Vulnerabilities (CVE)

Filtered by vendor Phpgurukul Subscribe
Total 221 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-33075 1 Phpgurukul 1 Zoo Management System 2023-11-14 3.5 LOW 5.4 MEDIUM
A stored cross-site scripting (XSS) vulnerability in the Add Classification function of Zoo Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via unspecified vectors.
CVE-2022-40925 1 Phpgurukul 1 Zoo Management System 2023-11-14 N/A 7.2 HIGH
Zoo Management System v1.0 has an arbitrary file upload vulnerability in the picture upload point of the "save_event" file of the "Events" module in the background management system.
CVE-2022-27351 1 Phpgurukul 1 Zoo Management System 2023-11-14 7.5 HIGH 9.8 CRITICAL
Zoo Management System v1.0 was discovered to contain an arbitrary file upload vulnerability via /public_html/apply_vacancy. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.
CVE-2021-4232 1 Phpgurukul 1 Zoo Management System 2023-11-14 4.3 MEDIUM 6.1 MEDIUM
A vulnerability classified as problematic has been found in Zoo Management System 1.0. Affected is an unknown function of the file admin/manage-ticket.php. The manipulation with the input <script>alert(1)</script> leads to cross site scripting. It is possible to launch the attack remotely.
CVE-2022-31914 1 Phpgurukul 1 Zoo Management System 2023-11-14 3.5 LOW 5.4 MEDIUM
Zoo Management System v1.0 is vulnerable to Cross Site Scripting (XSS) via zms/admin/public_html/save_animal?an_id=24.
CVE-2022-40924 1 Phpgurukul 1 Zoo Management System 2023-11-14 N/A 7.2 HIGH
Zoo Management System v1.0 has an arbitrary file upload vulnerability in the picture upload point of the "save_animal" file of the "Animals" module in the background management system.
CVE-2022-29005 1 Phpgurukul 1 Online Birth Certificate System 2023-11-14 4.3 MEDIUM 6.1 MEDIUM
Multiple cross-site scripting (XSS) vulnerabilities in the component /obcs/user/profile.php of Online Birth Certificate System v1.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the fname or lname parameters.
CVE-2021-37808 1 Phpgurukul 1 News Portal 2023-11-14 4.3 MEDIUM 5.9 MEDIUM
SQL Injection vulnerabilities exist in https://phpgurukul.com News Portal Project 3.1 via the (1) category, (2) subcategory, (3) sucatdescription, and (4) username parameters, the server response is about (N) seconds delay respectively which mean it is vulnerable to MySQL Blind (Time Based). An attacker can use sqlmap to further the exploitation for extracting sensitive information from the database.
CVE-2021-33470 1 Phpgurukul 1 Covid19 Testing Management System 2023-11-14 7.5 HIGH 9.8 CRITICAL
COVID19 Testing Management System 1.0 is vulnerable to SQL Injection via the admin panel.
CVE-2021-33469 1 Phpgurukul 1 Covid19 Testing Management System 2023-11-14 3.5 LOW 4.8 MEDIUM
COVID19 Testing Management System 1.0 is vulnerable to Cross Site Scripting (XSS) via the "Admin name" parameter.
CVE-2021-37805 1 Phpgurukul 1 Vehicle Parking Management System 2023-11-14 3.5 LOW 5.4 MEDIUM
A Stored Cross Site Scripting (XSS) vunerability exists in Sourcecodeste Vehicle Parking Management System affected version 1.0 is via the add-vehicle.php endpoint.
CVE-2021-27822 1 Phpgurukul 1 Vehicle Parking Management System 2023-11-14 3.5 LOW 4.8 MEDIUM
A persistent cross site scripting (XSS) vulnerability in the Add Categories module of Vehicle Parking Management System 1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the Category field.
CVE-2020-23936 1 Phpgurukul 1 Vehicle Parking Management System 2023-11-14 7.5 HIGH 9.8 CRITICAL
PHPGurukul Vehicle Parking Management System 1.0 is vulnerable to Authentication Bypass via "Username: admin'# && Password: (Write Something)".
CVE-2021-37806 1 Phpgurukul 1 Vehicle Parking Management System 2023-11-14 4.3 MEDIUM 5.9 MEDIUM
An SQL Injection vulnerability exists in https://phpgurukul.com Vehicle Parking Management System affected version 1.0. The system is vulnerable to time-based SQL injection on multiple endpoints. Based on the SLEEP(N) function payload that will sleep for a number of seconds used on the (1) editid , (2) viewid, and (3) catename parameters, the server response is about (N) seconds delay respectively which mean it is vulnerable to MySQL Blind (Time Based). An attacker can use sqlmap to further the exploitation for extracting sensitive information from the database.
CVE-2023-37772 1 Phpgurukul 1 Online Shopping Portal 2023-11-14 N/A 8.8 HIGH
Online Shopping Portal Project v3.1 was discovered to contain a SQL injection vulnerability via the Email parameter at /shopping/login.php.
CVE-2021-46110 1 Phpgurukul 1 Online Shopping Portal 2023-11-14 7.5 HIGH 9.8 CRITICAL
Online Shopping Portal v3.1 was discovered to contain multiple time-based SQL injection vulnerabilities via the email and contactno parameters.
CVE-2021-37807 1 Phpgurukul 1 Online Shopping Portal 2023-11-14 5.0 MEDIUM 7.5 HIGH
An SQL Injection vulneraility exists in https://phpgurukul.com Online Shopping Portal 3.1 via the email parameter on the /check_availability.php endpoint that serves as a checker whether a new user's email is already exist within the database.
CVE-2023-38890 1 Phpgurukul 1 Online Shopping Portal 2023-11-14 N/A 8.8 HIGH
Online Shopping Portal Project 3.1 allows remote attackers to execute arbitrary SQL commands/queries via the login form, leading to unauthorized access and potential data manipulation. This vulnerability arises due to insufficient validation of user-supplied input in the username field, enabling SQL Injection attacks.
CVE-2023-41575 1 Phpgurukul 1 Blood Bank \& Donor Management System 2023-11-14 N/A 5.4 MEDIUM
Multiple stored cross-site scripting (XSS) vulnerabilities in /bbdms/sign-up.php of Blood Bank & Donor Management v2.2 allow attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Full Name, Message, or Address parameters.
CVE-2020-5510 1 Phpgurukul 1 Hostel Management System 2023-11-14 10.0 HIGH 9.8 CRITICAL
PHPGurukul Hostel Management System v2.0 allows SQL injection via the id parameter in the full-profile.php file.