A vulnerability classified as critical has been found in SourceCodester Simple Realtime Quiz System 1.0. This affects an unknown part of the file /ajax.php?action=load_answered. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273357 was assigned to this vulnerability.
Metrics
Affected Vendors & Products
References
History
Wed, 07 Aug 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Oretnom23
Oretnom23 simple Realtime Quiz System |
|
CPEs | cpe:2.3:a:oretnom23:simple_realtime_quiz_system:1.0:*:*:*:*:*:*:* | |
Vendors & Products |
Oretnom23
Oretnom23 simple Realtime Quiz System |
MITRE
Status: PUBLISHED
Assigner: VulDB
Published: 2024-08-02T00:00:10.342Z
Updated: 2024-08-02T14:19:34.157Z
Reserved: 2024-08-01T07:47:57.678Z
Link: CVE-2024-7373
Vulnrichment
Updated: 2024-08-02T14:19:23.436Z
NVD
Status : Analyzed
Published: 2024-08-02T00:15:49.667
Modified: 2024-08-07T18:45:29.873
Link: CVE-2024-7373
Redhat
No data.