Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 10 Feb 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gunet
Gunet open Eclass Platform |
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:gunet:open_eclass_platform:1.7.3:*:*:*:*:*:*:* | |
| Vendors & Products |
Gunet
Gunet open Eclass Platform |
Wed, 04 Feb 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 04 Feb 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openeclass
Openeclass openeclass |
|
| Vendors & Products |
Openeclass
Openeclass openeclass |
Tue, 03 Feb 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | GUnet OpenEclass 1.7.3 includes phpMyAdmin 2.10.0.2 by default, which allows remote logins. Attackers with access to the platform can remotely access phpMyAdmin and, after uploading a shell, view the config.php file to obtain the MySQL password, leading to full database compromise. | |
| Title | GUnet OpenEclass 1.7.3 E-learning platform - phpMyAdmin Remote Access | |
| Weaknesses | CWE-284 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-02-04T18:41:09.692Z
Reserved: 2026-02-03T16:27:45.302Z
Link: CVE-2020-37116
Updated: 2026-02-04T18:41:02.860Z
Status : Analyzed
Published: 2026-02-03T18:16:12.040
Modified: 2026-02-10T21:20:24.043
Link: CVE-2020-37116
No data.
OpenCVE Enrichment
Updated: 2026-02-04T12:09:33Z