Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Timesheet Next Gen | Timesheet Next Gen | 1.5.3 and earlier | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Timesheet Next Gen 1.5.3 and earlier is vulnerable to cross-site scripting that allows an attacker to execute arbitrary HTML and JavaScript code via a "redirect" parameter. The component is: Web login form: login.php, lines 40 and 54. The attack vector is: reflected XSS, victim may click the malicious url. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2019/CVE-2019-1010287.yaml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet