Description
Jimoty App for Android versions prior to 3.7.42 uses a hard-coded API key for an external service. By exploiting this vulnerability, API key for an external service may be obtained by analyzing data in the app.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-15344 | Jimoty App for Android versions prior to 3.7.42 uses a hard-coded API key for an external service. By exploiting this vulnerability, API key for an external service may be obtained by analyzing data in the app. |
References
| Link | Providers |
|---|---|
| https://jvn.jp/en/jp/JVN49047921/index.html |
|
History
No history.
Status: PUBLISHED
Assigner: jpcert
Published:
Updated: 2024-08-02T23:18:41.732Z
Reserved: 2022-01-06T00:00:00.000Z
Link: CVE-2022-0131
No data.
Status : Modified
Published: 2022-01-17T10:15:08.007
Modified: 2024-11-21T06:37:58.033
Link: CVE-2022-0131
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD