PHPGurukul Time Table Generator System

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in PHPGurukul Time Table Generator System.

By the Year

In 2026 there have been 0 vulnerabilities in PHPGurukul Time Table Generator System. Last year, in 2025 Time Table Generator System had 3 security vulnerabilities published. Right now, Time Table Generator System is on track to have less security vulnerabilities in 2026 than it did last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 3 7.60

It may take a day or so for new Time Table Generator System vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent PHPGurukul Time Table Generator System Security Vulnerabilities

PHPGurukul Time Table Generator 1.0 XSS via /admin/profile.php adminname
CVE-2025-7941 5.4 - Medium - July 21, 2025

A vulnerability, which was classified as problematic, was found in PHPGurukul Time Table Generator System 1.0. Affected is an unknown function of the file /admin/profile.php. The manipulation of the argument adminname leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

XSS

PHPGurukul Timetable Generator v1.0 – Reflected XSS via adminname (profile.php)
CVE-2025-45007 - April 30, 2025

A Reflected Cross-Site Scripting (XSS) vulnerability was discovered in the profile.php file of PHPGurukul Timetable Generator System v1.0. This vulnerability allows remote attackers to execute arbitrary JavaScript code via the adminname POST request parameter.

PHPGurukul Time Table Gen 1.0 SQLi via editid in /admin/edit-class.php
CVE-2025-3168 9.8 - Critical - April 03, 2025

A vulnerability was found in PHPGurukul Time Table Generator System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/edit-class.php. The manipulation of the argument editid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

SQL Injection

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for PHPGurukul Time Table Generator System or by PHPGurukul? Click the Watch button to subscribe.

 

PHPGurukul
Vendor

subscribe