Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 15 May 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 15 May 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PHP Timeclock 1.04 contains multiple cross-site scripting vulnerabilities that allow unauthenticated attackers to inject arbitrary JavaScript by manipulating URL paths and POST parameters. Attackers can append malicious payloads to login.php, timeclock.php, audit.php, and timerpt.php endpoints, or inject code through from_date and to_date parameters in report requests to execute scripts in user browsers. | |
| Title | PHP Timeclock 1.04 Multiple Cross-Site Scripting via Parameters | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-15T21:14:04.044Z
Reserved: 2026-05-15T16:37:12.642Z
Link: CVE-2021-47967
Updated: 2026-05-15T21:14:00.289Z
Status : Received
Published: 2026-05-15T19:16:56.433
Modified: 2026-05-15T19:16:56.433
Link: CVE-2021-47967
No data.
OpenCVE Enrichment
Updated: 2026-05-15T20:30:06Z