"Piccoma" App for Android and iOS versions prior to 6.20.0 uses a hard-coded API key for an external service, which may allow a local attacker to obtain the API key. Note that the users of the app are not directly affected by this vulnerability.
                
            References
                    Configurations
                    No configuration.
History
                    21 Nov 2024, 09:26
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://apps.apple.com/jp/app/%E3%83%94%E3%83%83%E3%82%B3%E3%83%9E/id1091496983 - | |
| References | () https://jvn.jp/en/jp/JVN01073312/ - | |
| References | () https://play.google.com/store/apps/details?id=jp.kakao.piccoma - | 
12 Nov 2024, 18:35
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : unknown
         v3 : 4.0  | 
| CWE | CWE-798 | 
01 Jul 2024, 12:37
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
        
        
  | 
01 Jul 2024, 05:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-07-01 05:15
Updated : 2024-11-21 09:26
NVD link : CVE-2024-38480
Mitre link : CVE-2024-38480
CVE.ORG link : CVE-2024-38480
JSON object : View
Products Affected
                No product.
CWE
                
                    
                        
                        CWE-798
                        
            Use of Hard-coded Credentials
