First published: Fri Aug 02 2024(Updated: )
A vulnerability was found in SourceCodester Simple Realtime Quiz System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /manage_question.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-273362 is the identifier assigned to this vulnerability.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oretnom23 Simple Realtime Quiz System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7378 is classified as a critical vulnerability.
CVE-2024-7378 allows for SQL injection through the manipulation of the 'id' argument in the file /manage_question.php.
CVE-2024-7378 affects SourceCodester Simple Realtime Quiz System version 1.0.
To fix CVE-2024-7378, sanitize and validate all user inputs to prevent SQL injection.
Yes, CVE-2024-7378 can be exploited remotely, which increases its potential impact.