Product:

Daybyday

(Daybydaycrm)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 6
Date Id Summary Products Score Patch Annotated
2020-12-25 CVE-2020-35704 Daybyday 2.1.0 allows stored XSS via the Title parameter to the New Lead screen. Daybyday 5.4
2020-12-25 CVE-2020-35705 Daybyday 2.1.0 allows stored XSS via the Name parameter to the New User screen. Daybyday 5.4
2020-12-25 CVE-2020-35706 Daybyday 2.1.0 allows stored XSS via the Title parameter to the New Project screen. Daybyday 5.4
2020-12-25 CVE-2020-35707 Daybyday 2.1.0 allows stored XSS via the Company Name parameter to the New Client screen. Daybyday 5.4
2022-01-13 CVE-2022-22112 In DayByDay CRM, versions 1.1 through 2.2.1 (latest) suffer from an application-wide Client-Side Template Injection (CSTI). A low privileged attacker can input template injection payloads in the application at various locations to execute JavaScript on the client browser. Daybyday N/A
2022-01-13 CVE-2022-22113 In DayByDay CRM, versions 2.2.0 through 2.2.1 (latest) are vulnerable to Insufficient Session Expiration. When a password has been changed by the user or by an administrator, a user that was already logged in, will still have access to the application even after the password was changed. Daybyday 8.8