VYPR

Courier Management System

by Carmelogarcia

Source repositories

CVEs (5)

  • CVE-2025-12316HigOct 27, 2025
    risk 0.47cvss 7.3epss 0.00

    A vulnerability was identified in code-projects Courier Management System 1.0. This impacts an unknown function of the file /courier/edit-courier.php. The manipulation of the argument OfficeName leads to sql injection. The attack is possible to be carried out remotely. The exploit is publicly available and might be used.

  • CVE-2025-13396MedNov 19, 2025
    risk 0.41cvss 6.3epss 0.00

    A weakness has been identified in code-projects Courier Management System 1.0. This affects an unknown function of the file /add-office.php. This manipulation of the argument OfficeName causes sql injection. The attack may be initiated remotely. The exploit has been made available to the public and could be exploited.

  • CVE-2025-13303MedNov 17, 2025
    risk 0.41cvss 6.3epss 0.00

    A vulnerability was determined in code-projects Courier Management System 1.0. Affected by this issue is some unknown functionality of the file /search-edit.php. This manipulation of the argument Consignment causes sql injection. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized.

  • CVE-2025-11553MedOct 9, 2025
    risk 0.41cvss 6.3epss 0.00

    A weakness has been identified in code-projects Courier Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /add-courier.php. Executing manipulation of the argument Shippername can lead to sql injection. The attack can be launched remotely. The exploit has been made available to the public and could be exploited.

  • CVE-2025-13302MedNov 17, 2025
    risk 0.31cvss 4.7epss 0.00

    A vulnerability was identified in code-projects Courier Management System 1.0. This affects an unknown part of the file /add-new-officer.php. Such manipulation of the argument ManagerName leads to sql injection. The attack can be launched remotely. The exploit is publicly available and might be used.