Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
daybydaycrm daybyday crm 2.2.0 vulnerabilities and exploits
(subscribe to this query)
312
VMScore
CVE-2022-22109
In Daybyday CRM, version 2.2.0 is vulnerable to Stored Cross-Site Scripting (XSS) vulnerability that allows low privileged application users to store malicious scripts in the title field of new tasks. These scripts are executed in a victim’s browser when they open the &ldqu...
Daybydaycrm Daybyday Crm 2.2.0
580
VMScore
CVE-2022-22111
In DayByDay CRM, version 2.2.0 is vulnerable to missing authorization. Any application user in the application who has update user permission enabled is able to change the password of other users, including the administrator’s. This allows the malicious user to gain access ...
Daybydaycrm Daybyday Crm 2.2.0
357
VMScore
CVE-2022-22108
In Daybyday CRM, versions 2.0.0 up to and including 2.2.0 are vulnerable to Missing Authorization. An attacker that has the lowest privileges account (employee type user), can view the absences of all users in the system including administrators. This type of user is not authoriz...
Daybydaycrm Daybyday Crm
357
VMScore
CVE-2022-22107
In Daybyday CRM, versions 2.0.0 up to and including 2.2.0 are vulnerable to Missing Authorization. An attacker that has the lowest privileges account (employee type user), can view the appointments of all users in the system including administrators. However, this type of user is...
Daybydaycrm Daybyday Crm
446
VMScore
CVE-2022-22110
In Daybyday CRM, versions 1.1 up to and including 2.2.0 enforce weak password requirements in the user update functionality. A user with privileges to update his password could change it to a weak password, such as those with a length of a single character. This may allow an mali...
Daybydaycrm Daybyday Crm
580
VMScore
CVE-2022-22113
In DayByDay CRM, versions 2.2.0 up to and including 2.2.1 (latest) are vulnerable to Insufficient Session Expiration. When a password has been changed by the user or by an administrator, a user that was already logged in, will still have access to the application even after the p...
Daybydaycrm Daybyday
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
HTML injection
CVE-2024-35894
SQL
CVE-2024-5105
CVE-2014-100005
CVE-2024-35895
unauthorized
CVE-2024-22120
CVE-2024-35890
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started