Best House Rental Management System v1.0 was discovered to contain an arbitrary file read vulnerability via the Page parameter at index.php. This vulnerability allows attackers to read arbitrary PHP files and access other sensitive information within the application.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/KRookieSec/CVE-2024-39210 | Third Party Advisory | 
| https://github.com/KRookieSec/CVE-2024-39210 | Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 09:27
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/KRookieSec/CVE-2024-39210 - Third Party Advisory | 
10 Oct 2024, 12:35
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:a:mayurik:best_house_rental_management_system:*:*:*:*:*:*:*:* | |
| First Time | Mayurik best House Rental Management System Mayurik | 
09 Jul 2024, 16:22
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | CWE-200 | 
08 Jul 2024, 16:36
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/KRookieSec/CVE-2024-39210 - Third Party Advisory | |
| CVSS | v2 : v3 : | v2 : unknown v3 : 7.5 | 
| Summary | 
 | |
| First Time | Best House Rental Management System Project best House Rental Management System Best House Rental Management System Project | |
| CWE | NVD-CWE-Other | |
| CPE | cpe:2.3:a:best_house_rental_management_system_project:best_house_rental_management_system:*:*:*:*:*:*:*:* | 
05 Jul 2024, 16:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-07-05 16:15
Updated : 2024-11-21 09:27
NVD link : CVE-2024-39210
Mitre link : CVE-2024-39210
CVE.ORG link : CVE-2024-39210
JSON object : View
Products Affected
                mayurik
- best_house_rental_management_system
CWE
                