Page 39 of 507 results (0.016 seconds)

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

A vulnerability was found in SourceCodester Simple Realtime Quiz System 1.0. It has been classified as critical. Affected is an unknown function of the file /manage_quiz.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. • https://vuldb.com/?id.273354 https://vuldb.com/?ctiid.273354 https://vuldb.com/?submit.383518 https://gist.github.com/topsky979/df0a5328ddb5b43ab7fa933aee500155 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

A vulnerability was found in SourceCodester Simple Realtime Quiz System 1.0 and classified as critical. This issue affects some unknown processing of the file /ajax.php?action=login of the component Login. The manipulation of the argument username leads to sql injection. The attack may be initiated remotely. • https://gist.github.com/topsky979/5e805f42f51224bdd52cfd099f44001d https://vuldb.com/?ctiid.273353 https://vuldb.com/?id.273353 https://vuldb.com/?submit.383517 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 1

A vulnerability has been found in SourceCodester Simple Realtime Quiz System 1.0 and classified as problematic. This vulnerability affects unknown code of the file /ajax.php?action=save_quiz. The manipulation of the argument title leads to cross site scripting. The attack can be initiated remotely. • https://gist.github.com/topsky979/ad93f7046d905cef9277304dd3ac8061 https://vuldb.com/?ctiid.273352 https://vuldb.com/?id.273352 https://vuldb.com/?submit.383516 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.9EPSS: 0%CPEs: 1EXPL: 1

A vulnerability, which was classified as problematic, was found in SourceCodester Simple Realtime Quiz System 1.0. This affects an unknown part of the file /ajax.php?action=save_user. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. • https://vuldb.com/?id.273351 https://vuldb.com/?ctiid.273351 https://vuldb.com/?submit.383515 https://gist.github.com/topsky979/03ae83fd32a94c85f910c8e3a85fa056 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

A vulnerability was found in SourceCodester Tracking Monitoring Management System 1.0. It has been classified as critical. This affects an unknown part of the file /ajax.php?action=login of the component Login. The manipulation of the argument username leads to sql injection. • https://vuldb.com/?id.273345 https://vuldb.com/?ctiid.273345 https://vuldb.com/?submit.383501 https://gist.github.com/topsky979/c0efd2f3e6e146eb9e110e5e63cb5fbb • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •