A security researcher was able to compromise an Android application by invoking each of its exposed Activity components.
The issue, Trustwave’s Therese Mendoza explains, isn’t widespread, but it does exist and attackers could abuse it to cause Android apps to leak critical information that could then be abused for further compromise.

