First published: Fri Aug 02 2024(Updated: )
A vulnerability classified as critical was found in SourceCodester Simple Realtime Quiz System 1.0. This vulnerability affects unknown code of the file /manage_user.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-273358 is the identifier assigned to this vulnerability.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oretnom23 Simple Realtime Quiz System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7374 is classified as a critical vulnerability.
CVE-2024-7374 affects the /manage_user.php file and allows for SQL injection through the manipulation of the id argument.
Yes, the exploit for CVE-2024-7374 can be initiated remotely.
CVE-2024-7374 affects version 1.0 of the Simple Realtime Quiz System.
CVE-2024-7374 is associated with SQL injection attacks.