Phpgurukul

Tourism Management System

7 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.04%
  • Veröffentlicht 16.11.2025 10:32:07
  • Zuletzt bearbeitet 24.02.2026 07:16:45

A security flaw has been discovered in PHPGurukul Tourism Management System 1.0. The affected element is an unknown function of the file /admin/user-bookings.php. The manipulation of the argument uid results in sql injection. It is possible to launch...

Exploit
  • EPSS 0.16%
  • Veröffentlicht 06.08.2024 16:15:49
  • Zuletzt bearbeitet 13.03.2025 19:15:46

A reflected cross-site scripting (XSS) vulnerability in Phpgurukul Tourism Management System v2.0 allows attackers to execute arbitrary code in the context of a user's browser via injecting a crafted payload into the uname parameter.

Exploit
  • EPSS 0.14%
  • Veröffentlicht 16.04.2024 17:15:11
  • Zuletzt bearbeitet 06.02.2026 15:15:51

Phpgurukul Tourism Management System v2.0 is vulnerable to Unrestricted Upload of File with Dangerous Type via /tms/admin/change-image.php. When updating a current package, there are no checks for what types of files are uploaded from the image.

Exploit
  • EPSS 0.31%
  • Veröffentlicht 16.04.2024 17:15:10
  • Zuletzt bearbeitet 02.04.2025 14:58:33

Phpgurukul Tourism Management System v2.0 is vulnerable to Unrestricted Upload of File with Dangerous Type via tms/admin/create-package.php. When creating a new package, there is no checks for what types of files are uploaded from the image.

  • EPSS 0.05%
  • Veröffentlicht 23.02.2024 16:15:47
  • Zuletzt bearbeitet 06.12.2024 19:58:10

A vulnerability classified as problematic has been found in PHPGurukul Tourism Management System 1.0. Affected is an unknown function of the file user-bookings.php. The manipulation of the argument Full Name leads to cross site scripting. It is possi...

Exploit
  • EPSS 0.16%
  • Veröffentlicht 14.06.2022 17:15:08
  • Zuletzt bearbeitet 21.11.2024 07:03:35

Tourism Management System Version: V 3.2 is affected by: Cross Site Request Forgery (CSRF).

Exploit
  • EPSS 2.42%
  • Veröffentlicht 17.11.2020 20:15:11
  • Zuletzt bearbeitet 21.11.2024 05:22:23

An Arbitrary File Upload is discovered in SourceCodester Tourism Management System 1.0 allows the user to conduct remote code execution via admin/create-package.php vulnerable page.