First published: Thu Aug 01 2024(Updated: )
A vulnerability was found in SourceCodester Simple Realtime Quiz System 1.0. It has been classified as critical. Affected is an unknown function of the file /manage_quiz.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-273354 is the identifier assigned to this vulnerability.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oretnom23 Simple Realtime Quiz System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7370 is classified as critical due to its potential for SQL injection attacks.
To fix CVE-2024-7370, ensure that input validation and prepared statements are implemented in the affected /manage_quiz.php file.
CVE-2024-7370 allows remote attackers to execute arbitrary SQL queries, leading to data exposure or corruption.
CVE-2024-7370 affects version 1.0 of the SourceCodester Simple Realtime Quiz System.
Yes, CVE-2024-7370 can be exploited remotely, allowing attackers to manipulate the id argument for SQL injection.