Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 15 May 2026 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 15 May 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PHP Timeclock 1.04 contains time-based and boolean-based blind SQL injection vulnerabilities in the login_userid parameter of login.php that allows unauthenticated attackers to extract database contents. Attackers can submit crafted POST requests with SQL payloads using SLEEP functions or RLIKE conditional statements to dump sensitive database information including employee names and credentials. | |
| Title | PHP Timeclock 1.04 SQL Injection via login.php | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-15T22:22:09.612Z
Reserved: 2026-05-15T16:36:50.147Z
Link: CVE-2021-47966
Updated: 2026-05-15T22:12:26.773Z
Status : Received
Published: 2026-05-15T19:16:56.293
Modified: 2026-05-15T19:16:56.293
Link: CVE-2021-47966
No data.
OpenCVE Enrichment
Updated: 2026-05-15T20:30:06Z