Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:ocomon_project:ocomon:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C6F88F7-8D64-4B93-B434-3CD4C3823CBC", "versionEndExcluding": "4.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:ocomon_project:ocomon:4.0:-:*:*:*:*:*:*", "matchCriteriaId": "F2344956-8C2F-4B56-882D-20EA4F7A3EEE", "vulnerable": true}, {"criteria": "cpe:2.3:a:ocomon_project:ocomon:4.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "864B6EC3-39B6-4FCA-80D0-412141006E65", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "OcoMon 4.0RC1 is vulnerable to Incorrect Access Control. Through a request the user can obtain the real email, sending the same request with correct email its possible to account takeover."}, {"lang": "es", "value": "OcoMon versi\u00f3n 4.0RC1, es vulnerable a un Control de Acceso Incorrecto. Mediante una petici\u00f3n el usuario puede obtener el correo electr\u00f3nico real, enviando la misma petici\u00f3n con el correo electr\u00f3nico correcto es una toma de control de cuenta"}], "id": "CVE-2022-40798", "lastModified": "2024-11-21T07:22:03.537", "metrics": {"cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1"}, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2022-10-19T02:15:09.060", "references": [{"source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"], "url": "https://gist.github.com/ninj4c0d3r/89bdd6702bf00d768302f5e0e5bb8adc"}, {"source": "cve@mitre.org", "tags": ["Product", "Third Party Advisory"], "url": "https://ocomonphp.sourceforge.io/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"], "url": "https://gist.github.com/ninj4c0d3r/89bdd6702bf00d768302f5e0e5bb8adc"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Product", "Third Party Advisory"], "url": "https://ocomonphp.sourceforge.io/"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-Other"}], "source": "nvd@nist.gov", "type": "Primary"}]}