Vulnerabilities (CVE)

Filtered by vendor Tecnick Subscribe
Filtered by product Tcexam
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2012-4602 1 Tecnick 1 Tcexam 2012-11-27 4.3 MEDIUM N/A
Multiple cross-site scripting (XSS) vulnerabilities in admin/code/tce_select_users_popup.php in Nicola Asuni TCExam before 11.3.009 allow remote attackers to inject arbitrary web script or HTML via the (1) cid or (2) uids parameter.
CVE-2012-4601 1 Tecnick 1 Tcexam 2012-11-26 6.0 MEDIUM N/A
Multiple SQL injection vulnerabilities in Nicola Asuni TCExam before 11.3.009 allow remote authenticated users with level 5 or greater permissions to execute arbitrary SQL commands via the (1) user_groups[] parameter to admin/code/tce_edit_test.php or (2) subject_id parameter to admin/code/tce_show_all_questions.php.
CVE-2012-4238 1 Tecnick 1 Tcexam 2012-09-11 2.1 LOW N/A
Cross-site scripting (XSS) vulnerability in admin/code/tce_edit_answer.php in TCExam before 11.3.008 allows remote authenticated users with level 5 or greater permissions to inject arbitrary web script or HTML via the question_subject_id parameter.
CVE-2012-4237 1 Tecnick 1 Tcexam 2012-09-11 6.8 MEDIUM N/A
Multiple SQL injection vulnerabilities in TCExam before 11.3.008 allow remote authenticated users with level 5 or greater permissions to execute arbitrary SQL commands via the subject_module_id parameter to (1) tce_edit_answer.php or (2) tce_edit_question.php.
CVE-2011-3806 1 Tecnick 1 Tcexam 2012-05-21 5.0 MEDIUM N/A
TCExam 11.1.015 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by public/code/tce_page_footer.php and certain other files.
CVE-2010-2153 1 Tecnick 1 Tcexam 2010-06-04 6.8 MEDIUM N/A
Unrestricted file upload vulnerability in admin/code/tce_functions_tcecode_editor.php in TCExam 10.1.006 and 10.1.007 allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in cache/.