A vulnerability, which was classified as critical, has been found in Campcodes Online Examination System 1.0. Affected by this issue is some unknown functionality of the file /adminpanel/admin/query/loginExe.php. The manipulation of the argument pass leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-258032.
References
Link | Resource |
---|---|
https://github.com/E1CHO/cve_hub/blob/main/Online%20Examination%20System/Online%20Examination%20System%20-%20vuln%201.pdf | Exploit |
https://vuldb.com/?ctiid.258032 | Permissions Required VDB Entry |
https://vuldb.com/?id.258032 | Permissions Required VDB Entry |
https://vuldb.com/?submit.304757 | Third Party Advisory VDB Entry |
https://github.com/E1CHO/cve_hub/blob/main/Online%20Examination%20System/Online%20Examination%20System%20-%20vuln%201.pdf | Exploit |
https://vuldb.com/?ctiid.258032 | Permissions Required VDB Entry |
https://vuldb.com/?id.258032 | Permissions Required VDB Entry |
https://vuldb.com/?submit.304757 | Third Party Advisory VDB Entry |
Configurations
History
20 Feb 2025, 18:28
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/E1CHO/cve_hub/blob/main/Online%20Examination%20System/Online%20Examination%20System%20-%20vuln%201.pdf - Exploit | |
References | () https://vuldb.com/?ctiid.258032 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.258032 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?submit.304757 - Third Party Advisory, VDB Entry | |
First Time |
Campcodes
Campcodes online Examination System |
|
CPE | cpe:2.3:a:campcodes:online_examination_system:1.0:*:*:*:*:*:*:* |
Information
Published : 2024-03-27 03:15
Updated : 2025-02-20 18:28
NVD link : CVE-2024-2941
Mitre link : CVE-2024-2941
CVE.ORG link : CVE-2024-2941
JSON object : View
Products Affected
campcodes
- online_examination_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')