Vulnerability Description
A vulnerability was found in SourceCodester Tracking Monitoring Management System 1.0. It has been classified as critical. This affects an unknown part of the file /ajax.php?action=login of the component Login. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273345 was assigned to this vulnerability.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Oretnom23 | Tracking Monitoring Management System | 1.0 |
Related Weaknesses (CWE)
References
- https://gist.github.com/topsky979/c0efd2f3e6e146eb9e110e5e63cb5fbbExploit
- https://vuldb.com/?ctiid.273345Permissions RequiredThird Party Advisory
- https://vuldb.com/?id.273345Permissions RequiredThird Party Advisory
- https://vuldb.com/?submit.383501Third Party Advisory
FAQ
What is CVE-2024-7366?
CVE-2024-7366 is a vulnerability with a CVSS score of 7.3 (HIGH). A vulnerability was found in SourceCodester Tracking Monitoring Management System 1.0. It has been classified as critical. This affects an unknown part of the file /ajax.php?action=login of the compon...
How severe is CVE-2024-7366?
CVE-2024-7366 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-7366?
Check the references section above for vendor advisories and patch information. Affected products include: Oretnom23 Tracking Monitoring Management System.