A vulnerability was found in PHPGurukul Land Record System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /admin/search-property.php. The manipulation of the argument Search By leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://phpgurukul.com/ | Product |
https://vuldb.com/?ctiid.289835 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.289835 | Third Party Advisory |
https://vuldb.com/?submit.472193 | Third Party Advisory |
Configurations
History
06 Jan 2025, 14:46
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:phpgurukul:land_record_system:1.0:*:*:*:*:*:*:* | |
First Time |
Phpgurukul land Record System
Phpgurukul |
|
References | () https://phpgurukul.com/ - Product | |
References | () https://vuldb.com/?ctiid.289835 - Permissions Required, Third Party Advisory | |
References | () https://vuldb.com/?id.289835 - Third Party Advisory | |
References | () https://vuldb.com/?submit.472193 - Third Party Advisory |
31 Dec 2024, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-31 21:15
Updated : 2025-01-06 14:46
NVD link : CVE-2024-13082
Mitre link : CVE-2024-13082
CVE.ORG link : CVE-2024-13082
JSON object : View
Products Affected
phpgurukul
- land_record_system