{"vulnerability": "CVE-2024-57328", "sightings": [{"uuid": "a3c96352-20c8-498f-9204-1c78fe72463c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57328", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lggvuf7seh2x", "content": "", "creation_timestamp": "2025-01-23T22:16:04.628211Z"}, {"uuid": "887e5d3c-d6ae-4c10-b485-29afb97235e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57328", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2844", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-57328\n\ud83d\udd39 Description: A SQL Injection vulnerability exists in the login form of Online Food Ordering System v1.0. The vulnerability arises because the input fields username and password are not properly sanitized, allowing attackers to inject malicious SQL queries to bypass authentication and gain unauthorized access.\n\ud83d\udccf Published: 2025-01-23T00:00:00.000Z\n\ud83d\udccf Modified: 2025-01-23T21:41:19.398Z\n\ud83d\udd17 References:\n1. https://github.com/fatihtuzunn/CVEs/tree/main/CVE-2024-57328", "creation_timestamp": "2025-01-23T22:03:42.000000Z"}, {"uuid": "c76eba4f-7076-44d5-a7d0-37eb39f5f2c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57328", "type": "seen", "source": "https://t.me/cvedetector/16239", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-57328 - \"Acme Online Food Ordering System SQL Injection\"\", \n  \"Content\": \"CVE ID : CVE-2024-57328 \nPublished : Jan. 23, 2025, 10:15 p.m. | 36\u00a0minutes ago \nDescription : A SQL Injection vulnerability exists in the login form of Online Food Ordering System v1.0. The vulnerability arises because the input fields username and password are not properly sanitized, allowing attackers to inject malicious SQL queries to bypass authentication and gain unauthorized access. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-24T00:10:20.000000Z"}, {"uuid": "0bcf06e5-d442-4796-b547-39a0e6d929fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57328", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgh3g3yv5v2i", "content": "", "creation_timestamp": "2025-01-23T23:55:36.091293Z"}, {"uuid": "5f2f3869-4e96-41d3-b690-856c37a83de9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-57328", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113879859188536569", "content": "", "creation_timestamp": "2025-01-23T21:45:50.299056Z"}]}