Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'status' parameter of the routers/edit-orders.php resource does not validate the characters received and they are sent unfiltered to the database.
                
            References
                    | Link | Resource | 
|---|---|
| https://fluidattacks.com/advisories/hann | Exploit Third Party Advisory | 
| https://projectworlds.in/ | Product | 
| https://fluidattacks.com/advisories/hann | Exploit Third Party Advisory | 
| https://projectworlds.in/ | Product | 
Configurations
                    History
                    No history.
Information
                Published : 2023-11-02 14:15
Updated : 2024-11-21 08:26
NVD link : CVE-2023-45334
Mitre link : CVE-2023-45334
CVE.ORG link : CVE-2023-45334
JSON object : View
Products Affected
                projectworlds
- online_food_ordering_system
CWE
                
                    
                        
                        CWE-89
                        
            Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
