5.5
CVE-2020-5667
- EPSS 0.05%
- Veröffentlicht 06.11.2020 03:15:17
- Zuletzt bearbeitet 21.11.2024 05:34:27
- Quelle vultures@jpcert.or.jp
- CVE-Watchlists
- Unerledigt
Studyplus App for Android v6.3.7 and earlier and Studyplus App for iOS v8.29.0 and earlier use a hard-coded API key for an external service. By exploiting this vulnerability, API key for an external service may be obtained by analyzing data in the app.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Wantedlyinc ≫ Studyplus SwPlatformandroid Version <= 6.3.7
Wantedlyinc ≫ Studyplus SwPlatformiphone_os Version <= 8.29.0
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.05% | 0.131 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.5 | 1.8 | 3.6 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
|
| nvd@nist.gov | 2.1 | 3.9 | 2.9 |
AV:L/AC:L/Au:N/C:P/I:N/A:N
|
CWE-798 Use of Hard-coded Credentials
The product contains hard-coded credentials, such as a password or cryptographic key.