OvalEdge 5.2.8.0 and earlier is affected by a Sensitive Data Exposure vulnerability via a GET request to /user/getUserType. No authentication is required. The information disclosed is associated with the registered user ID, status, email address, role(s), user type, license type, and personal details such as first name, last name, gender, and user preferences.
                
            Metrics
Affected Vendors & Products
References
        History
                    Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | epss 
 | epss 
 | 
Tue, 29 Oct 2024 20:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Ovaledge Ovaledge ovaledge | |
| Weaknesses | CWE-922 | |
| CPEs | cpe:2.3:a:ovaledge:ovaledge:*:*:*:*:*:*:*:* | |
| Vendors & Products | Ovaledge Ovaledge ovaledge | |
| Metrics | cvssV3_1 
 
 | 
Fri, 25 Oct 2024 16:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | OvalEdge 5.2.8.0 and earlier is affected by a Sensitive Data Exposure vulnerability via a GET request to /user/getUserType. No authentication is required. The information disclosed is associated with the registered user ID, status, email address, role(s), user type, license type, and personal details such as first name, last name, gender, and user preferences. | |
| References |  | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: mitre
Published: 2024-10-25T00:00:00
Updated: 2024-10-29T19:36:05.038Z
Reserved: 2022-05-09T00:00:00
Link: CVE-2022-30361
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-10-29T19:35:58.555Z
 NVD
                        NVD
                    Status : Analyzed
Published: 2024-10-25T17:15:03.700
Modified: 2024-10-31T16:34:18.877
Link: CVE-2022-30361
 Redhat
                        Redhat
                    No data.
 ReportizFlow
ReportizFlow