First published: Thu Aug 01 2024(Updated: )
A vulnerability was found in SourceCodester Simple Realtime Quiz System 1.0 and classified as critical. This issue affects some unknown processing of the file /ajax.php?action=login of the component Login. The manipulation of the argument username leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273353 was assigned to this vulnerability.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oretnom23 Simple Realtime Quiz System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7369 is classified as a critical vulnerability.
To fix CVE-2024-7369, it is recommended to apply input validation and sanitization measures for the username parameter in the /ajax.php?action=login file.
CVE-2024-7369 is an SQL injection vulnerability.
CVE-2024-7369 affects the SourceCodester Simple Realtime Quiz System version 1.0.
CVE-2024-7369 impacts the Login component within the application.