Show plain JSON{"containers": {"cna": {"affected": [{"product": "Copy9", "vendor": "1Byte", "versions": [{"status": "affected", "version": "All"}]}, {"product": "FoneTracker", "vendor": "1Byte", "versions": [{"status": "affected", "version": "All"}]}, {"product": "iSpyoo", "vendor": "1Byte", "versions": [{"status": "affected", "version": "All"}]}, {"product": "GuestSpy", "vendor": "1Byte", "versions": [{"status": "affected", "version": "All"}]}, {"product": "TheSpyApp", "vendor": "1Byte", "versions": [{"status": "affected", "version": "All"}]}, {"product": "ExactSpy", "vendor": "1Byte", "versions": [{"status": "affected", "version": "All"}]}, {"product": "SecondClone", "vendor": "1Byte", "versions": [{"status": "affected", "version": "All"}]}, {"product": "The Truth Spy", "vendor": "1Byte", "versions": [{"status": "affected", "version": "All"}]}, {"product": "MxSpy", "vendor": "1Byte", "versions": [{"status": "affected", "version": "All"}]}], "datePublic": "2022-02-22T00:00:00", "descriptions": [{"lang": "en", "value": "The backend infrastructure shared by multiple mobile device monitoring services does not adequately authenticate or authorize API requests, creating an IDOR (Insecure Direct Object Reference) vulnerability."}], "problemTypes": [{"descriptions": [{"cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"dateUpdated": "2022-02-25T19:06:09", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc"}, "references": [{"name": "VU#229438", "tags": ["third-party-advisory", "x_refsource_CERT-VN"], "url": "https://www.kb.cert.org/vuls/id/229438"}, {"tags": ["x_refsource_MISC"], "url": "https://cwe.mitre.org/data/definitions/284.html"}, {"tags": ["x_refsource_CONFIRM"], "url": "https://techcrunch.com/2022/02/22/stalkerware-network-spilling-data/"}, {"tags": ["third-party-advisory", "x_refsource_CERT-VN"], "url": "https://kb.cert.org/vuls/id/229438"}], "source": {"discovery": "UNKNOWN"}, "x_generator": {"engine": "Vulnogram 0.0.9"}, "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "cert@cert.org", "DATE_PUBLIC": "2022-02-22T15:29:00.000Z", "ID": "CVE-2022-0732", "STATE": "PUBLIC"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "Copy9", "version": {"version_data": [{"version_value": "All"}]}}, {"product_name": "FoneTracker", "version": {"version_data": [{"version_value": "All"}]}}, {"product_name": "iSpyoo", "version": {"version_data": [{"version_value": "All"}]}}, {"product_name": "GuestSpy", "version": {"version_data": [{"version_value": "All"}]}}, {"product_name": "TheSpyApp", "version": {"version_data": [{"version_value": "All"}]}}, {"product_name": "ExactSpy", "version": {"version_data": [{"version_value": "All"}]}}, {"product_name": "SecondClone", "version": {"version_data": [{"version_value": "All"}]}}, {"product_name": "The Truth Spy", "version": {"version_data": [{"version_value": "All"}]}}, {"product_name": "MxSpy", "version": {"version_data": [{"version_value": "All"}]}}]}, "vendor_name": "1Byte"}]}}, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "The backend infrastructure shared by multiple mobile device monitoring services does not adequately authenticate or authorize API requests, creating an IDOR (Insecure Direct Object Reference) vulnerability."}]}, "generator": {"engine": "Vulnogram 0.0.9"}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "CWE-284 Improper Access Control"}]}]}, "references": {"reference_data": [{"name": "VU#229438", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/229438"}, {"name": "https://cwe.mitre.org/data/definitions/284.html", "refsource": "MISC", "url": "https://cwe.mitre.org/data/definitions/284.html"}, {"name": "https://techcrunch.com/2022/02/22/stalkerware-network-spilling-data/", "refsource": "CONFIRM", "url": "https://techcrunch.com/2022/02/22/stalkerware-network-spilling-data/"}, {"name": "https://kb.cert.org/vuls/id/229438", "refsource": "CERT-VN", "url": "https://kb.cert.org/vuls/id/229438"}]}, "source": {"discovery": "UNKNOWN"}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-02T23:40:03.467Z"}, "title": "CVE Program Container", "references": [{"name": "VU#229438", "tags": ["third-party-advisory", "x_refsource_CERT-VN", "x_transferred"], "url": "https://www.kb.cert.org/vuls/id/229438"}, {"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://cwe.mitre.org/data/definitions/284.html"}, {"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "https://techcrunch.com/2022/02/22/stalkerware-network-spilling-data/"}, {"tags": ["third-party-advisory", "x_refsource_CERT-VN", "x_transferred"], "url": "https://kb.cert.org/vuls/id/229438"}]}]}, "cveMetadata": {"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2022-0732", "datePublished": "2022-02-24T16:10:11.015535Z", "dateReserved": "2022-02-22T00:00:00", "dateUpdated": "2024-09-16T18:13:36.167Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}