cvelist/2021/32xxx/CVE-2021-32612.json

77 lines
2.7 KiB
JSON
Raw Normal View History

2021-05-12 16:00:44 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2021-06-16 12:00:59 +00:00
"ID": "CVE-2021-32612",
"STATE": "PUBLIC"
2021-05-12 16:00:44 +00:00
},
2021-06-16 12:00:59 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2021-05-12 16:00:44 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2021-06-16 12:00:59 +00:00
"value": "The VeryFitPro (com.veryfit2hr.second) application 3.2.8 for Android does all communication with the backend API over cleartext HTTP. This includes logins, registrations, and password change requests. This allows information theft and account takeover via network sniffing."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://trovent.io/security-advisory-2105-01",
"refsource": "MISC",
"name": "https://trovent.io/security-advisory-2105-01"
},
{
"url": "https://trovent.github.io/security-advisories/TRSA-2105-01/TRSA-2105-01.txt",
"refsource": "MISC",
"name": "https://trovent.github.io/security-advisories/TRSA-2105-01/TRSA-2105-01.txt"
},
{
"url": "https://play.google.com/store/apps/details?id=com.veryfit2hr.second&hl=en_US&gl=US",
"refsource": "MISC",
"name": "https://play.google.com/store/apps/details?id=com.veryfit2hr.second&hl=en_US&gl=US"
2021-06-18 18:00:47 +00:00
},
{
"refsource": "FULLDISC",
"name": "20210618 Trovent Security Advisory 2105-01 / CVE-2021-32612: VeryFitPro unencrypted cleartext transmission of sensitive information",
"url": "http://seclists.org/fulldisclosure/2021/Jun/45"
2021-05-12 16:00:44 +00:00
}
]
}
}