CVE-2026-3412
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to inject malicious scripts into the university management system, which can then be executed in the browsers of users visiting the affected page. The attack can be carried out remotely, meaning the attacker doesn't need physical access to the system, and it is now publicly known, increasing the risk of exploitation.
Technical Description
A vulnerability was detected in itsourcecode University Management System 1.0. This affects an unknown part of the file /att_single_view.php. The manipulation of the argument dt results in cross site scripting. The attack can be executed remotely. The exploit is now public and may be used.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 2, 2026
about 1 month ago
Last Modified
Mar 3, 2026
about 1 month ago
Vendor
angeljudesuarez
Product
university management system
Related Vulnerabilities
An attacker can exploit a vulnerability in the university management system to manipulate a specific input, allowing them to execute unauthorized SQL commands and potentially access or modify the database remotely. This attack can be carried out without needing physical access to the system, making it a significant risk for any installation of this software.
This vulnerability allows an attacker to inject malicious scripts into the payroll management system, potentially compromising user data or session information. It can be exploited remotely by manipulating a specific part of the web application without needing special access or credentials.
This vulnerability allows an attacker to remotely manipulate the university management system's database by exploiting a flaw in a specific file, which can lead to unauthorized access to sensitive information. The attacker needs to send a specially crafted request to the system, and there are publicly available tools that can facilitate this exploit.
An attacker can remotely manipulate a specific part of the university management system to execute unauthorized SQL commands, potentially gaining access to sensitive data in the database. This vulnerability occurs when the system processes a certain input incorrectly, making it easy for attackers to exploit it if they know how to send the right request.
An attacker can exploit a vulnerability in the university management system to manipulate data in the database by sending specially crafted requests, allowing them to execute unauthorized SQL commands. This can be done remotely without needing to be logged in, and there are publicly available methods to carry out the attack.