Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 15 May 2026 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 15 May 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PHP Timeclock 1.04 contains time-based and boolean-based blind SQL injection vulnerabilities in the login_userid parameter of login.php that allows unauthenticated attackers to extract database contents. Attackers can submit crafted POST requests with SQL payloads using SLEEP functions or RLIKE conditional statements to dump sensitive database information including employee names and credentials. | |
| Title | PHP Timeclock 1.04 SQL Injection via login.php | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-15T22:22:09.612Z
Reserved: 2026-05-15T16:36:50.147Z
Link: CVE-2021-47966
Updated: 2026-05-15T22:12:26.773Z
Status : Received
Published: 2026-05-15T19:16:56.293
Modified: 2026-05-15T19:16:56.293
Link: CVE-2021-47966
No data.
OpenCVE Enrichment
Updated: 2026-05-15T20:30:06Z