Page 4 of 20 results (0.003 seconds)

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

A Cross-Site Request Forgery (CSRF) in Online Food Ordering System v1.0 allows attackers to change user details and credentials via a crafted POST request. • https://github.com/bhaveshkush007/CVEs/blob/main/CVE-2023-27073.txt https://projectworlds.in/free-projects/php-projects/food-ordering-system-project-in-php • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 2

Multiple SQL Injection vulnerabilities in tourist5 Online-food-ordering-system 1.0. • https://gist.github.com/kdrypr/999a245abb4511d43e41df1ccdbcf0cb https://github.com/tourist5/Online-food-ordering-system https://github.com/tourist5/Online-food-ordering-system/issues/1 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

Online Food Ordering System v1.0 was discovered to contain a SQL injection vulnerability via the component /dishes.php?res_id=. Se ha detectado que Online Food Ordering System versión v1.0, contiene una vulnerabilidad de inyección SQL por medio del componente /dishes.php?res_id= • https://hackmd.io/%40hieuleuxuan/OFOS_Sql_Injection • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

Online Food Ordering System v1.0 was discovered to contain a SQL injection vulnerability via the Search parameter at /online-food-order/food-search.php. Se ha detectado que Online Food Ordering System versión v1.0, contiene una vulnerabilidad de inyección SQL por medio del parámetro Search en el archivo /online-food-order/food-search.php • https://hackmd.io/%40d4rkp0w4r/Online_Food_Ordering_System_Unauthenticated_Sql_Injection • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

An arbitrary file upload vulnerability in the Select Image function of Online Food Ordering System v1.0 allows attackers to execute arbitrary code via a crafted PHP file. Una vulnerabilidad de carga de archivos arbitraria en la función Select Image de Online Food Ordering System versión v1.0, permite a atacantes ejecutar código arbitrario por medio de un archivo PHP diseñado • https://hackmd.io/%40d4rkp0w4r/Online_Food_Ordering_System_Remote_Code_Execution • CWE-434: Unrestricted Upload of File with Dangerous Type •