Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Best_courier_management_system
(Mayurik)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 15 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2023-10-18 | CVE-2023-46007 | Sourcecodester Best Courier Management System 1.0 is vulnerable to SQL Injection via the parameter id in /edit_staff.php. | Best_courier_management_system | 9.8 | ||
2023-10-31 | CVE-2023-46451 | Best Courier Management System v1.0 is vulnerable to Cross Site Scripting (XSS) in the change username field. | Best_courier_management_system | 5.4 | ||
2023-11-03 | CVE-2023-46980 | An issue in Best Courier Management System v.1.0 allows a remote attacker to execute arbitrary code and escalate privileges via a crafted script to the userID parameter. | Best_courier_management_system | 9.8 | ||
2023-11-27 | CVE-2023-6300 | A vulnerability, which was classified as problematic, was found in SourceCodester Best Courier Management System 1.0. Affected is an unknown function. The manipulation of the argument page with the input </TiTlE><ScRiPt>alert(1)</ScRiPt> leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-246126 is the identifier assigned to this vulnerability. | Best_courier_management_system | 6.1 | ||
2023-11-27 | CVE-2023-6301 | A vulnerability has been found in SourceCodester Best Courier Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file parcel_list.php of the component GET Parameter Handler. The manipulation of the argument id with the input </TiTlE><ScRiPt>alert(1)</ScRiPt> leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this... | Best_courier_management_system | 6.1 |