First published: Sat Oct 19 2024(Updated: )
A vulnerability was found in PHPGurukul Boat Booking System 1.0. It has been classified as problematic. This affects an unknown part of the file book-boat.php?bid=1 of the component Book a Boat Page. The manipulation of the argument phone_number leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
PHPGurukul Boat Booking System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-10155 has been classified as problematic due to its potential to allow cross-site scripting.
To fix CVE-2024-10155, sanitize and validate user inputs for the phone_number argument in the book-boat.php component.
CVE-2024-10155 affects the Book a Boat Page in the PHPGurukul Boat Booking System version 1.0.
CVE-2024-10155 is a cross-site scripting vulnerability.
Users of the PHPGurukul Boat Booking System version 1.0 are affected by CVE-2024-10155.