The backend infrastructure has an IDOR vulnerabilit
Reporter | Title | Published | Views | Family All 7 |
---|---|---|---|---|
![]() | Preventing Web Application Access Control Abuse | 27 Jul 202312:00 | – | ics |
![]() | Design/Logic Flaw | 24 Feb 202216:15 | – | prion |
![]() | Mobile device monitoring services do not authenticate API requests | 22 Feb 202200:00 | – | cert |
![]() | Why the toothbrush DDoS story fooled us all | 15 Feb 202419:00 | – | talosblog |
![]() | CVE-2022-0732 | 24 Feb 202216:10 | – | cvelist |
![]() | TheTruthSpy stalkerware, still insecure, still leaking data | 13 Feb 202416:51 | – | malwarebytes |
![]() | CVE-2022-0732 | 24 Feb 202216:15 | – | nvd |
[
{
"product": "Copy9",
"vendor": "1Byte",
"versions": [
{
"status": "affected",
"version": "All"
}
]
},
{
"product": "FoneTracker",
"vendor": "1Byte",
"versions": [
{
"status": "affected",
"version": "All"
}
]
},
{
"product": "iSpyoo",
"vendor": "1Byte",
"versions": [
{
"status": "affected",
"version": "All"
}
]
},
{
"product": "GuestSpy",
"vendor": "1Byte",
"versions": [
{
"status": "affected",
"version": "All"
}
]
},
{
"product": "TheSpyApp",
"vendor": "1Byte",
"versions": [
{
"status": "affected",
"version": "All"
}
]
},
{
"product": "ExactSpy",
"vendor": "1Byte",
"versions": [
{
"status": "affected",
"version": "All"
}
]
},
{
"product": "SecondClone",
"vendor": "1Byte",
"versions": [
{
"status": "affected",
"version": "All"
}
]
},
{
"product": "The Truth Spy",
"vendor": "1Byte",
"versions": [
{
"status": "affected",
"version": "All"
}
]
},
{
"product": "MxSpy",
"vendor": "1Byte",
"versions": [
{
"status": "affected",
"version": "All"
}
]
}
]
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo