CVE-2024-7375

A vulnerability, which was classified as critical, has been found in SourceCodester Simple Realtime Quiz System 1.0. This issue affects some unknown processing of the file /my_quiz_result.php. The manipulation of the argument quiz leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-273359.
References
Link Resource
https://vuldb.com/?id.273359 Third Party Advisory
https://vuldb.com/?ctiid.273359 Permissions Required Third Party Advisory
https://vuldb.com/?submit.383523 Third Party Advisory
https://gist.github.com/topsky979/840587360c33d53efb359ff314f7ea24 Exploit
Configurations

Configuration 1 (hide)

cpe:2.3:a:oretnom23:simple_realtime_quiz_system:1.0:*:*:*:*:*:*:*

History

09 Aug 2024, 11:24

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
First Time Oretnom23 simple Realtime Quiz System
Oretnom23
References () https://vuldb.com/?submit.383523 - () https://vuldb.com/?submit.383523 - Third Party Advisory
References () https://gist.github.com/topsky979/840587360c33d53efb359ff314f7ea24 - () https://gist.github.com/topsky979/840587360c33d53efb359ff314f7ea24 - Exploit
References () https://vuldb.com/?id.273359 - () https://vuldb.com/?id.273359 - Third Party Advisory
References () https://vuldb.com/?ctiid.273359 - () https://vuldb.com/?ctiid.273359 - Permissions Required, Third Party Advisory
CPE cpe:2.3:a:oretnom23:simple_realtime_quiz_system:1.0:*:*:*:*:*:*:*

02 Aug 2024, 01:16

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-02 01:16

Updated : 2024-08-09 11:24


NVD link : CVE-2024-7375

Mitre link : CVE-2024-7375


JSON object : View

Products Affected

oretnom23

  • simple_realtime_quiz_system
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')