Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 24 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 24 Mar 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sourcecodester
Sourcecodester online Catering Reservation |
|
| Vendors & Products |
Sourcecodester
Sourcecodester online Catering Reservation |
Tue, 24 Mar 2026 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was identified in SourceCodester Online Catering Reservation 1.0. Impacted is an unknown function of the file /search.php. Such manipulation of the argument rcode leads to sql injection. The attack may be performed from remote. The exploit is publicly available and might be used. | |
| Title | SourceCodester Online Catering Reservation search.php sql injection | |
| Weaknesses | CWE-74 CWE-89 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-03-24T13:33:20.433Z
Reserved: 2026-03-23T05:51:50.123Z
Link: CVE-2026-4615
Updated: 2026-03-24T13:33:10.624Z
Status : Deferred
Published: 2026-03-24T00:16:32.020
Modified: 2026-04-29T01:00:01.613
Link: CVE-2026-4615
No data.
OpenCVE Enrichment
Updated: 2026-03-25T20:35:55Z