Info Call to dynamic code loading API

Description

List of all dynamic code loading API calls in the application. Loading code from untrsuted sources could allow the execution of malicious code in the context of the current application.

Recommendation

This entry is informative, no recommendations applicable.

Technical details

Method com.logixal.fcdb.mobile.android.phone.a.a.b() calling method java.lang.System.getProperty()


    private String b(String p6)
    {
        StringBuilder v1_1 = new StringBuilder();
        String[] v2 = p6.split("\\|\\|");
        int v0_1 = 0;
        while (v0_1 < v2.length) {
            if (!v2[v0_1].contains("CCY@")) {
                v1_1.append(v2[v0_1]);
            } else {
                v1_1.append(com.logixal.fcdb.mobile.android.phone.a.a.a(com.logixal.fcdb.mobile.android.phone.a.a.a("CCY@", v2[v0_1]), v2[v0_1]));
            }
            if (v0_1 < (v2.length - 1)) {
                v1_1.append(System.getProperty("line.separator"));
            }
            v0_1++;
        }
        return v1_1.toString();
    }

Method com.ofss.fcdb.mobile.android.phone.a.a.b() calling method java.lang.System.getProperty()


    private String b(String p6)
    {
        StringBuilder v1_1 = new StringBuilder();
        String[] v2 = p6.split("\\|\\|");
        int v0_1 = 0;
        while (v0_1 < v2.length) {
            if (!v2[v0_1].contains("CCY@")) {
                v1_1.append(v2[v0_1]);
            } else {
                v1_1.append(com.ofss.fcdb.mobile.android.phone.a.a.a(com.ofss.fcdb.mobile.android.phone.a.a.a("CCY@", v2[v0_1]), v2[v0_1]));
            }
            if (v0_1 < (v2.length - 1)) {
                v1_1.append(System.getProperty("line.separator"));
            }
            v0_1++;
        }
        return v1_1.toString();
    }