cvelist/2020/14xxx/CVE-2020-14205.json

67 lines
2.0 KiB
JSON
Raw Normal View History

2020-06-16 18:01:30 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2020-12-08 20:01:50 +00:00
"ID": "CVE-2020-14205",
"STATE": "PUBLIC"
2020-06-16 18:01:30 +00:00
},
2020-12-08 20:01:50 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2020-06-16 18:01:30 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2020-12-08 20:01:50 +00:00
"value": "The DiveBook plugin 1.1.4 for WordPress is prone to improper access control in the Log Dive form because it fails to perform authorization checks. An attacker may leverage this issue to manipulate the integrity of dive logs."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wordpress.org/plugins/divebook/#developers",
"refsource": "MISC",
"name": "https://wordpress.org/plugins/divebook/#developers"
},
{
"refsource": "MISC",
"name": "https://www.hooperlabs.xyz/disclosures/divebook.php",
"url": "https://www.hooperlabs.xyz/disclosures/divebook.php"
2020-06-16 18:01:30 +00:00
}
]
}
}