Page 2 of 12 results (0.008 seconds)

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

A vulnerability classified as critical has been found in SourceCodester Simple Realtime Quiz System 1.0. This affects an unknown part of the file /ajax.php?action=load_answered. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. • https://gist.github.com/topsky979/9bcb8b09acce0d5a8a453dfd5093881d https://vuldb.com/?ctiid.273357 https://vuldb.com/?id.273357 https://vuldb.com/?submit.383521 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

A vulnerability was found in SourceCodester Simple Realtime Quiz System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /quiz_board.php. The manipulation of the argument quiz leads to sql injection. The attack may be launched remotely. • https://gist.github.com/topsky979/6437f7c2f86d309ca000d0a33885d7bc https://vuldb.com/?ctiid.273356 https://vuldb.com/?id.273356 https://vuldb.com/?submit.383520 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

A vulnerability was found in SourceCodester Simple Realtime Quiz System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /quiz_view.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. • https://vuldb.com/?id.273355 https://vuldb.com/?ctiid.273355 https://vuldb.com/?submit.383519 https://gist.github.com/topsky979/e45c2b283d29bc0a2f3551ca9cb45999 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

A vulnerability was found in SourceCodester Simple Realtime Quiz System 1.0. It has been classified as critical. Affected is an unknown function of the file /manage_quiz.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. • https://vuldb.com/?id.273354 https://vuldb.com/?ctiid.273354 https://vuldb.com/?submit.383518 https://gist.github.com/topsky979/df0a5328ddb5b43ab7fa933aee500155 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

A vulnerability was found in SourceCodester Simple Realtime Quiz System 1.0 and classified as critical. This issue affects some unknown processing of the file /ajax.php?action=login of the component Login. The manipulation of the argument username leads to sql injection. The attack may be initiated remotely. • https://gist.github.com/topsky979/5e805f42f51224bdd52cfd099f44001d https://vuldb.com/?ctiid.273353 https://vuldb.com/?id.273353 https://vuldb.com/?submit.383517 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •