Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 01 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 01 May 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Code-projects
Code-projects gym Management System |
|
| Vendors & Products |
Code-projects
Code-projects gym Management System |
Fri, 01 May 2026 04:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was found in code-projects Gym Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/edit_exercises.php. The manipulation of the argument edit_exercise results in sql injection. It is possible to launch the attack remotely. The exploit has been made public and could be used. | |
| Title | code-projects Gym Management System edit_exercises.php sql injection | |
| Weaknesses | CWE-74 CWE-89 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-01T14:15:10.197Z
Reserved: 2026-04-30T19:04:44.627Z
Link: CVE-2026-7553
Updated: 2026-05-01T14:15:04.903Z
Status : Deferred
Published: 2026-05-01T05:16:04.020
Modified: 2026-05-01T15:26:24.553
Link: CVE-2026-7553
No data.
OpenCVE Enrichment
Updated: 2026-05-02T08:00:14Z