Show filters
7 Total Results
Displaying 1-7 of 7
Sort by:
Attacker Value
Unknown

CVE-2020-36154

Disclosure Date: January 04, 2021 (last updated February 22, 2025)
The Application Wrapper in Pearson VUE VTS Installer 2.3.1911 has Full Control permissions for Everyone in the "%SYSTEMDRIVE%\Pearson VUE" directory, which allows local users to obtain administrative privileges via a Trojan horse application.
Attacker Value
Unknown

CVE-2014-1454

Disclosure Date: January 08, 2020 (last updated February 21, 2025)
Pearson eSIS (Enterprise Student Information System) message board has stored XSS due to improper validation of user input
Attacker Value
Unknown

CVE-2018-12989

Disclosure Date: August 03, 2018 (last updated November 27, 2024)
The report-viewing feature in Pearson VUE Certiport Console 8 and IQSystem 7 before 2018-06-26 mishandles child processes and consequently launches Internet Explorer or Microsoft Edge as Administrator, which allows local users to gain privileges.
0
Attacker Value
Unknown

CVE-2015-0972

Disclosure Date: June 23, 2015 (last updated October 05, 2023)
Pearson ProctorCache before 2015.1.17 uses the same hardcoded password across different customers' installations, which allows remote attackers to modify test metadata or cause a denial of service (test disruption) by leveraging knowledge of this password.
0
Attacker Value
Unknown

CVE-2014-1455

Disclosure Date: April 10, 2014 (last updated October 05, 2023)
SQL injection vulnerability in the password reset functionality in Pearson eSIS Enterprise Student Information System, possibly 3.3.0.13 and earlier, allows remote attackers to execute arbitrary SQL commands via the new password.
0
Attacker Value
Unknown

CVE-2014-1942

Disclosure Date: April 02, 2014 (last updated October 05, 2023)
Cross-site scripting (XSS) vulnerability in aal/loginverification.aspx in Pearson eSIS Enterprise Student Information System allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
0
Attacker Value
Unknown

CVE-2007-1044

Disclosure Date: February 21, 2007 (last updated October 04, 2023)
Pearson Education PowerSchool 4.3.6 allows remote attackers to list the contents of the admin folder via a URI composed of the admin/ directory name and an arbitrary filename ending in ".js." NOTE: it was later reported that this issue had been addressed by 5.1.2.
0