School Erp Pro

4 CVEs product

Monthly

CVE-2020-37084 HIGH POC This Week

School Erp Pro versions up to 1.0 is affected by unrestricted upload of file with dangerous type (CVSS 7.2).

PHP RCE School Erp Pro
NVD Exploit-DB
CVSS 3.1
7.2
EPSS
0.3%
CVE-2020-37090 CRITICAL POC Act Now

School ERP Pro 1.0 allows students to upload arbitrary PHP files, enabling remote code execution from a low-privileged student account.

PHP RCE School Erp Pro
NVD Exploit-DB
CVSS 3.1
9.8
EPSS
0.9%
CVE-2020-37089 HIGH POC This Week

School ERP Pro 1.0 contains a SQL injection vulnerability in the 'es_messagesid' parameter that allows attackers to manipulate database queries through GET requests. [CVSS 8.2 HIGH]

SQLi School Erp Pro
NVD Exploit-DB
CVSS 3.1
8.2
EPSS
0.0%
CVE-2020-37088 HIGH POC This Week

School ERP Pro 1.0 contains a file disclosure vulnerability that allows unauthenticated attackers to read arbitrary files by manipulating the 'document' parameter in download.php. [CVSS 7.5 HIGH]

PHP Path Traversal School Erp Pro
NVD Exploit-DB
CVSS 3.1
7.5
EPSS
5.4%
CVE-2020-37084
EPSS 0% CVSS 7.2
HIGH POC This Week

School Erp Pro versions up to 1.0 is affected by unrestricted upload of file with dangerous type (CVSS 7.2).

PHP RCE School Erp Pro
NVD Exploit-DB
CVE-2020-37090
EPSS 1% CVSS 9.8
CRITICAL POC Act Now

School ERP Pro 1.0 allows students to upload arbitrary PHP files, enabling remote code execution from a low-privileged student account.

PHP RCE School Erp Pro
NVD Exploit-DB
CVE-2020-37089
EPSS 0% CVSS 8.2
HIGH POC This Week

School ERP Pro 1.0 contains a SQL injection vulnerability in the 'es_messagesid' parameter that allows attackers to manipulate database queries through GET requests. [CVSS 8.2 HIGH]

SQLi School Erp Pro
NVD Exploit-DB
CVE-2020-37088
EPSS 5% CVSS 7.5
HIGH POC This Week

School ERP Pro 1.0 contains a file disclosure vulnerability that allows unauthenticated attackers to read arbitrary files by manipulating the 'document' parameter in download.php. [CVSS 7.5 HIGH]

PHP Path Traversal School Erp Pro
NVD Exploit-DB

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy