Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-46960: n/a

0
High
VulnerabilityCVE-2024-46960cvecve-2024-46960
Published: Thu Nov 07 2024 (11/07/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

The ASD com.rocks.video.downloader (aka HD Video Downloader All Format) application through 7.0.129 for Android allows an attacker to execute arbitrary JavaScript code via the com.rocks.video.downloader.MainBrowserActivity component.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 07:31:41 UTC

Technical Analysis

CVE-2024-46960 is a critical vulnerability identified in the Android application 'HD Video Downloader All Format' (package name com.rocks.video.downloader) through version 7.0.129. The flaw exists in the MainBrowserActivity component, which improperly handles JavaScript code execution, allowing an attacker to inject and execute arbitrary JavaScript. This is classified under CWE-94 (Improper Control of Generation of Code), indicating that the application fails to properly sanitize or restrict JavaScript inputs. The vulnerability can be exploited remotely without requiring any privileges or authentication, but it does require user interaction, such as visiting a maliciously crafted URL or content that triggers the vulnerable component. Successful exploitation can lead to full compromise of the device’s confidentiality, integrity, and availability, as the attacker can execute arbitrary code within the context of the app, potentially escalating privileges or accessing sensitive data. The CVSS v3.1 base score is 8.8 (high), reflecting the ease of exploitation (network vector, low attack complexity), lack of required privileges, and the severe impact on confidentiality, integrity, and availability. No patches or updates have been publicly released at the time of this analysis, and no known exploits are currently observed in the wild. The vulnerability poses a significant risk to users of this app, especially on Android devices where the app is installed and used for video downloading purposes.

Potential Impact

The impact of CVE-2024-46960 is substantial for organizations and individuals using the affected Android application. Exploitation can lead to arbitrary code execution, enabling attackers to steal sensitive information, manipulate or delete data, and disrupt device functionality. For enterprises, this could mean exposure of corporate data on employee devices, unauthorized access to internal networks if the device is connected, and potential lateral movement within corporate environments. The vulnerability could also be leveraged for phishing or delivering further malware payloads. Given the app’s function as a video downloader, users may be tricked into visiting malicious URLs or content that triggers the exploit. The lack of required privileges for exploitation increases the attack surface, making it easier for attackers to target a wide range of users. The absence of patches means that until a fix is released, users remain vulnerable. This could lead to reputational damage, financial loss, and operational disruption for affected organizations.

Mitigation Recommendations

1. Immediately discontinue use of the affected versions of the 'HD Video Downloader All Format' app until a security patch is released. 2. Monitor official sources and app stores for updates or patches addressing CVE-2024-46960 and apply them promptly once available. 3. Educate users about the risks of interacting with untrusted URLs or content within the app, emphasizing caution with links and downloads. 4. Employ mobile device management (MDM) solutions to restrict installation of unapproved or vulnerable applications on corporate devices. 5. Implement network-level protections such as web filtering and DNS filtering to block access to known malicious domains that could host exploit payloads. 6. Use endpoint detection and response (EDR) tools on Android devices where possible to detect anomalous behaviors indicative of exploitation. 7. Review app permissions and limit the app’s access to sensitive data and device capabilities to reduce potential damage. 8. Encourage users to maintain updated Android OS versions to benefit from platform-level security enhancements. 9. Conduct regular security awareness training focusing on mobile threats and social engineering tactics that could facilitate exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-09-16T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d06b7ef31ef0b56d4f1

Added to database: 2/25/2026, 9:43:34 PM

Last enriched: 2/28/2026, 7:31:41 AM

Last updated: 4/12/2026, 5:11:26 PM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses