HackApp vulnerability scanner discovered that application موسوعة الوضوء و الصلاة published at the ‘play’ market has multiple vulnerabilities.
WebView 'setJavaScriptEnabled(true)' could be exploited during cross-site scripting attacks.
It should be defined either exported:'true' or exported:'false' according your needs.
Control of WebView context allows to access local files.
Check VACUUM cleaning.
Code for 'DexClassLoader' could be tampered.
All items deleted with 'file.delete()' could be recovered.
Were do they point?