导航菜单

应用安全检测报告

应用安全检测报告,支持文件搜索、内容检索和AI代码分析

移动应用安全检测报告

应用图标

Uptodown App Store v6.80

Android APK 195a7e92...
50
安全评分

安全基线评分

50/100

低风险

综合风险等级

风险等级评定
  1. A
  2. B
  3. C
  4. F

应用存在一定安全风险,建议优化

漏洞与安全项分布

4 高危
27 中危
2 信息
3 安全

隐私风险评估

5
第三方跟踪器

高隐私风险
检测到大量第三方跟踪器


检测结果分布

高危安全漏洞 4
中危安全漏洞 27
安全提示信息 2
已通过安全项 3
重点安全关注 0

高危安全漏洞 App 链接 assetlinks.json 文件未找到

[android:name=com.uptodown.activities.MainActivity][android:host=https://dw.uptodown.com]
App Link 资产验证 URL(https://dw.uptodown.com/.well-known/assetlinks.json)未找到或配置不正确。(状态码:404)。应用程序链接允许用户通过 Web URL 或电子邮件直接跳转到移动应用。如果 assetlinks.json 文件缺失或主机/域配置错误,恶意应用可劫持此类 URL,导致网络钓鱼攻击,泄露 URI 中的敏感信息(如 PII、OAuth 令牌、魔术链接/重置令牌等)。请务必通过托管 assetlinks.json 文件并在 Activity 的 intent-filter 中设置 [android:autoVerify="true"] 来完成 App Link 域名验证。

高危安全漏洞 该文件是World Readable。任何应用程序都可以读取文件

该文件是World Readable。任何应用程序都可以读取文件
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Testing-Data-Storage.md#testing-local-storage-for-sensitive-data-mstg-storage-1-and-mstg-storage-2

Files:
com/uptodown/activities/preferences/a.java, line(s) 91

高危安全漏洞 如果一个应用程序使用WebView.loadDataWithBaseURL方法来加载一个网页到WebView,那么这个应用程序可能会遭受跨站脚本攻击

如果一个应用程序使用WebView.loadDataWithBaseURL方法来加载一个网页到WebView,那么这个应用程序可能会遭受跨站脚本攻击
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05h-Testing-Platform-Interaction.md#static-analysis-7

Files:
com/mbridge/msdk/click/m.java, line(s) 191,15,16
com/mbridge/msdk/mbbanner/common/communication/BannerExpandDialog.java, line(s) 184,15
com/mbridge/msdk/video/bt/module/MBridgeBTWebView.java, line(s) 356,13
com/mbridge/msdk/video/module/MBridgeAlertWebview.java, line(s) 95,6
com/mbridge/msdk/video/module/MBridgeH5EndCardView.java, line(s) 738,17

高危安全漏洞 应用程序包含隐私跟踪程序

此应用程序有多个5隐私跟踪程序。跟踪器可以跟踪设备或用户,是终端用户的隐私问题。

中危安全漏洞 应用数据允许备份

[android:allowBackup=true]
该标志允许通过 adb 工具备份应用数据。启用 USB 调试的用户可直接复制应用数据,存在数据泄露风险。

中危安全漏洞 Activity (com.uptodown.tv.ui.activity.TvMainActivity) 未受保护。

[android:exported=true]
检测到  Activity 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Activity (com.uptodown.core.activities.InstallerActivity) 未受保护。

[android:exported=true]
检测到  Activity 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Activity (com.uptodown.activities.SearchActivity) 未受保护。

[android:exported=true]
检测到  Activity 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Broadcast Receiver (com.uptodown.receivers.BootDeviceReceiver) 未受保护。

[android:exported=true]
检测到  Broadcast Receiver 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Broadcast Receiver (com.uptodown.receivers.MyAppUpdatedReceiver) 未受保护。

[android:exported=true]
检测到  Broadcast Receiver 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Broadcast Receiver (com.uptodown.receivers.DownloadNotificationReceiver) 未受保护。

[android:exported=true]
检测到  Broadcast Receiver 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Broadcast Receiver (com.uptodown.receivers.DownloadUpdateNotificationReceiver) 未受保护。

[android:exported=true]
检测到  Broadcast Receiver 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Activity (com.inmobi.cmp.presentation.components.CmpActivity) 未受保护。

[android:exported=true]
检测到  Activity 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Broadcast Receiver (org.matomo.sdk.extra.InstallReferrerReceiver) 未受保护。

[android:exported=true]
检测到  Broadcast Receiver 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 Service (com.google.android.gms.auth.api.signin.RevocationBoundService) 受权限保护,但应检查权限保护级别。

Permission: com.google.android.gms.auth.api.signin.permission.REVOCATION_NOTIFICATION [android:exported=true]
检测到  Service 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 Broadcast Receiver (com.google.firebase.iid.FirebaseInstanceIdReceiver) 受权限保护,但应检查权限保护级别。

Permission: com.google.android.c2dm.permission.SEND [android:exported=true]
检测到  Broadcast Receiver 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 Service (androidx.work.impl.background.systemjob.SystemJobService) 受权限保护,但应检查权限保护级别。

Permission: android.permission.BIND_JOB_SERVICE [android:exported=true]
检测到  Service 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 Broadcast Receiver (androidx.work.impl.diagnostics.DiagnosticsReceiver) 受权限保护,但应检查权限保护级别。

Permission: android.permission.DUMP [android:exported=true]
检测到  Broadcast Receiver 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 Broadcast Receiver (androidx.profileinstaller.ProfileInstallReceiver) 受权限保护,但应检查权限保护级别。

Permission: android.permission.DUMP [android:exported=true]
检测到  Broadcast Receiver 已导出并受未在本应用定义的权限保护。请在权限定义处核查其保护级别。若为 normal 或 dangerous,恶意应用可申请并与组件交互;若为 signature,仅同证书签名应用可访问。

中危安全漏洞 Broadcast Receiver (com.mbridge.msdk.foundation.same.broadcast.NetWorkChangeReceiver) 未受保护。

[android:exported=true]
检测到  Broadcast Receiver 已导出,未受任何权限保护,任意应用均可访问。

中危安全漏洞 高优先级 Intent(999) - {17} 个命中

[android:priority]
通过设置较高的 Intent 优先级,应用可覆盖其他请求,可能导致安全风险。

中危安全漏洞 应用程序使用SQLite数据库并执行原始SQL查询。原始SQL查询中不受信任的用户输入可能会导致SQL注入。敏感信息也应加密并写入数据库

应用程序使用SQLite数据库并执行原始SQL查询。原始SQL查询中不受信任的用户输入可能会导致SQL注入。敏感信息也应加密并写入数据库
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04h-Testing-Code-Quality.md#injection-flaws-mstg-arch-2-and-mstg-platform-2

Files:
U2/v.java, line(s) 6,7,1459,1878
Y/M.java, line(s) 5,6,149,186,235,251,524,536,574,684
Y/W.java, line(s) 4,5,159
com/mbridge/msdk/foundation/db/BatchReportDao.java, line(s) 6,79
com/mbridge/msdk/foundation/db/b.java, line(s) 6,84
com/mbridge/msdk/foundation/db/c.java, line(s) 5,56
com/mbridge/msdk/foundation/db/e.java, line(s) 6,127,183,222,334,616,1286
com/mbridge/msdk/foundation/db/g.java, line(s) 4,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,78,79,80,81,82,83,84,85,86,87,88,89,90,91,92,93,94,95
com/mbridge/msdk/foundation/download/database/DatabaseHelper.java, line(s) 6,91,159,205,280,289
com/mbridge/msdk/newreward/function/d/c.java, line(s) 3,4,21,28,29
com/mbridge/msdk/tracker/b.java, line(s) 4,5,22,36,37,51,52

中危安全漏洞 文件可能包含硬编码的敏感信息,如用户名、密码、密钥等

文件可能包含硬编码的敏感信息,如用户名、密码、密钥等
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Testing-Data-Storage.md#checking-memory-for-sensitive-data-mstg-storage-10

Files:
A0/b.java, line(s) 75
b0/C0237e.java, line(s) 80
b0/C0325e.java, line(s) 84
b0/w.java, line(s) 120
com/mbridge/msdk/MBridgeConstans.java, line(s) 17,52
com/mbridge/msdk/foundation/download/core/DownloadCommon.java, line(s) 21
com/mbridge/msdk/foundation/download/core/DownloaderReporter.java, line(s) 12
com/mbridge/msdk/foundation/entity/CampaignEx.java, line(s) 39
com/mbridge/msdk/foundation/entity/n.java, line(s) 182
com/mbridge/msdk/newreward/player/MBRewardVideoActivity.java, line(s) 44
com/mbridge/msdk/newreward/player/imodel/IBigTempModel.java, line(s) 10,13
com/mbridge/msdk/newreward/player/imodel/IECModel.java, line(s) 38,47,41,26,20,23,44,33
com/mbridge/msdk/newreward/player/imodel/IMoreOfferModel.java, line(s) 6,9,12,15
com/mbridge/msdk/newreward/player/imodel/IPlayModel.java, line(s) 45,57,74,81,48,36,30,33,68,54,39
com/mbridge/msdk/newreward/player/iview/IBaseWebView.java, line(s) 21,15,18
com/mbridge/msdk/newreward/player/iview/IMetaData.java, line(s) 18
com/mbridge/msdk/newreward/player/model/BigTemplateModel.java, line(s) 47
com/mbridge/msdk/newreward/player/model/ECTempleModel.java, line(s) 90,123,159,163
com/mbridge/msdk/newreward/player/model/MoreOfferModel.java, line(s) 51,43,39,47
com/mbridge/msdk/newreward/player/model/PlayTempleModel.java, line(s) 279,164,155,247,203
com/mbridge/msdk/newreward/player/model/WebTemplateModel.java, line(s) 249,170,161,205
com/mbridge/msdk/newreward/player/model/WebViewECModel.java, line(s) 99,134,174
com/mbridge/msdk/newreward/player/view/WebViewTemplate.java, line(s) 373,397,423
com/mbridge/msdk/newreward/player/view/ectemplate/WebViewEC.java, line(s) 155,179,203
com/mbridge/msdk/playercommon/exoplayer2/drm/DefaultDrmSessionManager.java, line(s) 36
com/mbridge/msdk/video/dynview/moffer/MOfferModel.java, line(s) 117

中危安全漏洞 应用程序使用不安全的随机数生成器

应用程序使用不安全的随机数生成器
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04g-Testing-Cryptography.md#weak-random-number-generators

Files:
H3/AbstractC1800a.java, line(s) 3
H3/C1801b.java, line(s) 3
H3/a.java, line(s) 3
H3/b.java, line(s) 3
M0/AbstractC1053o.java, line(s) 9
M0/AbstractC2090o.java, line(s) 9
M0/x.java, line(s) 7
S2/A.java, line(s) 8
S2/AbstractC0512b.java, line(s) 8
S2/AbstractC0679b.java, line(s) 9
T2/b.java, line(s) 16
com/mbridge/msdk/dycreator/baseview/rewardpopview/MBAcquireRewardPopView.java, line(s) 29
com/mbridge/msdk/playercommon/exoplayer2/source/ShuffleOrder.java, line(s) 4
com/mbridge/msdk/playercommon/exoplayer2/trackselection/RandomTrackSelection.java, line(s) 7
com/mbridge/msdk/playercommon/exoplayer2/upstream/cache/CachedContentIndex.java, line(s) 21
com/mbridge/msdk/thrid/okhttp/OkHttpClient.java, line(s) 29
com/mbridge/msdk/thrid/okhttp/internal/ws/RealWebSocket.java, line(s) 26
com/mbridge/msdk/thrid/okhttp/internal/ws/WebSocketWriter.java, line(s) 10
i3/C1821a.java, line(s) 5
i3/a.java, line(s) 4
j$/util/C0021j.java, line(s) 7
j$/util/C0023l.java, line(s) 4
j$/util/C0028q.java, line(s) 7
j$/util/C0151w.java, line(s) 4
j$/util/C1843j.java, line(s) 7
j$/util/C1845l.java, line(s) 4
j$/util/C1850q.java, line(s) 7
j$/util/C1973w.java, line(s) 4
j$/util/Collection$EL.java, line(s) 8
j$/util/DesugarCollections.java, line(s) 5
j$/util/concurrent/ThreadLocalRandom.java, line(s) 15

中危安全漏洞 可能存在跨域漏洞。在 WebView 中启用从 URL 访问文件可能会泄漏文件系统中的敏感信息

可能存在跨域漏洞。在 WebView 中启用从 URL 访问文件可能会泄漏文件系统中的敏感信息
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05h-Testing-Platform-Interaction.md#static-analysis-6

Files:
com/mbridge/msdk/foundation/webview/BrowserView.java, line(s) 167,164
com/mbridge/msdk/mbsignalcommon/base/BaseWebView.java, line(s) 86,83
com/mbridge/msdk/newreward/player/view/hybrid/MBWebView.java, line(s) 50,47

中危安全漏洞 应用程序可以读取/写入外部存储器,任何应用程序都可以读取写入外部存储器的数据

应用程序可以读取/写入外部存储器,任何应用程序都可以读取写入外部存储器的数据
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Testing-Data-Storage.md#external-storage

Files:
U2/C1233m.java, line(s) 562,571
U2/C2445m.java, line(s) 795,804
U2/y.java, line(s) 41,196
W1/C0535g.java, line(s) 171
W1/C0536h.java, line(s) 28,34,78,93,102,69,75,88
W1/C0702g.java, line(s) 185
W1/C0703h.java, line(s) 29,35,79,94,103,70,76,89
W1/E.java, line(s) 17
com/mbridge/msdk/foundation/same/report/b/d.java, line(s) 148
com/mbridge/msdk/foundation/tools/ai.java, line(s) 49,60,70
com/uptodown/core/activities/FileExplorerActivity.java, line(s) 349,407,2685,2824,3584

中危安全漏洞 MD5是已知存在哈希冲突的弱哈希

MD5是已知存在哈希冲突的弱哈希
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04g-Testing-Cryptography.md#identifying-insecure-andor-deprecated-cryptographic-algorithms-mstg-crypto-4

Files:
W1/C0534f.java, line(s) 95
W1/C0701f.java, line(s) 98
com/mbridge/msdk/foundation/download/resource/MBResourceManager.java, line(s) 95
com/mbridge/msdk/foundation/tools/ac.java, line(s) 19,34
l2/C1028b.java, line(s) 16
l2/C2058b.java, line(s) 17

中危安全漏洞 不安全的Web视图实现。可能存在WebView任意代码执行漏洞

不安全的Web视图实现。可能存在WebView任意代码执行漏洞
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05h-Testing-Platform-Interaction.md#testing-javascript-execution-in-webviews-mstg-platform-5

Files:
G1/c.java, line(s) 80,77

中危安全漏洞 应用程序创建临时文件。敏感信息永远不应该被写进临时文件

应用程序创建临时文件。敏感信息永远不应该被写进临时文件


Files:
com/mbridge/msdk/playercommon/exoplayer2/util/Util.java, line(s) 175
t0/c.java, line(s) 82

中危安全漏洞 SHA-1是已知存在哈希冲突的弱哈希

SHA-1是已知存在哈希冲突的弱哈希
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04g-Testing-Cryptography.md#identifying-insecure-andor-deprecated-cryptographic-algorithms-mstg-crypto-4

Files:
t0/b.java, line(s) 53

中危安全漏洞 此应用可能包含硬编码机密信息

从应用程序中识别出以下机密确保这些不是机密或私人信息
"com.google.firebase.crashlytics.mapping_file_id" : "31493085c7c14b0ab703ec3300d562d5"
"dyStrategy.privateAddress" : "privateAddress"
"google_api_key" : "AIzaSyBaooNElLxTgeKdljNdrXJQg5-mA_U1Lko"
"google_app_id" : "1:171380306104:android:4e827fc7c388aeec79c44d"
"google_crash_reporting_api_key" : "AIzaSyBaooNElLxTgeKdljNdrXJQg5-mA_U1Lko"
"more_info_author" : "Author"
"username_edit_change" : "Change"
"more_info_author" : "Autor"
"recuperar_pass" : "Passwortwiederherstellung"
"more_info_author" : "Autor"
"more_info_author" : "Autor"
"username_edit_change" : "Cambiar"
"more_info_author" : "Pencipta"
"username_edit_change" : "Ubah"
"more_info_author" : "Autor"
"username_edit_change" : "Alterar"
"more_info_author" : "Auteur"
"username_edit_change" : "Changement"
"more_info_author" : "Yazar"
"more_info_author" : "Autore"
"username_edit_change" : "Cambia"
DFKwWgtuDkKwLZPwD+z8H+N/xjQZxVfV+T2SZVe6V2xS5c5n
eyJ2YWx1ZSI6IjRhOTRiN2I1MTk1NGVkNGMyMjZjZGM1MGMxZDE5Yjk2MTY4MzY5OTE1NCJ9
HkzwDFeD4QuyLdx5igfZYcu9xTM9NN==
DFK/HrQgJ+zQW+xUhoPwJ7JgY7K0DkeAWrfXYN==
7e5347690cfae30d311f1b31465c33f6
h7KsLkfPW+xUhoPwJ7JgY7K0DkeAWrfXYN==
DFKwWgtuDkKwLZPwD+z8H+N/xj26Vjcdx5KanjKnxVN=
DFKwWgtuDkKwLZPwD+z8H+N/xjK+n3eyNVx6ZVPn5jcincKZx5f5ncN=
822b9ca12b534ebcf426632221d951bfc60eb08f9f0cf2839c321b0685c2e8a4
470fa2b4ae81cd56ecbcda9735803434cec591fa
DkPtYdQTLkfAW+xUhoPwJ7JgY7K0DkeAWrfXYN==
258EAFA5-E914-47DA-95CA-C5AB0DC85B11
LdxThdi1WBKUL75ULBPwJ7JgY7K0DkeAWrfXYN==
h7KsLkfPW+xUhoPBD+QqJk2MWrfXYN==
LdxThdi1WBKUL75ULBPBD+QqJk2MWrfXYN==
DFKwWgtuDkKwLZPwD+z8H+N/xj26Vjcdx5KyVj5GxVN=
DkP3hrKuHoPMH+zwL+fALkK/WQc5x5zH+TcincKNNVfWNVJcVM==
DFK/HrQgJ+zQW+xUhoPBD+QqJk2MWrfXYN==
0000016742C00BDA259000000168CE0F13200000016588840DCE7118A0002FBF1C31C3275D78
Y7c14Z2TDbv/Y+xgHFeXDrcshBPUYFT=
DFeuWkH0W+xUhoPwJ7JgY7K0DkeAWrfXYN==
936dcbdd57fe235fd7cf61c2e93da3c4

安全提示信息 应用程序记录日志信息,不得记录敏感信息

应用程序记录日志信息,不得记录敏感信息
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05d-Testing-Data-Storage.md#logs

Files:
B1/C.java, line(s) 90,92
B1/C0548h.java, line(s) 27
B1/C0880h.java, line(s) 32
B1/E.java, line(s) 75,93,164,180,197,206,256,259,280,109,286
B1/H.java, line(s) 48,62,36,55
B1/l.java, line(s) 58,65
B1/y.java, line(s) 137,89,275
C/a.java, line(s) 117,157
C/d.java, line(s) 23,41,50,60
C1/C0564a.java, line(s) 98,103,122,126
C1/C0916a.java, line(s) 113,118,137,141
C2/b.java, line(s) 36,51
D1/C0793c.java, line(s) 122
D1/C1556c.java, line(s) 132,423,442,158,321,407
D1/f.java, line(s) 39
G/g.java, line(s) 36
G0/AbstractC1745a.java, line(s) 55,74,73,32,49
G0/a.java, line(s) 55,74,73,32,49
I/A.java, line(s) 29,36,28,35
I/AbstractC0072b.java, line(s) 36,49,137,140
I/AbstractC0332b.java, line(s) 37,50,138,141
I/C0073c.java, line(s) 91,104,125,173,188,312,90,103,124,172,187,311,121,141,153,195,216,262
I/C0333c.java, line(s) 94,107,128,176,191,315,93,106,127,175,190,314,124,144,156,198,219,265
I/D.java, line(s) 53,52
I/E.java, line(s) 47,29,68
I/k.java, line(s) 16,13,13
I/x.java, line(s) 36,77,146,35,76,90,145,191,223,252,281,91,192,224,253,282,43,180
I/y.java, line(s) 23
I0/C1804a.java, line(s) 85,89
I0/a.java, line(s) 84,88
J/AbstractC0090l.java, line(s) 36,102,48,86,121,133,143,149,152,154,158
J/AbstractC0350l.java, line(s) 36,102,48,86,121,133,143,149,152,154,158
J/C0085g.java, line(s) 114,161,168
J/C0091m.java, line(s) 42,108
J/C0345g.java, line(s) 114,161,168
J/C0351m.java, line(s) 43,130
J/D.java, line(s) 72,90,94,120,124,54
J/I.java, line(s) 54,57,35
J/N.java, line(s) 53,55,49
J/q.java, line(s) 24
J/z.java, line(s) 48
J0/C1980a.java, line(s) 127,197,209,279,222,294
J0/a.java, line(s) 127,197,209,283,222,298
L/x.java, line(s) 49
M/A.java, line(s) 96,99,102,105,108,111,119,122,125,128,161,169
M/AbstractBinderC0097a.java, line(s) 18
M/AbstractBinderC0563a.java, line(s) 18
M/AbstractC0099c.java, line(s) 195,213,385,391,395,401
M/AbstractC0565c.java, line(s) 199,217,389,395,399,405
M/D.java, line(s) 27
M/Y.java, line(s) 34
M/b0.java, line(s) 102
M/c0.java, line(s) 29
M/d0.java, line(s) 36
M/f0.java, line(s) 40,58
M/l0.java, line(s) 49,54
M/p0.java, line(s) 55
N/f.java, line(s) 102
P0/C1100f.java, line(s) 246,192,196,209
P0/C2216f.java, line(s) 264,210,214,227
Q/b.java, line(s) 58,69
R/C0805k.java, line(s) 36,65,72,75,88,91,94,97,100
R/C2264k.java, line(s) 36,65,72,75,88,91,94,97,100
R/f.java, line(s) 17
R/o.java, line(s) 19,16
R/p.java, line(s) 66,74,47,56
S0/C1179g.java, line(s) 26,33,36,45,83
S0/C2348g.java, line(s) 29,36,39,48,86
S0/o.java, line(s) 101
U0/c.java, line(s) 88,91,113,121,122,142,144
U2/v.java, line(s) 679,682,683
V0/g.java, line(s) 28,38,15,48,58,68
V1/c.java, line(s) 32,34
W1/AbstractC1246d.java, line(s) 18,11
W1/AbstractC2486d.java, line(s) 18,11
Y0/C1348x.java, line(s) 129,130,131,132,133,134,135,136,137,138,139,140,141,142,143,144,145,146,147
Y0/C2628x.java, line(s) 147,148,149,150,151,152,153,154,155,156,157,158,159,160,161,162,163,164,165
c4/d.java, line(s) 84
com/davemorrissey/labs/subscaleview/SubsamplingScaleImageView.java, line(s) 641,206,210,389,393,461,1477,1700,2070
com/davemorrissey/labs/subscaleview/decoder/SkiaPooledImageRegionDecoder.java, line(s) 120
com/mbridge/msdk/dycreator/a/a.java, line(s) 83,84,85,89,97,99,199,213,268
com/mbridge/msdk/dycreator/baseview/MBScrollView.java, line(s) 160
com/mbridge/msdk/dycreator/baseview/extview/MBExtAcquireRewardPopView.java, line(s) 198
com/mbridge/msdk/dycreator/baseview/extview/MBExtFeedBackView.java, line(s) 241
com/mbridge/msdk/dycreator/baseview/extview/MBExtMBridgeBaitClickView.java, line(s) 200
com/mbridge/msdk/dycreator/baseview/extview/MBExtMBridgeTextView.java, line(s) 251
com/mbridge/msdk/dycreator/bus/BackgroundPoster.java, line(s) 47
com/mbridge/msdk/dycreator/bus/EventBus.java, line(s) 163,489,491,495,244,334,389
com/mbridge/msdk/dycreator/e/g.java, line(s) 11
com/mbridge/msdk/foundation/same/report/b/b.java, line(s) 76
com/mbridge/msdk/foundation/same/report/b/d.java, line(s) 67
com/mbridge/msdk/foundation/same/report/d.java, line(s) 77
com/mbridge/msdk/foundation/tools/ac.java, line(s) 21
com/mbridge/msdk/foundation/tools/af.java, line(s) 35,84,42,63,49,56,77,91
com/mbridge/msdk/playercommon/exoplayer2/DefaultRenderersFactory.java, line(s) 67,74,78,89,94,98,130
com/mbridge/msdk/playercommon/exoplayer2/ExoPlayerImpl.java, line(s) 130,499,600
com/mbridge/msdk/playercommon/exoplayer2/ExoPlayerImplInternal.java, line(s) 641,826,1166,1171,1176,1239
com/mbridge/msdk/playercommon/exoplayer2/MediaPeriodHolder.java, line(s) 172
com/mbridge/msdk/playercommon/exoplayer2/SimpleExoPlayer.java, line(s) 262,801
com/mbridge/msdk/playercommon/exoplayer2/audio/DefaultAudioSink.java, line(s) 632,183,192,201,663
com/mbridge/msdk/playercommon/exoplayer2/drm/ClearKeyUtil.java, line(s) 44
com/mbridge/msdk/playercommon/exoplayer2/drm/DefaultDrmSession.java, line(s) 192,332
com/mbridge/msdk/playercommon/exoplayer2/drm/DefaultDrmSessionManager.java, line(s) 221
com/mbridge/msdk/playercommon/exoplayer2/extractor/mkv/MatroskaExtractor.java, line(s) 485
com/mbridge/msdk/playercommon/exoplayer2/extractor/mp3/VbriSeeker.java, line(s) 65
com/mbridge/msdk/playercommon/exoplayer2/extractor/mp3/XingSeeker.java, line(s) 43
com/mbridge/msdk/playercommon/exoplayer2/extractor/mp4/FragmentedMp4Extractor.java, line(s) 261,991
com/mbridge/msdk/playercommon/exoplayer2/extractor/mp4/MetadataUtil.java, line(s) 170,58,65,71,192,236,248,258
com/mbridge/msdk/playercommon/exoplayer2/extractor/mp4/PsshAtomUtil.java, line(s) 44,69
com/mbridge/msdk/playercommon/exoplayer2/extractor/mp4/TrackEncryptionBox.java, line(s) 64
com/mbridge/msdk/playercommon/exoplayer2/extractor/ogg/VorbisUtil.java, line(s) 210
com/mbridge/msdk/playercommon/exoplayer2/extractor/ts/AdtsReader.java, line(s) 106
com/mbridge/msdk/playercommon/exoplayer2/extractor/ts/H265Reader.java, line(s) 252
com/mbridge/msdk/playercommon/exoplayer2/extractor/ts/Id3Reader.java, line(s) 32
com/mbridge/msdk/playercommon/exoplayer2/extractor/ts/PesReader.java, line(s) 57,110,113
com/mbridge/msdk/playercommon/exoplayer2/extractor/wav/WavHeaderReader.java, line(s) 49
com/mbridge/msdk/playercommon/exoplayer2/mediacodec/MediaCodecInfo.java, line(s) 92,96,48
com/mbridge/msdk/playercommon/exoplayer2/mediacodec/MediaCodecUtil.java, line(s) 457,272,281,290,297,300,334,357,362,370,379
com/mbridge/msdk/playercommon/exoplayer2/metadata/id3/Id3Decoder.java, line(s) 193,198,207,218,375
com/mbridge/msdk/playercommon/exoplayer2/offline/DownloadManager.java, line(s) 305,442
com/mbridge/msdk/playercommon/exoplayer2/offline/DownloadService.java, line(s) 152
com/mbridge/msdk/playercommon/exoplayer2/source/chunk/BaseMediaChunkOutput.java, line(s) 49
com/mbridge/msdk/playercommon/exoplayer2/source/chunk/ChunkedTrackBlacklistUtil.java, line(s) 33,36
com/mbridge/msdk/playercommon/exoplayer2/text/cea/Cea708Decoder.java, line(s) 893,454,458,462,563,741,752,793,805,828,842
com/mbridge/msdk/playercommon/exoplayer2/text/cea/CeaUtil.java, line(s) 27
com/mbridge/msdk/playercommon/exoplayer2/text/dvb/DvbParser.java, line(s) 578
com/mbridge/msdk/playercommon/exoplayer2/text/ssa/SsaDecoder.java, line(s) 37,42,47,56
com/mbridge/msdk/playercommon/exoplayer2/text/subrip/SubripDecoder.java, line(s) 45,73,76
com/mbridge/msdk/playercommon/exoplayer2/text/ttml/TtmlDecoder.java, line(s) 350,86,97,113,260,266,275,280,305,309,361
com/mbridge/msdk/playercommon/exoplayer2/text/webvtt/WebvttCue.java, line(s) 69
com/mbridge/msdk/playercommon/exoplayer2/text/webvtt/WebvttCueParser.java, line(s) 121,252,255,355,384,428
com/mbridge/msdk/playercommon/exoplayer2/upstream/DefaultDataSource.java, line(s) 71
com/mbridge/msdk/playercommon/exoplayer2/upstream/DefaultHttpDataSource.java, line(s) 60
com/mbridge/msdk/playercommon/exoplayer2/upstream/Loader.java, line(s) 130,180,186,198
com/mbridge/msdk/playercommon/exoplayer2/upstream/cache/CachedRegionTracker.java, line(s) 137
com/mbridge/msdk/playercommon/exoplayer2/upstream/cache/SimpleCache.java, line(s) 87
com/mbridge/msdk/playercommon/exoplayer2/util/AtomicFile.java, line(s) 36,94
com/mbridge/msdk/playercommon/exoplayer2/util/EventLogger.java, line(s) 133,137
com/mbridge/msdk/playercommon/exoplayer2/video/DummySurface.java, line(s) 86,92
com/mbridge/msdk/playercommon/exoplayer2/video/MediaCodecVideoRenderer.java, line(s) 794,376,382,605
com/mbridge/msdk/tracker/b.java, line(s) 25,40,55
com/mbridge/msdk/tracker/c.java, line(s) 33,48,66,87,106,128,155,176,190,210,226,250,279,304,317,334,352,376,394
com/mbridge/msdk/tracker/j.java, line(s) 30
com/mbridge/msdk/tracker/k.java, line(s) 52,59,253,266,276
com/mbridge/msdk/tracker/m.java, line(s) 137,35,63,70,119,167
com/mbridge/msdk/tracker/n.java, line(s) 39,62,95,121
com/mbridge/msdk/tracker/network/ae.java, line(s) 51,55,82
com/mbridge/msdk/tracker/p.java, line(s) 33
com/mbridge/msdk/tracker/r.java, line(s) 39,152,162,277,291,307,50,60,121,168,173,185
com/mbridge/msdk/tracker/w.java, line(s) 98,101,104
com/mbridge/msdk/tracker/y.java, line(s) 132
com/mbridge/msdk/video/module/MBridgeBaseView.java, line(s) 158,170
com/mbridge/msdk/widget/FeedbackRadioGroup.java, line(s) 60
p/a.java, line(s) 45,50,37
t0/b.java, line(s) 57,74
u/AbstractC0845a.java, line(s) 15,22,29,14,21,28,42,43,49,50
u/AbstractC2418a.java, line(s) 15,22,29,14,21,28,42,43,49,50
x1/a.java, line(s) 119,117,113,124

安全提示信息 此应用程序将数据复制到剪贴板。敏感数据不应复制到剪贴板,因为其他应用程序可以访问它

此应用程序将数据复制到剪贴板。敏感数据不应复制到剪贴板,因为其他应用程序可以访问它
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x04b-Mobile-App-Security-Testing.md#clipboard

Files:
com/uptodown/activities/preferences/AdvancedPreferencesActivity.java, line(s) 9,63,89,64,90

已通过安全项 此应用程序可能具有Root检测功能

此应用程序可能具有Root检测功能
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05j-Testing-Resiliency-Against-Reverse-Engineering.md#testing-root-detection-mstg-resilience-1

Files:
Y0/AbstractC1335j.java, line(s) 293,293,294
Y0/AbstractC2615j.java, line(s) 295,295,296

已通过安全项 此应用程序使用SSL Pinning 来检测或防止安全通信通道中的MITM攻击

此应用程序使用SSL Pinning 来检测或防止安全通信通道中的MITM攻击
https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05g-Testing-Network-Communication.md#testing-custom-certificate-stores-and-certificate-pinning-mstg-network-4

Files:
com/mbridge/msdk/thrid/okhttp/internal/Util.java, line(s) 406,405,404,404

已通过安全项 Firebase远程配置已禁用

Firebase远程配置URL ( https://firebaseremoteconfig.googleapis.com/v1/projects/171380306104/namespaces/firebase:fetch?key=AIzaSyBaooNElLxTgeKdljNdrXJQg5-mA_U1Lko ) 已禁用。响应内容如下所示:

{
    "state": "NO_TEMPLATE"
}

综合安全基线评分总结

应用图标

Uptodown App Store v6.80

Android APK
50
综合安全评分
中风险