A vulnerability was detected in code-projects Online Product Reservation System 1.0. Affected is an unknown function of the file /handgunner-administrator/prod.php of the component Parameter Handler. Performing manipulation of the argument cat/price/name/model/serial results in sql injection. It is possible to initiate the attack remotely. The exploit is now public and may be used.
References
| Link | Resource |
|---|---|
| https://code-projects.org/ | Product |
| https://github.com/foeCat/CVE/blob/main/OnlineProductReservation_PHP/sqli_add_prod.php.md | Exploit Third Party Advisory |
| https://github.com/foeCat/CVE/blob/main/OnlineProductReservation_PHP/sqli_add_prod.php.md#poc | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.339460 | Permissions Required VDB Entry |
| https://vuldb.com/?id.339460 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.731012 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2026-01-04 09:15
Updated : 2026-01-09 14:28
NVD link : CVE-2026-0576
Mitre link : CVE-2026-0576
CVE.ORG link : CVE-2026-0576
JSON object : View
Products Affected
fabian
- online_product_reservation_system
