"Piccoma" App for Android and iOS versions prior to 6.20.0 uses a hard-coded API key for an external service, which may allow a local attacker to obtain the API key. Note that the users of the app are not directly affected by this vulnerability.
References
Configurations
No configuration.
History
21 Nov 2024, 09:26
Type | Values Removed | Values Added |
---|---|---|
References | () https://apps.apple.com/jp/app/%E3%83%94%E3%83%83%E3%82%B3%E3%83%9E/id1091496983 - | |
References | () https://jvn.jp/en/jp/JVN01073312/ - | |
References | () https://play.google.com/store/apps/details?id=jp.kakao.piccoma - |
12 Nov 2024, 18:35
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-798 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.0 |
01 Jul 2024, 12:37
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
01 Jul 2024, 05:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-01 05:15
Updated : 2024-11-21 09:26
NVD link : CVE-2024-38480
Mitre link : CVE-2024-38480
CVE.ORG link : CVE-2024-38480
JSON object : View
Products Affected
No product.
CWE
CWE-798
Use of Hard-coded Credentials