Benjamin BALET Jorani v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at application/controllers/Leaves.php.
9.8CVSS
9.8AI Score
0.002EPSS
Benjamin BALET Jorani v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the Comment parameter at application/controllers/Leaves.php.
6.1CVSS
6AI Score
0.001EPSS
Benjamin BALET Jorani v1.0 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /application/controllers/Users.php.
8.8CVSS
8.8AI Score
0.001EPSS
Jorani v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the Acronym parameter.
6.1CVSS
6AI Score
0.001EPSS
In Jorani 1.0.0, an attacker could leverage path traversal to access files and execute code on the server.
9.8CVSS
9.4AI Score
0.932EPSS
An SQL Injection vulnerability has been found on Jorani version 1.0.0. This vulnerability allows an authenticated remote user, with low privileges, to send queries with malicious SQL code on the "/leaves/validate" path and the “id” parameter, managing to extract arbritary information from the datab...
8.8CVSS
8.8AI Score
0.001EPSS
An issue in Jorani Leave Management System 1.0.3 allows a remote attacker to execute arbitrary HTML code via a crafted script to the comment field of the List of Leave requests page.
6.5CVSS
6.7AI Score
0.001EPSS
Jorani Leave Management System 1.0.2 allows a remote attacker to spoof a Host header associated with password reset emails.
5.3CVSS
5.3AI Score
0.001EPSS