Description
In DayByDay CRM, versions 2.2.0 through 2.2.1 (latest) are vulnerable to Insufficient Session Expiration. When a password has been changed by the user or by an administrator, a user that was already logged in, will still have access to the application even after the password was changed.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-27262 | In DayByDay CRM, versions 2.2.0 through 2.2.1 (latest) are vulnerable to Insufficient Session Expiration. When a password has been changed by the user or by an administrator, a user that was already logged in, will still have access to the application even after the password was changed. |
References
History
No history.
Status: PUBLISHED
Assigner: Mend
Published:
Updated: 2024-09-17T02:31:21.087Z
Reserved: 2021-12-21T00:00:00.000Z
Link: CVE-2022-22113
No data.
Status : Modified
Published: 2022-01-13T09:15:07.480
Modified: 2024-11-21T06:46:12.540
Link: CVE-2022-22113
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD