First published: Mon May 20 2024(Updated: )
A vulnerability classified as problematic has been found in PHPGurukul Directory Management System 1.0. Affected is an unknown function of the file /admin/search-directory.php.. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-265212.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
PHPGurukul Directory Management System | ||
=1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-5136 is classified as a problematic vulnerability due to its potential for remote exploitation via cross-site scripting.
To fix CVE-2024-5136, ensure that input validation and output encoding mechanisms are correctly implemented in the affected file, /admin/search-directory.php.
CVE-2024-5136 is associated with cross-site scripting (XSS) vulnerabilities that allow attackers to manipulate web content.
CVE-2024-5136 affects PHPGurukul Directory Management System version 1.0.
Yes, CVE-2024-5136 can be exploited remotely, allowing attackers to launch cross-site scripting attacks from anywhere.