A vulnerability classified as critical was found in codeprojects Online Restaurant Management System 1.0. This vulnerability affects unknown code of the file /reservation_save.php. The manipulation of the argument first leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
References
Link | Resource |
---|---|
https://github.com/p1026/CVE/issues/44 | Exploit Third Party Advisory Issue Tracking |
https://github.com/p1026/CVE/issues/44 | Exploit Third Party Advisory Issue Tracking |
https://vuldb.com/?ctiid.303544 | Permissions Required Third Party Advisory VDB Entry |
https://vuldb.com/?id.303544 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.551904 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
History
07 Apr 2025, 18:17
Type | Values Removed | Values Added |
---|---|---|
References | () https://vuldb.com/?id.303544 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?ctiid.303544 - Permissions Required, Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.551904 - Third Party Advisory, VDB Entry | |
References | () https://github.com/p1026/CVE/issues/44 - Exploit, Third Party Advisory, Issue Tracking | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CWE | CWE-89 | |
First Time |
Code-projects online Restaurant Management System
Code-projects |
|
CPE | cpe:2.3:a:code-projects:online_restaurant_management_system:1.0:*:*:*:*:*:*:* |
07 Apr 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : unknown |
CWE | CWE-74 |
07 Apr 2025, 02:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-07 02:15
Updated : 2025-04-07 18:17
NVD link : CVE-2025-3330
Mitre link : CVE-2025-3330
JSON object : View
Products Affected
code-projects
- online_restaurant_management_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')