Page 5 of 26 results (0.003 seconds)

CVSS: 6.8EPSS: 0%CPEs: 101EXPL: 5

Multiple SQL injection vulnerabilities in TCExam before 11.3.008 allow remote authenticated users with level 5 or greater permissions to execute arbitrary SQL commands via the subject_module_id parameter to (1) tce_edit_answer.php or (2) tce_edit_question.php. Múltiples vulnerabilidades inyección de código SQL en TCExam anterior a v11.3.008 permite a usuarios remotos autenticados con nivel 5 o permisos superiores ejecutar comandos SQL arbitrarios a través del parámetro subject_module_id en (1) tce_edit_answer.php o (2) tce_edit_question.php. TCExam Edit version 11.3.007 suffers from a remote SQL injection vulnerability. • https://www.exploit-db.com/exploits/37584 https://www.exploit-db.com/exploits/37585 http://archives.neohapsis.com/archives/bugtraq/2012-08/0079.html http://freecode.com/projects/tcexam/releases/347125 http://secunia.com/advisories/50141 http://tcexam.git.sourceforge.net/git/gitweb.cgi?p=tcexam/tcexam%3Bh=edf6e08622642f1b2421f4355d98250d9e1b0742 http://www.openwall.com/lists/oss-security/2012/08/13/8 http://www.reactionpenetrationtesting.co.uk/tcexam-sql-injection.html http://www.securityfocus. • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

TCExam 11.1.015 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by public/code/tce_page_footer.php and certain other files. TCExam v11.1.015 permite a atacantes remotos obtener información sensible a través de una petición directa a un archivo .php, lo que revela la ruta de instalación en un mensaje de error, como se demostró con public/code/tce_page_footer.php y algunos otros archivos. • http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/tcexam_11.1.015 http://www.openwall.com/lists/oss-security/2011/06/27/6 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 6.8EPSS: 12%CPEs: 2EXPL: 4

Unrestricted file upload vulnerability in admin/code/tce_functions_tcecode_editor.php in TCExam 10.1.006 and 10.1.007 allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in cache/. Fichero de subida sin restricción en admin/code/tce_functions_tcecode_editor.php de TCExam v10.1.006 y v10.1.007 permite a atacantes remotos ejecutar código arbitrario a través de la subida de un fichero con una extensión ejecutable, y después acceder a el a través de una petición directa del fichero en caché. • https://www.exploit-db.com/exploits/34073 http://cross-site-scripting.blogspot.com/2010/06/tcexam-101006-arbitrary-upload.html http://osvdb.org/65052 http://secunia.com/advisories/40011 http://www.packetstormsecurity.org/1006-exploits/tcexam-shell.txt http://www.securityfocus.com/bid/40511 http://www.vupen.com/english/advisories/2010/1329 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Multiple SQL injection vulnerabilities in TCExam before 5.1.000 allow remote attackers to execute arbitrary SQL commands via unspecified vectors. Múltiples vulnerabilidades de inyección SQL en TCExam versiones anteriores a 5.1.000 permiten a atacantes remotos ejecutar comandos SQL de su elección mediante vectores no especificados. • http://secunia.com/advisories/27940 http://sourceforge.net/project/shownotes.php?release_id=559646&group_id=159398 http://www.securityfocus.com/bid/26760 https://exchange.xforce.ibmcloud.com/vulnerabilities/38920 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 6.8EPSS: 1%CPEs: 1EXPL: 1

Dynamic variable evaluation vulnerability in shared/config/tce_config.php in TCExam 4.0.011 and earlier allows remote attackers to conduct cross-site scripting (XSS) and possibly other attacks by modifying critical variables such as $_SERVER, as demonstrated by injecting web script via the _SERVER[SCRIPT_NAME] parameter. Vulnerabilidad de evaluación de variable dinámica en shared/config/tce_config.php en TCExam 4.0.011 y anteriores permite a atacantes remotos llevar a cabo ataques de secuencias de comandos en sitios cruzados (XSS) y posiblemente otros ataques modificando variables críticas como $_SERVER, como ha sido demostrado inyectando secuencias de comandos web mediante el parámetro _SERVER[SCRIPT_NAME]. • https://www.exploit-db.com/exploits/3816 http://secunia.com/advisories/25008 http://sourceforge.net/forum/forum.php?forum_id=690912 http://www.attrition.org/pipermail/vim/2007-May/001572.html http://www.securityfocus.com/bid/23704 https://exchange.xforce.ibmcloud.com/vulnerabilities/33957 •