CVE-2024-7372

A vulnerability was found in SourceCodester Simple Realtime Quiz System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /quiz_board.php. The manipulation of the argument quiz leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-273356.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:oretnom23:simple_realtime_quiz_system:1.0:*:*:*:*:*:*:*

History

07 Aug 2024, 18:47

Type Values Removed Values Added
CPE cpe:2.3:a:oretnom23:simple_realtime_quiz_system:1.0:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
First Time Oretnom23 simple Realtime Quiz System
Oretnom23
References () https://vuldb.com/?submit.383520 - () https://vuldb.com/?submit.383520 - Third Party Advisory, VDB Entry
References () https://gist.github.com/topsky979/6437f7c2f86d309ca000d0a33885d7bc - () https://gist.github.com/topsky979/6437f7c2f86d309ca000d0a33885d7bc - Exploit
References () https://vuldb.com/?ctiid.273356 - () https://vuldb.com/?ctiid.273356 - Permissions Required
References () https://vuldb.com/?id.273356 - () https://vuldb.com/?id.273356 - Third Party Advisory

02 Aug 2024, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-02 00:15

Updated : 2024-08-07 18:47


NVD link : CVE-2024-7372

Mitre link : CVE-2024-7372


JSON object : View

Products Affected

oretnom23

  • simple_realtime_quiz_system
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')