Description
A vulnerability was found in SourceCodester Simple Realtime Quiz System 1.0 and classified as critical. This issue affects some unknown processing of the file /ajax.php?action=login of the component Login. The manipulation of the argument username leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273353 was assigned to this vulnerability.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-48306 | A vulnerability was found in SourceCodester Simple Realtime Quiz System 1.0 and classified as critical. This issue affects some unknown processing of the file /ajax.php?action=login of the component Login. The manipulation of the argument username leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273353 was assigned to this vulnerability. |
References
History
Wed, 07 Aug 2024 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Oretnom23
Oretnom23 simple Realtime Quiz System |
|
| CPEs | cpe:2.3:a:oretnom23:simple_realtime_quiz_system:1.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Oretnom23
Oretnom23 simple Realtime Quiz System |
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2024-08-02T14:48:30.941Z
Reserved: 2024-08-01T07:47:46.236Z
Link: CVE-2024-7369
Updated: 2024-08-02T14:47:56.655Z
Status : Analyzed
Published: 2024-08-01T22:15:52.433
Modified: 2024-08-07T19:03:26.293
Link: CVE-2024-7369
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD