cvelist/2021/32xxx/CVE-2021-32612.json

72 lines
2.4 KiB
JSON
Raw Normal View History

2021-05-12 16:00:44 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2021-06-16 12:00:59 +00:00
"ID": "CVE-2021-32612",
"STATE": "PUBLIC"
2021-05-12 16:00:44 +00:00
},
2021-06-16 12:00:59 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2021-05-12 16:00:44 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2021-06-16 12:00:59 +00:00
"value": "The VeryFitPro (com.veryfit2hr.second) application 3.2.8 for Android does all communication with the backend API over cleartext HTTP. This includes logins, registrations, and password change requests. This allows information theft and account takeover via network sniffing."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://trovent.io/security-advisory-2105-01",
"refsource": "MISC",
"name": "https://trovent.io/security-advisory-2105-01"
},
{
"url": "https://trovent.github.io/security-advisories/TRSA-2105-01/TRSA-2105-01.txt",
"refsource": "MISC",
"name": "https://trovent.github.io/security-advisories/TRSA-2105-01/TRSA-2105-01.txt"
},
{
"url": "https://play.google.com/store/apps/details?id=com.veryfit2hr.second&hl=en_US&gl=US",
"refsource": "MISC",
"name": "https://play.google.com/store/apps/details?id=com.veryfit2hr.second&hl=en_US&gl=US"
2021-05-12 16:00:44 +00:00
}
]
}
}