 min

Default score:

1.8

Low

Requirements:

036

/

177

System Manipulation

029

Inadequate file size control

The system does not perform an adequate control of the size of the files that can be uploaded to the server.

Remediation time: 30 min

Default score:

5.1

Medium

Requirements:

039

Information Collection

030

Sensitive information sent via URL parameters

The system sends sensitive information via URL parameters using the GET method. These parameters are: - Stored in clear text in the browser history. - Sent to external sites via the referrer HTTP header. - Sent to external sites via the search bar if the browser interprets the URL as a query. - Visible to scripts running on the browser that may belong to third-parties.

Remediation time: 60 min

Default score:

6.8

Medium

Requirements:

032

/

181

Access Subversion

031

Excessive privileges - AWS

The application, a user or a role have more privileges than they require. This can be leveraged by an attacker to execute normally restricted actions on a system.

Remediation time: 30 min

Default score:

1.3

Low

Requirements:

095

/

096

/

186

Deceptive Interactions

032

Spoofing

It is possible to perform actions in the application and make it look as if they were performed by the system or another user. Examples include sending messages that appear to come from the system and modifying data in the name of other users (who may have more privileges).

Remediation time: 45 min

Default score:

5.3

Medium

Requirements:

035

/

096

/

173

/

176

/

265

/

320

Functionality Abuse

033

Password change without identity check

The system allows a user to change their password without requesting the previous one or enforcing another identity verification mechanism.

Remediation time: 15 min

Default score:

5.1

Medium

Requirements:

238

Probabilistic Techniques

034

Insecure generation of random numbers

The system uses insecure functions, insufficient ranges or low-entropy components to generate random numbers. This could allow an attacker to guess the generation sequence after a short time or predict results using probabilistic methods.

Remediation time: 15 min

Default score:

1.3

Low

Requirements:

223

/

224

Probabilistic Techniques

035

Weak credential policy

The systems credential policy is not compliant with security regulations.

Remediation time: 30 min

Default score:

6.9

Medium

Requirements:

130

/

132

/

133

/

139

/

332

Information Collection

036

ViewState not encrypted

The state information of application forms that is stored in the ViewState is not encrypted.

Remediation time: 15 min

Default score:

2.1

Low

Requirements:

026

Information Collection

037

Technical information leak

It is possible to obtain technical information such as: - System component versions (HTTP headers, service banner, etc.) - Specific information about the configuration of server components (php.ini, web.config)

Remediation time: 60 min

Default score:

2.7

Low

Requirements:

077

/

176

Information Collection

038

Business information leak

It is possible to obtain business information, such as: - Username list - Strategic information - Employees information - Clients information - Providers information

Remediation time: 30 min

Default score:

6.9

Medium

Requirements:

176

/

177

/

261

/

300

Access Subversion

039

Improper authorization control for web services

The systems web services do not have an authorization control mechanism or the one in place can be bypassed.

Remediation time: 30 min

Default score:

6.9

Medium

Requirements:

096

/

176

/

265

/

320

Information Collection

040

Exposed web services

The systems WSDL file contains sensitive information and is exposed to a larger audience than required.

Remediation time: 30 min

Default score:

6.9

Medium

Requirements:

176

/

325

Probabilistic Techniques

041

Enabled default credentials

It is possible to use low-strength, default credentials to access system resources, such as the database.

Remediation time: 15 min

Default score:

7.1

High

Requirements:

142

Access Subversion

042

Insecurely generated cookies

The system does not set security attributes for sensitive cookies, which could cause them to be sent in plain text or disclosed by unauthorized users on the client side.

Remediation time: 15 min

Default score:

1.3

Low

Requirements:

029

Protocol Manipulation

043

Insecure or unset HTTP headers - Content-Security-Policy

The application has unsafe configurations regarding the Content-Security-Policy header. This may be because: - Header is missing from server responses. - The header has not defined mandatory security policies. - Defined security policies contain insecure values.

Remediation time: 15 min

Default score:

1.3

Low

Requirements:

062

/

117

/

175

/

349

Protocol Manipulation

044

Insecure HTTP methods enabled

HTTP methods such as TRACE, PUT and DELETE are enabled on the server. These methods may allow an attacker to include and/or delete files, or perform cross-site tracing attacks.

Remediation time: 15 min

Default score:

1.3

Low

Requirements:

266

Unexpected Injection

045

HTML code injection

The applications fields allow the injection of HTML code. This could enable attackers to modify the applications appearance in order to trick its users into performing undesired actions.

Remediation time: 60 min

Default score:

2.1

Low

Requirements:

173

Information Collection

046

Missing secure obfuscation - APK

It is possible to obtain source code of the application because it has not been obfuscated using a secure mechanism. This could allow an attacker to understand the inner workings of the application or get technical or sensitive information.

Remediation time: 120 min

Default score:

5.5

Medium

Requirements:

159

Information Collection

047

Automatic information enumeration

It is possible to automatically enumerate system information such as open ports, available services and users personal data.

Remediation time: 30 min

Default score:

5.3

Medium

Requirements:

237

/

266

/

327

Functionality Abuse

048

Lack of root detection

The application does not check whether the Android system on which it is running has been rooted.

Remediation time: 120 min

Default score:

5.1

Medium

Requirements:

326

Probabilistic Techniques

050

Guessed weak credentials

The system credentials low complexity considerably reduces the amount of time required to guess them. This allows an attacker to have quicker success when executing a brute force attack.

Remediation time: 15 min

Default score:

5.1

Medium

Requirements:

132

/

133

/

139

Access Subversion

051

Cracked weak credentials

The low complexity of the hashes stored in the database considerably reduces the amount of time required to crack them.

Remediation time: 30 min

Default score:

5.1

Medium

Requirements:

134

/

135

/

150

Information Collection

052

Insecure encryption algorithm

The application uses insecure encryption algorithms.

Remediation time: 30 min

Default score:

2.3

Low

Requirements:

148

/

149

/

150

/

181

/

336

Probabilistic Techniques

053

Lack of protection against brute force attacks

The system does not have appropriate protection mechanisms against automated attacks designed to guess credentials.

Remediation time: 300 min

Default score:

6.9

Medium

Requirements:

237

/

327

Information Collection

054

Exposed administrative services

One or more of the systems administration consoles are exposed (possibly on the internet), which may lead to unauthorized access attempts.

Remediation time: 120 min

Default score:

6.9

Medium

Requirements:

033

Functionality Abuse

055

Insecure service configuration - ADB Backups

The application allows backups via ADB (Android Debug Bridge). The backups performed by this functionality are not encrypted. Sensitive data of authenticated users can be included in the backup, and this data can be extracted by a non-authenticated attacker. Additionally, data can be copied into a USB stick and be moved out of the sphere of control of the application.

Remediation time: 60 min

Default score:

2

Low

Requirements:

185

/

266

Access Subversion

056

Anonymous connection

Due to an improper configuration of the server (e.g., an FTP service with username: anonymous and password: guest or an SMTP open relay), it is possible to make anonymous connections to it and access otherwise protected resources.

Remediation time: 30 min

Default score:

5.3

Medium

Requirements:

142

/

264

/

265

/

266

/

319

Access Subversion

057

Asymmetric denial of service - Content length

The Content-Length field specifies the size of the transmitted form of data after the request header. In an attack, the Content-Length field contains a very high value, meaning the server will expect to receive a large amount of data. The header of the spoofed request is then validly terminated, then an attacker waits and sends another small piece of data before the connection termination timer expires. In this way, the connection keeps dangerously active.

Remediation time: 60 min

Default score:

0.3

Low

Requirements:

072

/

327

Functionality Abuse

058

Debugging enabled in production - APK

The system has debugging enabled in the production environment, which can cause technical information leaks when an error occurs.

Remediation time: 15 min

Default score:

2.1

Low

Requirements:

077

/

078

Information Collection

059

Sensitive information stored in logs

The system stores sensitive information such as credentials, bank accounts and file paths in log files.

Remediation time: 30 min

Default score:

4.6

Medium

Requirements:

083

Functionality Abuse

060

Insecure service configuration - Host verification

The system does not properly restrict incoming connections from unknown external hosts.

Remediation time: 15 min

Default score:

2.1

Low

Requirements:

266

Functionality Abuse

061

Remote File Inclusion

The application allows to load and execute malicious files from remote locations. This practice may allow an attacker to retrieve sensitive data from the server or execute commands remotely.

Remediation time: 120 min

Default score:

5.3

Medium

Requirements:

173

/

265

/

266

Access Subversion

062

Concurrent sessions

The application does not validate the number of active sessions each user has, thus a user can login more than once at the same time. Furthermore, the application does not notify the user when a session has already been initiated nor when a second one commences from a different location.

Remediation time: 30 min

Default score:

5.3

Medium

Requirements:

025

Unexpected Injection

063

Lack of data validation - Path Traversal

The software uses external input to construct a pathname that is intended to identify a file or directory but it does not properly neutralize or validate special elements within the pathname.

Remediation time: 45 min

Default score:

5.5

Medium

Requirements:

173

/

320

/

342

Functionality Abuse

064

Traceability loss - Server's clock

The systems internal clock is not synced with NTP servers.

Remediation time: 30 min

Default score:

6.9

Medium

Requirements:

075

/

320

Functionality Abuse

065

Cached form fields

The application does not disable caching of input fields, thus the information will be stored in the browser's cache.

Remediation time: 15 min

Default score:

4.6

Medium

Requirements:

177

Information Collection

066

Technical information leak - Console functions

The application uses console functions: log, info, warning. The usage of these functions in productions environments may lead to information leakages and reveal vulnerable methods, technologies, or logic.

Remediation time: 15 min

Default score:

1.3

Low

Requirements:

077

/

176

Functionality Abuse

067

Improper resource allocation

The system allocates unnecessary resources due to the use of improper programming practices or inefficient algorithms. Alternatively, the allocation can be controlled by an external source (e.g., user input), and hence, requests that consume an enormous amount of resources are processed without any restriction.

Remediation time: 30 min

Default score:

6.9

Medium

Requirements:

072

/

158

/

164

/

173

Access Subversion

068

Insecure session expiration time

User sessions do not expire after 5 minutes of inactivity.

Remediation time: 60 min

Default score:

4.6

Medium

Requirements:

023

Information Collection

069

Weak CAPTCHA

The system uses an insecure CAPTCHA implementation that allows the usage of optical recognition tools to automatically pass it.

Remediation time: 30 min

Default score:

6.9

Medium

Requirements:

237

Functionality Abuse

070

Insecure service configuration - ELB

A misconfiguration or default setting on Elastic Load Balancers that can cause to unintentionally increase the attack surface of the company cloud infrastructure.

Remediation time: 60 min

Default score:

2

Low

Requirements:

266

Protocol Manipulation

071

Insecure or unset HTTP headers - Referrer-Policy

The server is missing the Referrer-Policy HTTP header. Alternatively, the headers configuration is unsafe.

Remediation time: 30 min

Default score:

1.1

Low

Requirements:

062

/

349

Functionality Abuse

073

Improper authorization control for web services - RDS

Some RDS instances can be publicly accessible, which can compromise the stored information.

Remediation time: 15 min

Default score:

5.5

Medium

Requirements:

096

/

176

/

265

Access Subversion

075

Unauthorized access to files - APK Content Provider

The Content Provider API allows third party applications installed in the device to retrieve data stored by the application. Access to this data must not be allowed to all applications by default. Instead, (and only if required) specific allow-lists must be used.

Remediation time: 30 min

Default score:

0.2

Low

Requirements:

096

/

176

/

264

/

320

Access Subversion

076

Insecure session management

The session token does not expire when the user terminates the session and can be used to post requests afterwards.

Remediation time: 60 min

Default score:

2.3

Low

Requirements:

030

/

031

/

141

System Manipulation

077

ARP spoofing

It is possible to supersede other MAC addresses in the network because the associated switch lacks protection mechanisms, such as PortSecurity.

Remediation time: 60 min

Default score:

6.6

Medium

Requirements:

062

/

273

Deceptive Interactions

078

Insecurely generated token

It is possible to crack the token's hash and obtain the information it is masking because it is not generated using a secure cryptographic mechanism.

Remediation time: 60 min

Default score:

2.9

Low

Requirements:

224

Functionality Abuse

079

Non-upgradable dependencies

Dependencies are not explicitly declared (name and version) within the source code. They are copied directly into the repositories.

Remediation time: 120 min

Default score:

0.6

Low

Requirements:

302

Information Collection

080

Business information leak - Customers or providers

Sensitive information such as customer or providers lists, emails, phone numbers or identifiers can be obtained from the application.

Remediation time: 30 min

Default score:

5.7

Medium

Requirements:

176

/

177

/

261

/

300

Access Subversion

081

Lack of multi-factor authentication

Critical services of the system, such as databases, shared resources containing sensitive information and web services, are not protected by a multi-factor authentication mechanism. This makes it easier for an attacker who has compromised a user's account to access those resources.

Remediation time: 15 min

Default score:

7.2

High

Requirements:

229

/

231

/

264

/

319

/

328

Information Collection

082

Insecurely deleted files

It is possible to retrieve deleted files with sensitive information because they were merely sent to the Recycle Bin or removed using insecure protocols.

Remediation time: 15 min

Default score:

1.2

Low

Requirements:

183

Unexpected Injection

083

XML injection (XXE)

It is possible to inject XML code into the application's requests, which is then interpreted by the server. This could allow an attacker to perform data exfiltration or execute commands remotely.

Remediation time: 60 min

Default score:

2.1

Low

Requirements:

173

Deceptive Interactions

084

MDNS spoofing

The configuration of the MDNS services allows an attacker to spoof IP addresses effectively hijacking them or causing a denial-of-service. Alternatively, due to a lack of certain security measures, it is possible to intercept requests to mDNS services and obtain information about the connected devices.

Remediation time: 60 min

Default score:

2.1

Low

Requirements:

062

/

273

Information Collection

085

Sensitive data stored in client-side storage

The application stores sensitive information in the client-side storage (localStorage or sessionStorage). This exposes the information to unauthorized read operations.

Remediation time: 120 min

Default score:

2.1

Low

Requirements:

177

/

329

Deceptive Interactions

086

Missing subresource integrity check

The application does not properly check the integrity of resources loaded from third-party servers.

Remediation time: 15 min

Default score:

1.3

Low

Requirements:

178

/

262

/

330

Functionality Abuse

087

Account lockout

It is possible to cause account lockouts, effectively blocking users from accessing the system.

Remediation time: 30 min

Default score:

6.9

Medium

Requirements:

226

Functionality Abuse

088

Privacy violation

The system violates one or more privacy requirements.

Remediation time: 300 min

Default score:

5.3

Medium

Requirements:

189

/

310

/

311

/

312

/

313

/

314

/

315

/

316

/

317

/

318

/

343

Unexpected Injection

089

Lack of data validation - Trust boundary violation

The system mixes trusted and untrusted data in the same data structure or structured message.

Remediation time: 45 min

Default score:

5.3

Medium

Requirements:

173

/

320

/

342

Unexpected Injection

090

CSV injection

It is possible to inject formulas into fields that are later exported as part of CSV files and can be interpreted by Excel.

Remediation time: 15 min

Default score:

4.8

Medium

Requirements:

173

System Manipulation

091

Log injection

The system logs entries that contain input from untrusted sources without properly validating, sanitizing or escaping their content.

Remediation time: 30 min

Default score:

2.9

Low

Requirements:

080

/

173

Information Collection

092

Insecure encryption algorithm - Anonymous cipher suites

The application allows connections with anonymous cipher suites.

Remediation time: 30 min

Default score:

8.7

High

Requirements:

148

/

149

/

150

/

181

/

336

Functionality Abuse

093

Hidden fields manipulation

It is possible to modify fields that are invisible to the regular user and cause undesired behaviors in the application.

Remediation time: 60 min

Default score:

2

Low

Requirements:

173

/

320

Information Collection

094

Insecure encryption algorithm - Cipher Block Chaining

The application uses algorithms with insecure cipher block chaining.

Remediation time: 30 min

Default score:

1.2

Low

Requirements:

148

/

149

/

150

/

181

/

336

Functionality Abuse

095

Data uniqueness not properly verified

The application does not properly validate the uniqueness of the data, allowing an attacker to reuse or regenerate information that should be valid for one use only.

Remediation time: 45 min

Default score:

5.3

Medium

Requirements:

134

/

135

/

185

/

227

/

229

/

264

/

300

Unexpected Injection

096

Insecure deserialization

The system deserializes objects without first validating their content nor casting them to a specific type.

Remediation time: 30 min

Default score:

2.9

Low

Requirements:

173

/

321

Deceptive Interactions

097

Reverse tabnabbing

The system allows the introduction of a link to an external site controlled by a malicious actor. This site can then redirect the user to a different site in the original tab, making it look like a legitimate redirect performed by the system.

Remediation time: 15 min

Default score:

4.8

Medium

Requirements:

173

/

324

Data Manipulation

098

External control of file name or path

It is possible to modify the path to which an uploaded file will be saved.

Remediation time: 30 min

Default score:

1.3

Low

Requirements:

037

/

320

Information Collection

099

Non-encrypted confidential information - S3 Server Side Encryption

Some S3 buckets do not explicitly enable the Server-Side-Encryption (SSE) property. So the stored objects are not encrypted at rest, exposing their content to leaks by attackers or unauthorized users.

Remediation time: 15 min

Default score:

5.7

Medium

Requirements:

134

/

135

/

185

/

227

/

229

/

264

/

300

Deceptive Interactions

100

Server-side request forgery (SSRF)

It is possible to induce the application's server into making requests to an arbitrary domain.

Remediation time: 120 min

Default score:

8.8

High

Requirements:

173

/

324

Functionality Abuse

101

Lack of protection against deletion

The system does not prevent critical objects from being deleted accidentally.

Remediation time: 15 min

Default score:

1.8

Low

Requirements:

186

/

265

Functionality Abuse

102

Email uniqueness not properly verified

The system allows the plus character in the email registration process. An attacker could abuse this feature to create several accounts pointing to the same email.

Remediation time: 60 min

Default score:

2.1

Low

Requirements:

121

Data Manipulation

103

Insufficient data authenticity validation - APK signing

The APK is not digitally signed.

Remediation time: 60 min

Default score:

2.9

Low

Requirements:

122

/

173

/

178

/

320