OvalEdge 5.2.8.0 and earlier is affected by a Sensitive Data Exposure vulnerability via a GET request to /user/getUserList. Authentication is required. The information disclosed is associated with the all registered users, including user ID, status, email address, role(s), user type, license type, and personal details such as first name, last name, gender, and user preferences.
Metrics
Affected Vendors & Products
References
History
Thu, 31 Oct 2024 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-922 |
Tue, 29 Oct 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Ovaledge
Ovaledge ovaledge |
|
Weaknesses | CWE-79 | |
CPEs | cpe:2.3:a:ovaledge:ovaledge:*:*:*:*:*:*:*:* | |
Vendors & Products |
Ovaledge
Ovaledge ovaledge |
|
Metrics |
cvssV3_1
|
Fri, 25 Oct 2024 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | OvalEdge 5.2.8.0 and earlier is affected by a Sensitive Data Exposure vulnerability via a GET request to /user/getUserList. Authentication is required. The information disclosed is associated with the all registered users, including user ID, status, email address, role(s), user type, license type, and personal details such as first name, last name, gender, and user preferences. | |
References |
|
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2024-10-25T00:00:00
Updated: 2024-10-29T19:33:12.225Z
Reserved: 2022-05-09T00:00:00
Link: CVE-2022-30359
Vulnrichment
Updated: 2024-10-29T19:33:03.634Z
NVD
Status : Analyzed
Published: 2024-10-25T17:15:03.570
Modified: 2024-10-31T16:37:47.300
Link: CVE-2022-30359
Redhat
No data.