Mayurik Best Courier Management System
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Mayurik Best Courier Management System.
By the Year
In 2026 there have been 0 vulnerabilities in Mayurik Best Courier Management System. Best Courier Management System did not have any published security vulnerabilities last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 0 | 0.00 |
| 2024 | 4 | 9.80 |
| 2023 | 15 | 7.99 |
It may take a day or so for new Best Courier Management System vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Mayurik Best Courier Management System Security Vulnerabilities
Remote FILE UPLOAD in Best Courier Management System v1.0 via admin_class.php
CVE-2024-48581
- October 25, 2024
File Upload vulnerability in Best courier management system in php v.1.0 allows a remote attacker to execute arbitrary code via the admin_class.php component.
SQLi in Best Courier Mgt Sys v1.0 via email param
CVE-2024-48580
- October 25, 2024
SQL Injection vulnerability in Best courier management system in php v.1.0 allows a remote attacker to execute arbitrary code via the email parameter of the login request.
Best Courier Management System 1.0 Unrestricted Upload via view_parcel.php
CVE-2024-4945
9.8 - Critical
- May 16, 2024
A vulnerability was found in SourceCodester Best Courier Management System 1.0. It has been classified as problematic. Affected is an unknown function of the file view_parcel.php. The manipulation of the argument id leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-264480.
SQL Injection
Best Courier MS v1.0 SQLi via print_pdets.php
CVE-2024-24407
- March 28, 2024
SQL Injection vulnerability in Best Courier management system v.1.0 allows a remote attacker to obtain sensitive information via print_pdets.php component.
SQLi via id in manage_user.php SourceCodester BCM System 1.0
CVE-2023-6898
9.8 - Critical
- December 17, 2023
A vulnerability classified as critical has been found in SourceCodester Best Courier Management System 1.0. Affected is an unknown function of the file manage_user.php. The manipulation of the argument id leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-248256.
SQL Injection
SourceCodester Best Courier 1.0 XSS via page param
CVE-2023-6300
6.1 - Medium
- November 27, 2023
A vulnerability, which was classified as problematic, was found in SourceCodester Best Courier Management System 1.0. Affected is an unknown function. The manipulation of the argument page with the input </TiTlE><ScRiPt>alert(1)</ScRiPt> leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-246126 is the identifier assigned to this vulnerability.
XSS
SourceCodester Best Courier Management System 1.0 XSS in parcel_list.php
CVE-2023-6301
6.1 - Medium
- November 27, 2023
A vulnerability has been found in SourceCodester Best Courier Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file parcel_list.php of the component GET Parameter Handler. The manipulation of the argument id with the input </TiTlE><ScRiPt>alert(1)</ScRiPt> leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-246127.
XSS
Best Courier Management Sys v1.0: RCE via crafted userID script
CVE-2023-46980
9.8 - Critical
- November 03, 2023
An issue in Best Courier Management System v.1.0 allows a remote attacker to execute arbitrary code and escalate privileges via a crafted script to the userID parameter.
XSS in Best Courier Management System v1.0 change username
CVE-2023-46451
5.4 - Medium
- October 31, 2023
Best Courier Management System v1.0 is vulnerable to Cross Site Scripting (XSS) in the change username field.
XSS
Sourcecodester Best Courier Mgmt Sys 1.0 Arbitrary File Upload in update_user
CVE-2023-46004
7.2 - High
- October 18, 2023
Sourcecodester Best Courier Management System 1.0 is vulnerable to Arbitrary file upload in the update_user function.
Unrestricted File Upload
SQLi in Sourcecodester Best Courier Management System 1.0 via edit_branch.php id
CVE-2023-46005
9.8 - Critical
- October 18, 2023
Sourcecodester Best Courier Management System 1.0 is vulnerable to SQL Injection via the parameter id in /edit_branch.php.
SQL Injection
SQL Injection in Sourcecodester Best Courier Management 1.0 via id
CVE-2023-46006
9.8 - Critical
- October 18, 2023
Sourcecodester Best Courier Management System 1.0 is vulnerable to SQL Injection via the parameter id in /edit_user.php.
SQL Injection
SQL Injection in Sourcecodester Best Courier MS 1.0 via /edit_staff.php ID
CVE-2023-46007
9.8 - Critical
- October 18, 2023
Sourcecodester Best Courier Management System 1.0 is vulnerable to SQL Injection via the parameter id in /edit_staff.php.
SQL Injection
SC BestCourierMgmtSys 1.0 XSS in Manage Account via First Name
CVE-2023-5302
5.4 - Medium
- September 30, 2023
A vulnerability, which was classified as problematic, has been found in SourceCodester Best Courier Management System 1.0. This issue affects some unknown processing of the component Manage Account Page. The manipulation of the argument First Name leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-240941 was assigned to this vulnerability.
XSS
Remote XSS via id in manage_parcel_status.php (BCMS 1.0)
CVE-2023-5273
5.4 - Medium
- September 29, 2023
A vulnerability classified as problematic was found in SourceCodester Best Courier Management System 1.0. This vulnerability affects unknown code of the file manage_parcel_status.php. The manipulation of the argument id leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-240886 is the identifier assigned to this vulnerability.
XSS
SQLi via GET ID in edit_parcel.php of SourceCodester Best Courier System 1.0
CVE-2023-5272
8.8 - High
- September 29, 2023
A vulnerability classified as critical has been found in SourceCodester Best Courier Management System 1.0. This affects an unknown part of the file edit_parcel.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-240885 was assigned to this vulnerability.
SQL Injection
Critical SQLi in parcel_list.php of SourceCodester Best Courier System 1.0
CVE-2023-5269
8.8 - High
- September 29, 2023
A vulnerability was found in SourceCodester Best Courier Management System 1.0. It has been classified as critical. Affected is an unknown function of the file parcel_list.php of the component GET Parameter Handler. The manipulation of the argument id/s leads to sql injection. The exploit has been disclosed to the public and may be used.
SQL Injection
SQLi in SourceCodester Best Courier Management System 1.0 view_parcel.php id
CVE-2023-5270
8.8 - High
- September 29, 2023
A vulnerability was found in SourceCodester Best Courier Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file view_parcel.php. The manipulation of the argument id leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240883.
SQL Injection
SQLi in SCC Best Courier Mgmt Sys 1.0 on edit_parcel.php
CVE-2023-5271
8.8 - High
- September 29, 2023
A vulnerability was found in SourceCodester Best Courier Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file edit_parcel.php. The manipulation of the argument email leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240884.
SQL Injection
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Mayurik Best Courier Management System or by Mayurik? Click the Watch button to subscribe.