Vulnerabilities
Vulnerable Software
Cal:  Security Vulnerabilities
Cal.com is open-source scheduling software. A vulnerability allows active sessions associated with an account to remain active even after enabling 2FA. When activating 2FA on a Cal.com account that is logged in on two or more devices, the account stays logged in on the other device(s) stays logged in without having to verify the account owner's identity. As of time of publication, no known patches or workarounds exist.
CVSS Score
6.5
EPSS Score
0.001
Published
2023-07-25
Improper Access Control in GitHub repository calcom/cal.com prior to 2.7.
CVSS Score
8.8
EPSS Score
0.001
Published
2023-03-27


Contact Us

Shodan ® - All rights reserved