No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 09 Feb 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 09 Feb 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Code-projects
Code-projects online Reviewer System |
|
| Vendors & Products |
Code-projects
Code-projects online Reviewer System |
Mon, 09 Feb 2026 01:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was identified in code-projects Online Reviewer System 1.0. The affected element is an unknown function of the file /system/system/admins/assessments/pretest/loaddata.php. Such manipulation of the argument difficulty_id leads to sql injection. It is possible to launch the attack remotely. The exploit is publicly available and might be used. | |
| Title | code-projects Online Reviewer System loaddata.php sql injection | |
| Weaknesses | CWE-74 CWE-89 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-02-09T20:50:03.699Z
Reserved: 2026-02-07T17:36:22.979Z
Link: CVE-2026-2198
Updated: 2026-02-09T20:49:54.062Z
Status : Awaiting Analysis
Published: 2026-02-09T01:16:04.043
Modified: 2026-02-09T16:08:35.290
Link: CVE-2026-2198
No data.
OpenCVE Enrichment
Updated: 2026-02-09T10:39:14Z