Description
Android Spoon application version 7.11.1 to 8.6.0 uses hard-coded credentials, which may allow a local attacker to retrieve the hard-coded API key when the application binary is reverse-engineered. This API key may be used for unexpected access of the associated service.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-20952 | Android Spoon application version 7.11.1 to 8.6.0 uses hard-coded credentials, which may allow a local attacker to retrieve the hard-coded API key when the application binary is reverse-engineered. This API key may be used for unexpected access of the associated service. |
References
History
Wed, 04 Jun 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: jpcert
Published:
Updated: 2025-06-04T15:08:36.499Z
Reserved: 2024-01-17T07:05:36.873Z
Link: CVE-2024-23453
Updated: 2024-08-01T23:06:24.138Z
Status : Modified
Published: 2024-01-24T00:15:08.327
Modified: 2025-06-04T16:15:31.813
Link: CVE-2024-23453
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD