Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-7113 | OpenCRX before v5.2.2 was discovered to be vulnerable to password enumeration due to the difference in error messages received during a password reset which could enable an attacker to determine if a username, email or ID is valid. |
Github GHSA |
GHSA-j5v3-363p-g843 | OpenCRX vulnerable to password enumeration via error messages in password reset |
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 08 May 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-05-08T15:49:42.205Z
Reserved: 2022-09-06T00:00:00.000Z
Link: CVE-2022-40084
Updated: 2024-08-03T12:14:39.776Z
Status : Modified
Published: 2022-10-20T14:15:09.897
Modified: 2025-05-08T16:15:21.743
Link: CVE-2022-40084
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA