A vulnerability was found in SourceCodester Simple Realtime Quiz System 1.0 and classified as critical. This issue affects some unknown processing of the file /ajax.php?action=login of the component Login. The manipulation of the argument username leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273353 was assigned to this vulnerability.
Metrics
Affected Vendors & Products
References
History
Wed, 07 Aug 2024 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Oretnom23
Oretnom23 simple Realtime Quiz System |
|
CPEs | cpe:2.3:a:oretnom23:simple_realtime_quiz_system:1.0:*:*:*:*:*:*:* | |
Vendors & Products |
Oretnom23
Oretnom23 simple Realtime Quiz System |

Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2024-08-02T14:48:30.941Z
Reserved: 2024-08-01T07:47:46.236Z
Link: CVE-2024-7369

Updated: 2024-08-02T14:47:56.655Z

Status : Analyzed
Published: 2024-08-01T22:15:52.433
Modified: 2024-08-07T19:03:26.293
Link: CVE-2024-7369

No data.