A SQL Injection vulnerability exists in the login form of Online Food Ordering System v1.0. The vulnerability arises because the input fields username and password are not properly sanitized, allowing attackers to inject malicious SQL queries to bypass authentication and gain unauthorized access.
                
            Metrics
Affected Vendors & Products
References
        | Link | Providers | 
|---|---|
| https://github.com/fatihtuzunn/CVEs/tree/main/CVE-2024-57328 |     | 
History
                    Wed, 29 Jan 2025 14:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Projectworlds Projectworlds online Food Ordering System | |
| CPEs | cpe:2.3:a:projectworlds:online_food_ordering_system:1.0:*:*:*:*:*:*:* | |
| Vendors & Products | Projectworlds Projectworlds online Food Ordering System | 
Fri, 24 Jan 2025 22:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Weaknesses | CWE-89 | |
| Metrics | cvssV3_1 
 
 | 
Thu, 23 Jan 2025 22:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | A SQL Injection vulnerability exists in the login form of Online Food Ordering System v1.0. The vulnerability arises because the input fields username and password are not properly sanitized, allowing attackers to inject malicious SQL queries to bypass authentication and gain unauthorized access. | |
| References |  | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-01-24T21:16:33.804Z
Reserved: 2025-01-09T00:00:00.000Z
Link: CVE-2024-57328
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-01-24T21:16:28.216Z
 NVD
                        NVD
                    Status : Analyzed
Published: 2025-01-23T22:15:14.943
Modified: 2025-01-29T13:52:36.473
Link: CVE-2024-57328
 Redhat
                        Redhat
                    No data.