OpenCRX before v5.2.2 was discovered to be vulnerable to password enumeration due to the difference in error messages received during a password reset which could enable an attacker to determine if a username, email or ID is valid.
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-40084.json"