Persistent cross-site scripting (XSS) issues in Jorani 0.6.5 allow remote attackers to inject arbitrary web script or HTML via the language parameter to session/language.
5.4CVSS
5.2AI Score
0.037EPSS
An issue was discovered in Jorani 0.6.5. SQL Injection (error-based) allows a user of the application without permissions to read and modify sensitive information from the database used by the application via the startdate or enddate parameter to leaves/validate.
5.4CVSS
5.7AI Score
0.001EPSS
Benjamin BALET Jorani v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at application/controllers/Leaves.php.
9.8CVSS
9.8AI Score
0.002EPSS
Benjamin BALET Jorani v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the Comment parameter at application/controllers/Leaves.php.
6.1CVSS
6AI Score
0.001EPSS
Benjamin BALET Jorani v1.0 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /application/controllers/Users.php.
8.8CVSS
8.8AI Score
0.001EPSS
Jorani v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the Acronym parameter.
6.1CVSS
6AI Score
0.001EPSS
In Jorani 1.0.0, an attacker could leverage path traversal to access files and execute code on the server.
9.8CVSS
9.4AI Score
0.932EPSS
An SQL Injection vulnerability has been found on Jorani version 1.0.0. This vulnerability allows an authenticated remote user, with low privileges, to send queries with malicious SQL code on the "/leaves/validate" path and the “id” parameter, managing to extract arbritary information from the datab...
8.8CVSS
8.8AI Score
0.001EPSS