No analysis available yet.
No remediation available yet.
Tracking
Sign in to view the affected projects.
No advisories yet.
Sun, 05 Apr 2026 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A weakness has been identified in PHPGurukul Online Shopping Portal Project 2.1. This issue affects some unknown processing of the file /sub-category.php of the component Parameter Handler. This manipulation of the argument pid causes sql injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks. | |
| Title | PHPGurukul Online Shopping Portal Project Parameter sub-category.php sql injection | |
| First Time appeared |
Phpgurukul
Phpgurukul online Shopping Portal Project |
|
| Weaknesses | CWE-74 CWE-89 |
|
| CPEs | cpe:2.3:a:phpgurukul:online_shopping_portal_project:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Phpgurukul
Phpgurukul online Shopping Portal Project |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-05T08:30:13.787Z
Reserved: 2026-04-04T13:35:31.835Z
Link: CVE-2026-5552
No data.
Status : Received
Published: 2026-04-05T09:16:18.840
Modified: 2026-04-05T09:16:18.840
Link: CVE-2026-5552
No data.
OpenCVE Enrichment
No data.