A vulnerability, which was classified as critical, has been found in PHPGurukul Land Record System 1.0. Affected by this issue is some unknown functionality of the file /admin/login.php. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://phpgurukul.com/ | Product |
https://vuldb.com/?ctiid.289838 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.289838 | Permissions Required Third Party Advisory |
https://vuldb.com/?submit.472196 | Third Party Advisory |
Configurations
History
06 Jan 2025, 14:43
Type | Values Removed | Values Added |
---|---|---|
First Time |
Phpgurukul land Record System
Phpgurukul |
|
CPE | cpe:2.3:a:phpgurukul:land_record_system:1.0:*:*:*:*:*:*:* | |
References | () https://phpgurukul.com/ - Product | |
References | () https://vuldb.com/?ctiid.289838 - Permissions Required, Third Party Advisory | |
References | () https://vuldb.com/?id.289838 - Permissions Required, Third Party Advisory | |
References | () https://vuldb.com/?submit.472196 - Third Party Advisory |
31 Dec 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-31 23:15
Updated : 2025-01-06 14:43
NVD link : CVE-2024-13085
Mitre link : CVE-2024-13085
CVE.ORG link : CVE-2024-13085
JSON object : View
Products Affected
phpgurukul
- land_record_system