A SQL Injection vulnerability exists in the login form of Online Food Ordering System v1.0. The vulnerability arises because the input fields username and password are not properly sanitized, allowing attackers to inject malicious SQL queries to bypass authentication and gain unauthorized access.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/fatihtuzunn/CVEs/tree/main/CVE-2024-57328 | Exploit Third Party Advisory | 
Configurations
                    History
                    29 Jan 2025, 13:52
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time | Projectworlds online Food Ordering System Projectworlds | |
| CPE | cpe:2.3:a:projectworlds:online_food_ordering_system:1.0:*:*:*:*:*:*:* | |
| References | () https://github.com/fatihtuzunn/CVEs/tree/main/CVE-2024-57328 - Exploit, Third Party Advisory | 
24 Jan 2025, 22:15
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : unknown v3 : 9.8 | 
| Summary | 
 | |
| CWE | CWE-89 | 
23 Jan 2025, 22:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-01-23 22:15
Updated : 2025-01-29 13:52
NVD link : CVE-2024-57328
Mitre link : CVE-2024-57328
CVE.ORG link : CVE-2024-57328
JSON object : View
Products Affected
                projectworlds
- online_food_ordering_system
CWE
                
                    
                        
                        CWE-89
                        
            Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
