Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-46966: n/a

0
High
VulnerabilityCVE-2024-46966cvecve-2024-46966
Published: Mon Nov 11 2024 (11/11/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

The Ikhgur mn.ikhgur.khotoch (aka Video Downloader Pro & Browser) application through 1.0.42 for Android allows an attacker to execute arbitrary JavaScript code via the mn.ikhgur.khotoch.MainActivity component.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 07:33:12 UTC

Technical Analysis

CVE-2024-46966 is a critical vulnerability identified in the Ikhgur mn.ikhgur.khotoch Android application, also known as Video Downloader Pro & Browser, up to version 1.0.42. The flaw resides in the mn.ikhgur.khotoch.MainActivity component, which improperly handles JavaScript code execution, allowing attackers to inject and execute arbitrary JavaScript. This vulnerability is classified under CWE-94 (Improper Control of Generation of Code), indicating that the application fails to properly sanitize or restrict code input, leading to remote code execution capabilities. The vulnerability can be exploited remotely without requiring authentication (AV:N/PR:N), but it does require user interaction (UI:R), such as opening a malicious link or content within the app. The scope is unchanged (S:U), meaning the impact is limited to the vulnerable application context. The CVSS v3.1 base score is 8.1, reflecting high confidentiality and integrity impacts (C:H/I:H) but no impact on availability (A:N). This means attackers can potentially steal sensitive data or manipulate app behavior but cannot cause denial of service. No patches or fixes have been publicly disclosed yet, and no known exploits have been detected in the wild. The vulnerability poses a significant risk to users of this app, particularly on Android devices, and could be leveraged in targeted attacks or widespread exploitation once weaponized.

Potential Impact

The vulnerability allows attackers to execute arbitrary JavaScript code within the context of the vulnerable application, compromising the confidentiality and integrity of user data. This could lead to unauthorized access to sensitive information, session hijacking, or manipulation of app functionality. Since the vulnerability does not affect availability, denial-of-service attacks are unlikely. However, the ability to execute arbitrary code remotely without authentication significantly raises the risk of exploitation, especially if combined with social engineering to induce user interaction. Organizations relying on this app for video downloading or browsing on Android devices may face data breaches, loss of user trust, and potential regulatory consequences. The lack of a patch increases exposure time, and attackers could develop exploits to target users globally. The threat is particularly relevant for enterprises with BYOD policies or mobile workforces using this app, as well as individual users in regions where the app is popular.

Mitigation Recommendations

1. Immediately discontinue use of the vulnerable versions of the Ikhgur mn.ikhgur.khotoch app until a patched version is released. 2. Monitor official vendor channels and security advisories for updates or patches addressing CVE-2024-46966. 3. Restrict or disable JavaScript execution within the app if configurable, to reduce attack surface. 4. Educate users to avoid interacting with suspicious links or content within the app that could trigger the vulnerability. 5. Employ mobile device management (MDM) solutions to enforce app version controls and restrict installation of vulnerable apps. 6. Implement network-level protections such as web filtering and intrusion detection to identify and block malicious payloads targeting this vulnerability. 7. Conduct regular security audits on mobile applications used within the organization to identify and mitigate similar risks proactively. 8. Prepare incident response plans to quickly address potential exploitation attempts involving this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-09-16T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d06b7ef31ef0b56d507

Added to database: 2/25/2026, 9:43:34 PM

Last enriched: 2/28/2026, 7:33:12 AM

Last updated: 4/11/2026, 7:04:30 PM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses