Description
Multiple SQL injection vulnerabilities in login.php in Timesheet Next Gen 1.5.2 allow remote attackers to execute arbitrary SQL commands via the (1) username or (2) password parameters.
Exploits (1)
References (9)
Core 9
Core References
Mailing List mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2012/04/16/7
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/48239
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/52270
Product x_refsource_misc
http://sourceforge.net/apps/mantisbt/tsheetx/view.php?id=122
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/18554
Mailing List mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2012/04/16/4
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/73680
Exploit mailing-list
x_refsource_bugtraq
http://archives.neohapsis.com/archives/bugtraq/2012-03/0011.html
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/79804
Scores
EPSS
0.0046
EPSS Percentile
64.3%
Details
CWE
CWE-89
Status
published
Products (1)
peter_kovacs/timesheet_next_gen
1.5.2
Published
Sep 19, 2012
Tracked Since
Feb 18, 2026