CVE-2024-7376

A vulnerability, which was classified as critical, was found in SourceCodester Simple Realtime Quiz System 1.0. Affected is an unknown function of the file /print_quiz_records.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-273360.
References
Link Resource
https://gist.github.com/topsky979/8c36e6a899fc02e8054f67b94e34f6c6 Exploit
https://vuldb.com/?ctiid.273360 Permissions Required Third Party Advisory
https://vuldb.com/?id.273360 Third Party Advisory
https://vuldb.com/?submit.383524 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:oretnom23:simple_realtime_quiz_system:1.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2024-08-02 02:15

Updated : 2024-08-09 11:22


NVD link : CVE-2024-7376

Mitre link : CVE-2024-7376

CVE.ORG link : CVE-2024-7376


JSON object : View

Products Affected

oretnom23

  • simple_realtime_quiz_system
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')