{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-16T12:17:34.375","vulnerabilities":[{"cve":{"id":"CVE-2019-13097","sourceIdentifier":"cve@mitre.org","published":"2019-07-22T17:15:39.560","lastModified":"2024-11-21T04:24:10.807","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The application API of Cat Runner Decorate Home version 2.8.0 for Android does not sufficiently verify inputs that are assumed to be immutable but are actually externally controllable. Attackers can manipulate users' score parameters exchanged between client and server."},{"lang":"es","value":"La aplicación API de Cat Runner Decorate Home versión 2.8.0 para Android, no comprueba suficientemente las entradas que son asumidas inmutables pero que en realidad son controlables externamente. Los atacantes pueden manipular los parámetros de puntuación de usuarios intercambiados entre cliente y servidor."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cat_runner\\:_decorate_home_project:cat_runner\\:_decorate_home:2.8.0:*:*:*:*:android:*:*","matchCriteriaId":"FC09EC76-A011-42AB-94E1-42984194303E"}]}]}],"references":[{"url":"https://pastebin.com/WkkGk0tw","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.youtube.com/watch?v=u5iEeLZnYVg","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]},{"url":"https://pastebin.com/WkkGk0tw","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.youtube.com/watch?v=u5iEeLZnYVg","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}