Best Courier Management System Mayurik Best Courier Management System

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Mayurik Best Courier Management System.

By the Year

In 2026 there have been 0 vulnerabilities in Mayurik Best Courier Management System. Best Courier Management System did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 0 0.00
2024 4 9.80
2023 15 7.99

It may take a day or so for new Best Courier Management System vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Mayurik Best Courier Management System Security Vulnerabilities

Remote FILE UPLOAD in Best Courier Management System v1.0 via admin_class.php
CVE-2024-48581 - October 25, 2024

File Upload vulnerability in Best courier management system in php v.1.0 allows a remote attacker to execute arbitrary code via the admin_class.php component.

SQLi in Best Courier Mgt Sys v1.0 via email param
CVE-2024-48580 - October 25, 2024

SQL Injection vulnerability in Best courier management system in php v.1.0 allows a remote attacker to execute arbitrary code via the email parameter of the login request.

Best Courier Management System 1.0 Unrestricted Upload via view_parcel.php
CVE-2024-4945 9.8 - Critical - May 16, 2024

A vulnerability was found in SourceCodester Best Courier Management System 1.0. It has been classified as problematic. Affected is an unknown function of the file view_parcel.php. The manipulation of the argument id leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-264480.

SQL Injection

Best Courier MS v1.0 SQLi via print_pdets.php
CVE-2024-24407 - March 28, 2024

SQL Injection vulnerability in Best Courier management system v.1.0 allows a remote attacker to obtain sensitive information via print_pdets.php component.

SQLi via id in manage_user.php SourceCodester BCM System 1.0
CVE-2023-6898 9.8 - Critical - December 17, 2023

A vulnerability classified as critical has been found in SourceCodester Best Courier Management System 1.0. Affected is an unknown function of the file manage_user.php. The manipulation of the argument id leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-248256.

SQL Injection

SourceCodester Best Courier 1.0 XSS via page param
CVE-2023-6300 6.1 - Medium - November 27, 2023

A vulnerability, which was classified as problematic, was found in SourceCodester Best Courier Management System 1.0. Affected is an unknown function. The manipulation of the argument page with the input </TiTlE><ScRiPt>alert(1)</ScRiPt> leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-246126 is the identifier assigned to this vulnerability.

XSS

SourceCodester Best Courier Management System 1.0 XSS in parcel_list.php
CVE-2023-6301 6.1 - Medium - November 27, 2023

A vulnerability has been found in SourceCodester Best Courier Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file parcel_list.php of the component GET Parameter Handler. The manipulation of the argument id with the input </TiTlE><ScRiPt>alert(1)</ScRiPt> leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-246127.

XSS

Best Courier Management Sys v1.0: RCE via crafted userID script
CVE-2023-46980 9.8 - Critical - November 03, 2023

An issue in Best Courier Management System v.1.0 allows a remote attacker to execute arbitrary code and escalate privileges via a crafted script to the userID parameter.

XSS in Best Courier Management System v1.0 change username
CVE-2023-46451 5.4 - Medium - October 31, 2023

Best Courier Management System v1.0 is vulnerable to Cross Site Scripting (XSS) in the change username field.

XSS

Sourcecodester Best Courier Mgmt Sys 1.0 Arbitrary File Upload in update_user
CVE-2023-46004 7.2 - High - October 18, 2023

Sourcecodester Best Courier Management System 1.0 is vulnerable to Arbitrary file upload in the update_user function.

Unrestricted File Upload

SQLi in Sourcecodester Best Courier Management System 1.0 via edit_branch.php id
CVE-2023-46005 9.8 - Critical - October 18, 2023

Sourcecodester Best Courier Management System 1.0 is vulnerable to SQL Injection via the parameter id in /edit_branch.php.

SQL Injection

SQL Injection in Sourcecodester Best Courier Management 1.0 via id
CVE-2023-46006 9.8 - Critical - October 18, 2023

Sourcecodester Best Courier Management System 1.0 is vulnerable to SQL Injection via the parameter id in /edit_user.php.

SQL Injection

SQL Injection in Sourcecodester Best Courier MS 1.0 via /edit_staff.php ID
CVE-2023-46007 9.8 - Critical - October 18, 2023

Sourcecodester Best Courier Management System 1.0 is vulnerable to SQL Injection via the parameter id in /edit_staff.php.

SQL Injection

SC BestCourierMgmtSys 1.0 XSS in Manage Account via First Name
CVE-2023-5302 5.4 - Medium - September 30, 2023

A vulnerability, which was classified as problematic, has been found in SourceCodester Best Courier Management System 1.0. This issue affects some unknown processing of the component Manage Account Page. The manipulation of the argument First Name leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-240941 was assigned to this vulnerability.

XSS

Remote XSS via id in manage_parcel_status.php (BCMS 1.0)
CVE-2023-5273 5.4 - Medium - September 29, 2023

A vulnerability classified as problematic was found in SourceCodester Best Courier Management System 1.0. This vulnerability affects unknown code of the file manage_parcel_status.php. The manipulation of the argument id leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-240886 is the identifier assigned to this vulnerability.

XSS

SQLi via GET ID in edit_parcel.php of SourceCodester Best Courier System 1.0
CVE-2023-5272 8.8 - High - September 29, 2023

A vulnerability classified as critical has been found in SourceCodester Best Courier Management System 1.0. This affects an unknown part of the file edit_parcel.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-240885 was assigned to this vulnerability.

SQL Injection

Critical SQLi in parcel_list.php of SourceCodester Best Courier System 1.0
CVE-2023-5269 8.8 - High - September 29, 2023

A vulnerability was found in SourceCodester Best Courier Management System 1.0. It has been classified as critical. Affected is an unknown function of the file parcel_list.php of the component GET Parameter Handler. The manipulation of the argument id/s leads to sql injection. The exploit has been disclosed to the public and may be used.

SQL Injection

SQLi in SourceCodester Best Courier Management System 1.0 view_parcel.php id
CVE-2023-5270 8.8 - High - September 29, 2023

A vulnerability was found in SourceCodester Best Courier Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file view_parcel.php. The manipulation of the argument id leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240883.

SQL Injection

SQLi in SCC Best Courier Mgmt Sys 1.0 on edit_parcel.php
CVE-2023-5271 8.8 - High - September 29, 2023

A vulnerability was found in SourceCodester Best Courier Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file edit_parcel.php. The manipulation of the argument email leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240884.

SQL Injection

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Mayurik Best Courier Management System or by Mayurik? Click the Watch button to subscribe.

Mayurik
Vendor

subscribe