First published: Tue Dec 31 2024(Updated: )
A vulnerability, which was classified as problematic, has been found in PHPGurukul Land Record System 1.0. This issue affects some unknown processing of the file /admin/edit-propertytype.php. The manipulation of the argument Property Type leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
PHPGurukul Land Record System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-13076 is classified as problematic, indicating a significant risk associated with the vulnerability.
To mitigate CVE-2024-13076, it is recommended to sanitize user input in the /admin/edit-propertytype.php file to prevent cross-site scripting.
CVE-2024-13076 affects PHPGurukul Land Record System version 1.0.
CVE-2024-13076 enables cross-site scripting (XSS) attacks through improper handling of input in the application.
The publication date for CVE-2024-13076 has not been specified in the provided information.