First published: Sun Nov 03 2024(Updated: )
A vulnerability was found in PHPGurukul Online Shopping Portal 2.0. It has been classified as problematic. Affected is an unknown function of the file /shopping/admin/assets/plugins/DataTables/examples/examples_support/editable_ajax.php. The manipulation of the argument value leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
PHPGurukul Online Shopping Portal Project | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-10743 is classified as a problematic vulnerability.
CVE-2024-10743 involves manipulation of argument values leading to potential security issues.
CVE-2024-10743 affects the unknown function within the file /shopping/admin/assets/plugins/DataTables/examples/examples_support/editable_ajax.php.
To fix CVE-2024-10743, it is recommended to review and sanitize user inputs in the affected function.
Yes, CVE-2024-10743 specifically affects PHPGurukul Online Shopping Portal version 2.0.