A vulnerability was found in SourceCodester Simple Realtime Quiz System 1.0 and classified as critical. This issue affects some unknown processing of the file /ajax.php?action=login of the component Login. The manipulation of the argument username leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273353 was assigned to this vulnerability.
Metrics
Affected Vendors & Products
References
History
Wed, 07 Aug 2024 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Oretnom23
Oretnom23 simple Realtime Quiz System |
|
CPEs | cpe:2.3:a:oretnom23:simple_realtime_quiz_system:1.0:*:*:*:*:*:*:* | |
Vendors & Products |
Oretnom23
Oretnom23 simple Realtime Quiz System |
MITRE
Status: PUBLISHED
Assigner: VulDB
Published: 2024-08-01T22:00:08.540Z
Updated: 2024-08-02T14:48:30.941Z
Reserved: 2024-08-01T07:47:46.236Z
Link: CVE-2024-7369
Vulnrichment
Updated: 2024-08-02T14:47:56.655Z
NVD
Status : Analyzed
Published: 2024-08-01T22:15:52.433
Modified: 2024-08-07T19:03:26.293
Link: CVE-2024-7369
Redhat
No data.