mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
72 lines
2.4 KiB
JSON
72 lines
2.4 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "http://jvn.jp/en/jp/JVN35496038/index.html",
|
|
"refsource": "MISC",
|
|
"name": "http://jvn.jp/en/jp/JVN35496038/index.html"
|
|
},
|
|
{
|
|
"url": "https://play.google.com/store/apps/details?id=jp.extrun.ilbo&hl=en",
|
|
"refsource": "MISC",
|
|
"name": "https://play.google.com/store/apps/details?id=jp.extrun.ilbo&hl=en"
|
|
},
|
|
{
|
|
"url": "https://apps.apple.com/us/app/ilbo/id1116864683",
|
|
"refsource": "MISC",
|
|
"name": "https://apps.apple.com/us/app/ilbo/id1116864683"
|
|
}
|
|
]
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "ilbo App (ilbo App for Android prior to version 1.1.8 and ilbo App for iOS prior to version 1.2.01) allows an attacker on the same network segment to bypass authentication and to view the images which were recorded by the other ilbo user's device via unspecified vectors."
|
|
}
|
|
]
|
|
},
|
|
"data_type": "CVE",
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "ilbo App for Android prior to version 1.1.8 and ilbo App for iOS prior to version 1.2.0"
|
|
}
|
|
]
|
|
},
|
|
"product_name": "ilbo App"
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "EXTRUN Ltd."
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2020-5532",
|
|
"ASSIGNER": "vultures@jpcert.or.jp",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"data_format": "MITRE",
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Authentication bypass"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
} |