An SQL Injection vulnerability has been found on Jorani version 1.0.0. This vulnerability allows an authenticated remote user, with low privileges, to send queries with malicious SQL code on the "/leaves/validate" path and the “id” parameter, managing to extract arbritary information from the...
8.8CVSS
8.8AI Score
0.001EPSS
In Jorani 1.0.0, an attacker could leverage path traversal to access files and execute code on the...
9.8CVSS
9.4AI Score
0.932EPSS
Jorani v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the Acronym...
6.1CVSS
6AI Score
0.001EPSS
Benjamin BALET Jorani v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the Comment parameter at...
6.1CVSS
6AI Score
0.001EPSS
Benjamin BALET Jorani v1.0 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component...
8.8CVSS
8.8AI Score
0.001EPSS
Benjamin BALET Jorani v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at...
9.8CVSS
9.8AI Score
0.002EPSS
An issue was discovered in Jorani 0.6.5. SQL Injection (error-based) allows a user of the application without permissions to read and modify sensitive information from the database used by the application via the startdate or enddate parameter to...
5.4CVSS
5.7AI Score
0.001EPSS
Persistent cross-site scripting (XSS) issues in Jorani 0.6.5 allow remote attackers to inject arbitrary web script or HTML via the language parameter to...
5.4CVSS
5.2AI Score
0.037EPSS