HackApp vulnerability scanner discovered that application 8anawat Arabic published at the βplayβ market has multiple vulnerabilities.
Were do they point?
All items deleted with 'file.delete()' could be recovered.
SD-cards and other external storages have 'worldwide read' policy.
Function 'Runtime.getRuntime().exec()' is used, please check where variables are come from.
CPE | Name | Operator | Version |
---|---|---|---|
8anawat arabic | le | 6.0 |