Description
An arbitrary file upload vulnerability in the Select Image function of Online Food Ordering System v1.0 allows attackers to execute arbitrary code via a crafted PHP file.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-33977 | An arbitrary file upload vulnerability in the Select Image function of Online Food Ordering System v1.0 allows attackers to execute arbitrary code via a crafted PHP file. |
References
History
Mon, 30 Mar 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Oretnom23
Oretnom23 online Food Ordering System |
|
| CPEs | cpe:2.3:a:oretnom23:online_food_ordering_system:1.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Online Food Ordering System Project
Online Food Ordering System Project online Food Ordering System |
Oretnom23
Oretnom23 online Food Ordering System |
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T06:26:06.663Z
Reserved: 2022-04-25T00:00:00.000Z
Link: CVE-2022-29651
No data.
Status : Modified
Published: 2022-05-25T13:15:07.920
Modified: 2026-03-30T18:15:59.940
Link: CVE-2022-29651
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD