Projectworlds

Online Food Ordering System

13 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.04%
  • Veröffentlicht 08.02.2026 05:02:06
  • Zuletzt bearbeitet 11.02.2026 18:54:34

A flaw has been found in projectworlds Online Food Ordering System 1.0. This affects an unknown function of the file /view-ticket.php. Executing a manipulation of the argument ID can lead to sql injection. It is possible to launch the attack remotely...

Exploit
  • EPSS 0.05%
  • Veröffentlicht 11.10.2025 14:02:05
  • Zuletzt bearbeitet 20.10.2025 20:50:10

A vulnerability was determined in projectworlds Online Ordering Food System 1.0. This issue affects some unknown processing of the file /all-orders.php. This manipulation of the argument Status causes sql injection. Remote exploitation of the attack ...

Exploit
  • EPSS 0.07%
  • Veröffentlicht 19.05.2025 14:31:04
  • Zuletzt bearbeitet 05.06.2025 19:39:27

A vulnerability was found in projectworlds Online Food Ordering System 1.0. It has been classified as critical. Affected is an unknown function of the file /admin-page.php. The manipulation of the argument 1_price leads to sql injection. It is possib...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 23.01.2025 22:15:14
  • Zuletzt bearbeitet 29.01.2025 13:52:36

A SQL Injection vulnerability exists in the login form of Online Food Ordering System v1.0. The vulnerability arises because the input fields username and password are not properly sanitized, allowing attackers to inject malicious SQL queries to bypa...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 02.11.2023 14:15:13
  • Zuletzt bearbeitet 21.11.2024 08:26:46

Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'ticket_id' parameter of the routers/ticket-message.php resource does not validate the characters received and they are sent unfiltered to t...

Exploit
  • EPSS 0.1%
  • Veröffentlicht 02.11.2023 14:15:13
  • Zuletzt bearbeitet 21.11.2024 08:26:46

Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The '*_balance' parameter of the routers/user-router.php resource does not validate the characters received and they are sent unfiltered to the ...

Exploit
  • EPSS 0.1%
  • Veröffentlicht 02.11.2023 14:15:12
  • Zuletzt bearbeitet 21.11.2024 08:26:45

Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'status' parameter of the routers/edit-orders.php resource does not validate the characters received and they are sent unfiltered to the dat...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 02.11.2023 14:15:12
  • Zuletzt bearbeitet 21.11.2024 08:26:45

Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'password' parameter of the routers/router.php resource does not validate the characters received and they are sent unfiltered to the databa...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 02.11.2023 14:15:12
  • Zuletzt bearbeitet 21.11.2024 08:26:45

Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'phone' parameter of the routers/details-router.php resource does not validate the characters received and they are sent unfiltered to the d...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 02.11.2023 14:15:12
  • Zuletzt bearbeitet 21.11.2024 08:26:45

Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The '*_price' parameter of the routers/menu-router.php resource does not validate the characters received and they are sent unfiltered to the da...