No analysis available yet.
No remediation available yet.
Tracking
Sign in to view the affected projects.
No advisories yet.
Sun, 05 Apr 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security vulnerability has been detected in PHPGurukul Online Shopping Portal Project 2.1. This affects an unknown part of the file /my-profile.php of the component Parameter Handler. The manipulation of the argument fullname leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used. | |
| Title | PHPGurukul Online Shopping Portal Project Parameter my-profile.php sql injection | |
| First Time appeared |
Phpgurukul
Phpgurukul online Shopping Portal Project |
|
| Weaknesses | CWE-74 CWE-89 |
|
| CPEs | cpe:2.3:a:phpgurukul:online_shopping_portal_project:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Phpgurukul
Phpgurukul online Shopping Portal Project |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-05T16:30:12.753Z
Reserved: 2026-04-04T18:44:47.752Z
Link: CVE-2026-5583
No data.
Status : Received
Published: 2026-04-05T17:16:57.453
Modified: 2026-04-05T17:16:57.453
Link: CVE-2026-5583
No data.
OpenCVE Enrichment
No data.