No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 04 Feb 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openeclass
Openeclass openeclass |
|
| Vendors & Products |
Openeclass
Openeclass openeclass |
Tue, 03 Feb 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | GUnet OpenEclass 1.7.3 contains multiple SQL injection vulnerabilities that allow authenticated attackers to manipulate database queries through unvalidated parameters. Attackers can exploit the 'month' parameter in the agenda module and other endpoints to extract sensitive database information using error-based or time-based injection techniques. | |
| Title | GUnet OpenEclass 1.7.3 E-learning platform - 'month' SQL Injection | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-02-03T16:52:45.252Z
Reserved: 2026-02-03T16:27:45.301Z
Link: CVE-2020-37112
No data.
Status : Awaiting Analysis
Published: 2026-02-03T18:16:11.360
Modified: 2026-02-04T16:34:21.763
Link: CVE-2020-37112
No data.
OpenCVE Enrichment
Updated: 2026-02-04T12:08:57Z