CVE-2024-46964: n/a
The com.video.downloader.all (aka All Video Downloader) application through 11.28 for Android allows an attacker to execute arbitrary JavaScript code via the com.video.downloader.all.StartActivity component.
AI Analysis
Technical Summary
CVE-2024-46964 is a code injection vulnerability affecting the All Video Downloader Android application (com.video.downloader.all) through version 11.28. The flaw resides in the StartActivity component, which improperly handles input, allowing an attacker to inject and execute arbitrary JavaScript code. This vulnerability falls under CWE-94, indicating improper control over code generation or execution. The attack vector is network-based (AV:N), requiring no privileges (PR:N) but does require user interaction (UI:R), such as clicking a malicious link or opening crafted content. The scope is unchanged (S:U), meaning the impact is limited to the vulnerable application context. The CVSS 3.1 base score is 8.1, reflecting high impact on confidentiality and integrity (C:H/I:H) but no impact on availability (A:N). Exploiting this vulnerability could allow attackers to steal sensitive information, manipulate app behavior, or perform further malicious actions within the app context. No patches or fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability is significant for Android users who have installed this app, especially in environments where sensitive data is handled or where the app is widely used.
Potential Impact
The primary impact of CVE-2024-46964 is the potential compromise of user confidentiality and integrity. Attackers can execute arbitrary JavaScript code, which may lead to data theft, session hijacking, or unauthorized actions within the app. This could expose personal user data, credentials, or other sensitive information stored or processed by the app. Although availability is not affected, the breach of confidentiality and integrity can have severe consequences, including identity theft, fraud, or further compromise of the device if the malicious code escalates privileges or exploits other vulnerabilities. Organizations relying on this app for video downloading or content management on Android devices face risks of data leakage and loss of user trust. The requirement for user interaction somewhat limits exploitation but does not eliminate risk, especially in phishing or social engineering scenarios. The lack of a patch increases exposure time, raising the likelihood of future exploitation.
Mitigation Recommendations
1. Immediately monitor for updates or patches from the application developer and apply them as soon as they become available. 2. Until a patch is released, restrict or block the use of the All Video Downloader app in enterprise environments, especially on devices handling sensitive data. 3. Educate users about the risks of interacting with untrusted links or content that could trigger the vulnerability. 4. Employ mobile device management (MDM) solutions to control app installations and enforce security policies. 5. Use application sandboxing or runtime application self-protection (RASP) technologies to limit the impact of injected code. 6. Conduct regular security assessments on mobile apps used within the organization to detect similar vulnerabilities proactively. 7. Monitor network traffic for suspicious activity related to the app’s communication patterns that could indicate exploitation attempts. 8. Encourage users to uninstall the vulnerable app if it is not essential or replace it with a more secure alternative.
Affected Countries
United States, India, Brazil, Indonesia, Russia, Mexico, Germany, United Kingdom, France, South Africa, Nigeria, Philippines, Vietnam, Turkey, Argentina
CVE-2024-46964: n/a
Description
The com.video.downloader.all (aka All Video Downloader) application through 11.28 for Android allows an attacker to execute arbitrary JavaScript code via the com.video.downloader.all.StartActivity component.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-46964 is a code injection vulnerability affecting the All Video Downloader Android application (com.video.downloader.all) through version 11.28. The flaw resides in the StartActivity component, which improperly handles input, allowing an attacker to inject and execute arbitrary JavaScript code. This vulnerability falls under CWE-94, indicating improper control over code generation or execution. The attack vector is network-based (AV:N), requiring no privileges (PR:N) but does require user interaction (UI:R), such as clicking a malicious link or opening crafted content. The scope is unchanged (S:U), meaning the impact is limited to the vulnerable application context. The CVSS 3.1 base score is 8.1, reflecting high impact on confidentiality and integrity (C:H/I:H) but no impact on availability (A:N). Exploiting this vulnerability could allow attackers to steal sensitive information, manipulate app behavior, or perform further malicious actions within the app context. No patches or fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability is significant for Android users who have installed this app, especially in environments where sensitive data is handled or where the app is widely used.
Potential Impact
The primary impact of CVE-2024-46964 is the potential compromise of user confidentiality and integrity. Attackers can execute arbitrary JavaScript code, which may lead to data theft, session hijacking, or unauthorized actions within the app. This could expose personal user data, credentials, or other sensitive information stored or processed by the app. Although availability is not affected, the breach of confidentiality and integrity can have severe consequences, including identity theft, fraud, or further compromise of the device if the malicious code escalates privileges or exploits other vulnerabilities. Organizations relying on this app for video downloading or content management on Android devices face risks of data leakage and loss of user trust. The requirement for user interaction somewhat limits exploitation but does not eliminate risk, especially in phishing or social engineering scenarios. The lack of a patch increases exposure time, raising the likelihood of future exploitation.
Mitigation Recommendations
1. Immediately monitor for updates or patches from the application developer and apply them as soon as they become available. 2. Until a patch is released, restrict or block the use of the All Video Downloader app in enterprise environments, especially on devices handling sensitive data. 3. Educate users about the risks of interacting with untrusted links or content that could trigger the vulnerability. 4. Employ mobile device management (MDM) solutions to control app installations and enforce security policies. 5. Use application sandboxing or runtime application self-protection (RASP) technologies to limit the impact of injected code. 6. Conduct regular security assessments on mobile apps used within the organization to detect similar vulnerabilities proactively. 7. Monitor network traffic for suspicious activity related to the app’s communication patterns that could indicate exploitation attempts. 8. Encourage users to uninstall the vulnerable app if it is not essential or replace it with a more secure alternative.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-09-16T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6d06b7ef31ef0b56d4ff
Added to database: 2/25/2026, 9:43:34 PM
Last enriched: 2/28/2026, 7:32:37 AM
Last updated: 4/12/2026, 5:08:29 PM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.