CVE-2024-38480

"Piccoma" App for Android and iOS versions prior to 6.20.0 uses a hard-coded API key for an external service, which may allow a local attacker to obtain the API key. Note that the users of the app are not directly affected by this vulnerability.
Configurations

No configuration.

History

21 Nov 2024, 09:26

Type Values Removed Values Added
References () https://apps.apple.com/jp/app/%E3%83%94%E3%83%83%E3%82%B3%E3%83%9E/id1091496983 - () https://apps.apple.com/jp/app/%E3%83%94%E3%83%83%E3%82%B3%E3%83%9E/id1091496983 -
References () https://jvn.jp/en/jp/JVN01073312/ - () https://jvn.jp/en/jp/JVN01073312/ -
References () https://play.google.com/store/apps/details?id=jp.kakao.piccoma - () https://play.google.com/store/apps/details?id=jp.kakao.piccoma -

12 Nov 2024, 18:35

Type Values Removed Values Added
CWE CWE-798
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.0

01 Jul 2024, 12:37

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-01 05:15

Updated : 2024-11-21 09:26


NVD link : CVE-2024-38480

Mitre link : CVE-2024-38480

CVE.ORG link : CVE-2024-38480


JSON object : View

Products Affected

No product.

CWE
CWE-798

Use of Hard-coded Credentials