First published: Thu Aug 01 2024(Updated: )
A vulnerability has been found in SourceCodester Simple Realtime Quiz System 1.0 and classified as problematic. This vulnerability affects unknown code of the file /ajax.php?action=save_quiz. The manipulation of the argument title leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-273352.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oretnom23 Simple Realtime Quiz System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-7368 is classified as problematic, indicating it poses a significant security risk.
CVE-2024-7368 affects the file /ajax.php?action=save_quiz, allowing for cross-site scripting through manipulation of the 'title' argument.
To fix CVE-2024-7368, ensure proper input validation and sanitization for the 'title' argument in the affected code.
CVE-2024-7368 is classified as a cross-site scripting (XSS) vulnerability.
CVE-2024-7368 affects version 1.0 of the SourceCodester Simple Realtime Quiz System.