Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 25 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Mar 2026 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was determined in code-projects Exam Form Submission 1.0. The impacted element is an unknown function of the file /admin/update_s3.php. Executing a manipulation of the argument sname can lead to cross site scripting. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. | |
| Title | code-projects Exam Form Submission update_s3.php cross site scripting | |
| First Time appeared |
Code-projects
Code-projects exam Form Submission |
|
| Weaknesses | CWE-79 CWE-94 |
|
| CPEs | cpe:2.3:a:code-projects:exam_form_submission:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Code-projects
Code-projects exam Form Submission |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-03-25T14:01:02.245Z
Reserved: 2026-03-22T08:51:18.505Z
Link: CVE-2026-4578
Updated: 2026-03-25T14:00:35.650Z
Status : Deferred
Published: 2026-03-23T08:16:18.030
Modified: 2026-04-29T01:00:01.613
Link: CVE-2026-4578
No data.
OpenCVE Enrichment
Updated: 2026-03-25T14:49:32Z