Filtered by vendor Projectworlds
                        
                        Subscribe
                        
                        
                    
                    
                
                        Filtered by product Online Food Ordering Script
                        
                        Subscribe
                        
                        
                    
                    
                
                    Total
                    4 CVE
                
            | CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 | 
|---|---|---|---|---|---|
| CVE-2023-45347 | 1 Projectworlds | 1 Online Food Ordering Script | 2024-11-21 | N/A | 9.8 CRITICAL | 
| Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The '*_verified' parameter of the routers/user-router.php resource does not validate the characters received and they are sent unfiltered to the database. | |||||
| CVE-2023-45346 | 1 Projectworlds | 1 Online Food Ordering Script | 2024-11-21 | N/A | 9.8 CRITICAL | 
| Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The '*_role' parameter of the routers/user-router.php resource does not validate the characters received and they are sent unfiltered to the database. | |||||
| CVE-2023-45345 | 1 Projectworlds | 1 Online Food Ordering Script | 2024-11-21 | N/A | 9.8 CRITICAL | 
| Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The '*_deleted' parameter of the routers/user-router.php resource does not validate the characters received and they are sent unfiltered to the database. | |||||
| CVE-2023-45338 | 1 Projectworlds | 1 Online Food Ordering Script | 2024-11-21 | N/A | 9.8 CRITICAL | 
| Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'id' parameter of the routers/add-ticket.php resource does not validate the characters received and they are sent unfiltered to the database. | |||||
