Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Sun, 05 Apr 2026 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A weakness has been identified in PHPGurukul Online Shopping Portal Project 2.1. This issue affects some unknown processing of the file /sub-category.php of the component Parameter Handler. This manipulation of the argument pid causes sql injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks. | |
| Title | PHPGurukul Online Shopping Portal Project Parameter sub-category.php sql injection | |
| First Time appeared |
Phpgurukul
Phpgurukul online Shopping Portal Project |
|
| Weaknesses | CWE-74 CWE-89 |
|
| CPEs | cpe:2.3:a:phpgurukul:online_shopping_portal_project:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Phpgurukul
Phpgurukul online Shopping Portal Project |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-05T08:30:13.787Z
Reserved: 2026-04-04T13:35:31.835Z
Link: CVE-2026-5552
No data.
Status : Received
Published: 2026-04-05T09:16:18.840
Modified: 2026-04-05T09:16:18.840
Link: CVE-2026-5552
No data.
OpenCVE Enrichment
No data.