Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 10 Feb 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fabian
Fabian online Reviewer System |
|
| CPEs | cpe:2.3:a:fabian:online_reviewer_system:1.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Fabian
Fabian online Reviewer System |
Tue, 10 Feb 2026 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Code-projects
Code-projects online Reviewer System |
|
| Vendors & Products |
Code-projects
Code-projects online Reviewer System |
Mon, 09 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 09 Feb 2026 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A weakness has been identified in code-projects Online Reviewer System 1.0. Affected by this vulnerability is an unknown functionality of the file /system/system/admins/manage/users/btn_functions.php. Executing a manipulation of the argument firstname can lead to cross site scripting. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks. | |
| Title | code-projects Online Reviewer System btn_functions.php cross site scripting | |
| Weaknesses | CWE-79 CWE-94 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-02-09T15:38:43.210Z
Reserved: 2026-02-08T16:00:20.429Z
Link: CVE-2026-2222
Updated: 2026-02-09T15:38:36.671Z
Status : Analyzed
Published: 2026-02-09T08:16:11.887
Modified: 2026-02-10T14:00:11.230
Link: CVE-2026-2222
No data.
OpenCVE Enrichment
Updated: 2026-02-10T12:23:52Z