cvelist/2020/5xxx/CVE-2020-5800.json

62 lines
1.9 KiB
JSON
Raw Normal View History

2020-01-06 15:01:45 +00:00
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-5800",
2020-12-07 13:01:43 +00:00
"ASSIGNER": "vulnreport@tenable.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Eat Spray Love",
"version": {
"version_data": [
{
"version_value": "Eat Spray Love for iOS 2.0.20, Eat Spray Love for Android 2.0.20"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Insufficient Access Controls"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://www.tenable.com/security/research/tra-2020-65",
"url": "https://www.tenable.com/security/research/tra-2020-65"
}
]
2020-01-06 15:01:45 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2020-12-07 13:01:43 +00:00
"value": "The Eat Spray Love mobile app for both iOS and Android contains logic that allows users to bypass authentication and retrieve or modify information that they would not normally have access to."
2020-01-06 15:01:45 +00:00
}
]
}
}