Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 26 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 26 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sourcecodester
Sourcecodester food Ordering System |
|
| Vendors & Products |
Sourcecodester
Sourcecodester food Ordering System |
Thu, 26 Mar 2026 03:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability has been found in SourceCodester Food Ordering System 1.0. This affects an unknown function of the file /purchase.php of the component Parameter Handler. The manipulation of the argument custom leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | |
| Title | SourceCodester Food Ordering System Parameter purchase.php sql injection | |
| Weaknesses | CWE-74 CWE-89 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-03-26T14:00:28.211Z
Reserved: 2026-03-25T14:30:21.273Z
Link: CVE-2026-4839
Updated: 2026-03-26T14:00:23.180Z
Status : Received
Published: 2026-03-26T04:17:15.053
Modified: 2026-03-26T04:17:15.053
Link: CVE-2026-4839
No data.
OpenCVE Enrichment
Updated: 2026-03-26T12:08:41Z