HackApp vulnerability scanner discovered that application لمسة : قصص و ألعاب أطفال عربية published at the ‘play’ market has multiple vulnerabilities.
Other applications could access the interfaces.
WebView 'setJavaScriptEnabled(true)' could be exploited during cross-site scripting attacks.
SD-cards and other external storages have 'worldwide read' policy.
Control of WebView context allows to access local files.
Function 'Runtime.getRuntime().exec()' is used, please check where variables are come from.
Files created with these methods could be worldwide readable.
Exported ContentProvider is available to other apps.
The app should be compliant with open source license requirements.
WebView 'addJavascriptInterface' could be used to control the host app with JavaScript bindings. Remote Code Execution (RCE) is possible.
Are you sure these files should be here?
Where do they point?
All items deleted with 'file.delete()' could be recovered.
This app is looking for root tools.