OpenCRX before v5.2.2 was discovered to be vulnerable to password enumeration due to the difference in error messages received during a password reset which could enable an attacker to determine if a username, email or ID is valid.
{ "versions": [ { "introduced": "0" }, { "last_affected": "5.2.2" } ] }
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-40084.json"