A vulnerability classified as critical was found in SourceCodester Simple Realtime Quiz System 1.0. This vulnerability affects unknown code of the file /manage_user.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-273358 is the identifier assigned to this vulnerability.
References
Link | Resource |
---|---|
https://gist.github.com/topsky979/94ae61ff3fc760ac985dcd5e64da06c4 | Exploit |
https://vuldb.com/?ctiid.273358 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.273358 | Third Party Advisory |
https://vuldb.com/?submit.383522 | Third Party Advisory |
Configurations
History
09 Aug 2024, 11:25
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:oretnom23:simple_realtime_quiz_system:1.0:*:*:*:*:*:*:* | |
First Time |
Oretnom23 simple Realtime Quiz System
Oretnom23 |
|
References | () https://gist.github.com/topsky979/94ae61ff3fc760ac985dcd5e64da06c4 - Exploit | |
References | () https://vuldb.com/?ctiid.273358 - Permissions Required, Third Party Advisory | |
References | () https://vuldb.com/?id.273358 - Third Party Advisory | |
References | () https://vuldb.com/?submit.383522 - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 6.5
v3 : 9.8 |
02 Aug 2024, 12:59
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
02 Aug 2024, 01:16
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-02 01:16
Updated : 2024-08-09 11:25
NVD link : CVE-2024-7374
Mitre link : CVE-2024-7374
CVE.ORG link : CVE-2024-7374
JSON object : View
Products Affected
oretnom23
- simple_realtime_quiz_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')