First published: Fri Aug 02 2024(Updated: )
A vulnerability classified as critical has been found in SourceCodester Simple Realtime Quiz System 1.0. This affects an unknown part of the file /ajax.php?action=load_answered. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273357 was assigned to this vulnerability.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oretnom23 Simple Realtime Quiz System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7373 is classified as a critical vulnerability.
CVE-2024-7373 is an SQL injection vulnerability.
To fix CVE-2024-7373, ensure that input sanitation is properly implemented for the 'id' parameter in the /ajax.php?action=load_answered file.
Yes, CVE-2024-7373 can be exploited remotely.
CVE-2024-7373 affects SourceCodester Simple Realtime Quiz System version 1.0.