Description
Multiple SQL injection vulnerabilities in TCExam before 11.3.008 allow remote authenticated users with level 5 or greater permissions to execute arbitrary SQL commands via the subject_module_id parameter to (1) tce_edit_answer.php or (2) tce_edit_question.php.
Exploits (2)
exploitdb
WRITEUP
VERIFIED
by Chris Cooper · textwebappsphp
https://www.exploit-db.com/exploits/37585
exploitdb
WRITEUP
VERIFIED
by Chris Cooper · textwebappsphp
https://www.exploit-db.com/exploits/37584
References (7)
Core 7
Core References
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/54861
Product x_refsource_confirm
http://tcexam.git.sourceforge.net/git/gitweb.cgi?p=tcexam/tcexam%3Bh=edf6e08622642f1b2421f4355d98250d9e1b0742
Exploit mailing-list
x_refsource_bugtraq
http://archives.neohapsis.com/archives/bugtraq/2012-08/0079.html
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/50141
Release Notes x_refsource_confirm
http://freecode.com/projects/tcexam/releases/347125
Exploit x_refsource_misc
http://www.reactionpenetrationtesting.co.uk/tcexam-sql-injection.html
Mailing List mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2012/08/13/8
Scores
EPSS
0.0046
EPSS Percentile
64.3%
Details
CWE
CWE-89
Status
published
Products (50)
tecnick/tcexam
10.1.000
tecnick/tcexam
10.1.001
tecnick/tcexam
10.1.002
tecnick/tcexam
10.1.003
tecnick/tcexam
10.1.004
tecnick/tcexam
10.1.005
tecnick/tcexam
10.1.006
tecnick/tcexam
10.1.007
tecnick/tcexam
10.1.008
tecnick/tcexam
10.1.009
... and 40 more
Published
Aug 20, 2012
Tracked Since
Feb 18, 2026