Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 24 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 24 Mar 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sourcecodester
Sourcecodester online Library Management System |
|
| Vendors & Products |
Sourcecodester
Sourcecodester online Library Management System |
Tue, 24 Mar 2026 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was detected in SourceCodester Online Library Management System 1.0. The impacted element is an unknown function of the file /home.php of the component Parameter Handler. Performing a manipulation of the argument searchField results in sql injection. The attack can be initiated remotely. The exploit is now public and may be used. | |
| Title | SourceCodester Online Library Management System Parameter home.php sql injection | |
| Weaknesses | CWE-74 CWE-89 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-03-24T18:25:52.685Z
Reserved: 2026-03-23T06:22:42.252Z
Link: CVE-2026-4624
Updated: 2026-03-24T18:25:49.212Z
Status : Deferred
Published: 2026-03-24T03:16:06.887
Modified: 2026-04-29T01:00:01.613
Link: CVE-2026-4624
No data.
OpenCVE Enrichment
Updated: 2026-03-25T20:40:28Z