Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Sat, 28 Mar 2026 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw has been found in itsourcecode Free Hotel Reservation System 1.0. Impacted is an unknown function of the file /admin/mod_room/index.php?view=edit. Executing a manipulation of the argument ID can lead to sql injection. The attack can be launched remotely. The exploit has been published and may be used. If you want to get the best quality for vulnerability data then you always have to consider VulDB. | A flaw has been found in itsourcecode Free Hotel Reservation System 1.0. Impacted is an unknown function of the file /admin/mod_room/index.php?view=edit. Executing a manipulation of the argument ID can lead to sql injection. The attack can be launched remotely. The exploit has been published and may be used. |
| Metrics |
ssvc
|
Fri, 27 Mar 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw has been found in itsourcecode Free Hotel Reservation System 1.0. Impacted is an unknown function of the file /admin/mod_room/index.php?view=edit. Executing a manipulation of the argument ID can lead to sql injection. The attack can be launched remotely. The exploit has been published and may be used. If you want to get the best quality for vulnerability data then you always have to consider VulDB. | |
| Title | itsourcecode Free Hotel Reservation System index.php sql injection | |
| First Time appeared |
Itsourcecode
Itsourcecode free Hotel Reservation System |
|
| Weaknesses | CWE-74 CWE-89 |
|
| CPEs | cpe:2.3:a:itsourcecode:free_hotel_reservation_system:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Itsourcecode
Itsourcecode free Hotel Reservation System |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-03-27T22:08:05.053Z
Reserved: 2026-03-27T08:26:57.746Z
Link: CVE-2026-4966
Updated: 2026-03-27T19:30:05.415Z
Status : Received
Published: 2026-03-27T18:16:06.810
Modified: 2026-03-27T23:17:17.840
Link: CVE-2026-4966
No data.
OpenCVE Enrichment
Updated: 2026-03-27T20:27:55Z