Description
Studyplus App for Android v6.3.7 and earlier and Studyplus App for iOS v8.29.0 and earlier use a hard-coded API key for an external service. By exploiting this vulnerability, API key for an external service may be obtained by analyzing data in the app.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-26828 | Studyplus App for Android v6.3.7 and earlier and Studyplus App for iOS v8.29.0 and earlier use a hard-coded API key for an external service. By exploiting this vulnerability, API key for an external service may be obtained by analyzing data in the app. |
References
| Link | Providers |
|---|---|
| https://jvn.jp/en/jp/JVN00414047/index.html |
|
History
No history.
Status: PUBLISHED
Assigner: jpcert
Published:
Updated: 2024-08-04T08:39:25.501Z
Reserved: 2020-01-06T00:00:00.000Z
Link: CVE-2020-5667
No data.
Status : Modified
Published: 2020-11-06T03:15:17.777
Modified: 2024-11-21T05:34:27.090
Link: CVE-2020-5667
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD