CVE-2024-7378 – SourceCodester Simple Realtime Quiz System manage_question.php sql injection
https://notcve.org/view.php?id=CVE-2024-7378
A vulnerability was found in SourceCodester Simple Realtime Quiz System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /manage_question.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. • https://gist.github.com/topsky979/d4cb58afc5fb41f647b1021d1364d846 https://vuldb.com/?ctiid.273362 https://vuldb.com/?id.273362 https://vuldb.com/?submit.383526 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2024-7377 – SourceCodester Simple Realtime Quiz System view_result.php sql injection
https://notcve.org/view.php?id=CVE-2024-7377
A vulnerability has been found in SourceCodester Simple Realtime Quiz System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /view_result.php. The manipulation of the argument qid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. • https://gist.github.com/topsky979/4415a08deadd16356484d5ff540e60f9 https://vuldb.com/?ctiid.273361 https://vuldb.com/?id.273361 https://vuldb.com/?submit.383525 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2024-7376 – SourceCodester Simple Realtime Quiz System print_quiz_records.php sql injection
https://notcve.org/view.php?id=CVE-2024-7376
A vulnerability, which was classified as critical, was found in SourceCodester Simple Realtime Quiz System 1.0. Affected is an unknown function of the file /print_quiz_records.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. • https://gist.github.com/topsky979/8c36e6a899fc02e8054f67b94e34f6c6 https://vuldb.com/?ctiid.273360 https://vuldb.com/?id.273360 https://vuldb.com/?submit.383524 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2024-7375 – SourceCodester Simple Realtime Quiz System my_quiz_result.php sql injection
https://notcve.org/view.php?id=CVE-2024-7375
A vulnerability, which was classified as critical, has been found in SourceCodester Simple Realtime Quiz System 1.0. This issue affects some unknown processing of the file /my_quiz_result.php. The manipulation of the argument quiz leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. • https://gist.github.com/topsky979/840587360c33d53efb359ff314f7ea24 https://vuldb.com/?ctiid.273359 https://vuldb.com/?id.273359 https://vuldb.com/?submit.383523 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2024-7374 – SourceCodester Simple Realtime Quiz System manage_user.php sql injection
https://notcve.org/view.php?id=CVE-2024-7374
A vulnerability classified as critical was found in SourceCodester Simple Realtime Quiz System 1.0. This vulnerability affects unknown code of the file /manage_user.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. • https://gist.github.com/topsky979/94ae61ff3fc760ac985dcd5e64da06c4 https://vuldb.com/?ctiid.273358 https://vuldb.com/?id.273358 https://vuldb.com/?submit.383522 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •