First published: Thu Aug 01 2024(Updated: )
A vulnerability classified as critical was found in SourceCodester Tracking Monitoring Management System 1.0. This vulnerability affects unknown code of the file /ajax.php?action=save_establishment. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-273340.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oretnom23 Tracking Monitoring Management System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7361 is classified as a critical vulnerability.
CVE-2024-7361 affects the file /ajax.php of the Tracking Monitoring Management System, allowing for SQL injection.
Yes, CVE-2024-7361 can be exploited remotely by an attacker.
CVE-2024-7361 is identified as an SQL injection vulnerability.
To mitigate CVE-2024-7361, it is crucial to update or patch the Tracking Monitoring Management System to a version that addresses this SQL injection vulnerability.