mirror of
https://github.com/0xMarcio/cve.git
synced 2025-12-18 20:48:19 +00:00
19 lines
984 B
Markdown
19 lines
984 B
Markdown
|
|
### [CVE-2022-22110](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22110)
|
|||
|
|

|
|||
|
|

|
|||
|
|

|
|||
|
|

|
|||
|
|
|
|||
|
|
### Description
|
|||
|
|
|
|||
|
|
In Daybyday CRM, versions 1.1 through 2.2.0 enforce weak password requirements in the user update functionality. A user with privileges to update his password could change it to a weak password, such as those with a length of a single character. This may allow an attacker to brute-force users’ passwords with minimal to no computational effort.
|
|||
|
|
|
|||
|
|
### POC
|
|||
|
|
|
|||
|
|
#### Reference
|
|||
|
|
- https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22110
|
|||
|
|
|
|||
|
|
#### Github
|
|||
|
|
No PoCs found on GitHub currently.
|
|||
|
|
|