Логотип exploitDog
bind:CVE-2022-30361
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-30361

Количество 2

Количество 2

nvd логотип

CVE-2022-30361

больше 1 года назад

OvalEdge 5.2.8.0 and earlier is affected by a Sensitive Data Exposure vulnerability via a GET request to /user/getUserType. No authentication is required. The information disclosed is associated with the registered user ID, status, email address, role(s), user type, license type, and personal details such as first name, last name, gender, and user preferences.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-rh86-h8w6-hq8j

больше 1 года назад

OvalEdge 5.2.8.0 and earlier is affected by a Sensitive Data Exposure vulnerability via a GET request to /user/getUserType. No authentication is required. The information disclosed is associated with the registered user ID, status, email address, role(s), user type, license type, and personal details such as first name, last name, gender, and user preferences.

CVSS3: 4.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-30361

OvalEdge 5.2.8.0 and earlier is affected by a Sensitive Data Exposure vulnerability via a GET request to /user/getUserType. No authentication is required. The information disclosed is associated with the registered user ID, status, email address, role(s), user type, license type, and personal details such as first name, last name, gender, and user preferences.

CVSS3: 5.3
0%
Низкий
больше 1 года назад
github логотип
GHSA-rh86-h8w6-hq8j

OvalEdge 5.2.8.0 and earlier is affected by a Sensitive Data Exposure vulnerability via a GET request to /user/getUserType. No authentication is required. The information disclosed is associated with the registered user ID, status, email address, role(s), user type, license type, and personal details such as first name, last name, gender, and user preferences.

CVSS3: 4.3
0%
Низкий
больше 1 года назад

Уязвимостей на страницу