CVE-2024-7368

A vulnerability has been found in SourceCodester Simple Realtime Quiz System 1.0 and classified as problematic. This vulnerability affects unknown code of the file /ajax.php?action=save_quiz. The manipulation of the argument title leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-273352.
Configurations

Configuration 1 (hide)

cpe:2.3:a:oretnom23:simple_realtime_quiz_system:1.0:*:*:*:*:*:*:*

History

07 Aug 2024, 19:03

Type Values Removed Values Added
CPE cpe:2.3:a:oretnom23:simple_realtime_quiz_system:1.0:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.4
First Time Oretnom23 simple Realtime Quiz System
Oretnom23
References () https://vuldb.com/?ctiid.273352 - () https://vuldb.com/?ctiid.273352 - Permissions Required
References () https://gist.github.com/topsky979/ad93f7046d905cef9277304dd3ac8061 - () https://gist.github.com/topsky979/ad93f7046d905cef9277304dd3ac8061 - Exploit
References () https://vuldb.com/?submit.383516 - () https://vuldb.com/?submit.383516 - VDB Entry
References () https://vuldb.com/?id.273352 - () https://vuldb.com/?id.273352 - Permissions Required

01 Aug 2024, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-01 22:15

Updated : 2024-08-07 19:03


NVD link : CVE-2024-7368

Mitre link : CVE-2024-7368


JSON object : View

Products Affected

oretnom23

  • simple_realtime_quiz_system
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')