Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2012-4601


Multiple SQL injection vulnerabilities in Nicola Asuni TCExam before 11.3.009 allow remote authenticated users with level 5 or greater permissions to execute arbitrary SQL commands via the (1) user_groups[] parameter to admin/code/tce_edit_test.php or (2) subject_id parameter to admin/code/tce_show_all_questions.php.


Security Impact Summary

CVE-2012-4601 is a security vulnerability that . Impacting 1 product from tecnick organizations running these solutions should prioritize assessment and patching.

Historical Context

Documented in 2012, this vulnerability occurred amid the cloud computing expansion era, where traditional network perimeter security models were being reevaluated. Organizations were transitioning from isolated infrastructure to interconnected systems, creating new attack surfaces that vulnerabilities like this could exploit.


Published

2012-11-23T20:55:03.883

Last Modified

2025-04-11T00:51:21.963

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 6.0 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:S/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: SINGLE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

6.8

Impact Score

6.4

Weaknesses
  • Type: Primary
    CWE-89

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application tecnick tcexam ≤ 11.3.008 Yes
Application tecnick tcexam 10.1.000 Yes
Application tecnick tcexam 10.1.001 Yes
Application tecnick tcexam 10.1.002 Yes
Application tecnick tcexam 10.1.003 Yes
Application tecnick tcexam 10.1.004 Yes
Application tecnick tcexam 10.1.005 Yes
Application tecnick tcexam 10.1.006 Yes
Application tecnick tcexam 10.1.007 Yes
Application tecnick tcexam 10.1.008 Yes
Application tecnick tcexam 10.1.009 Yes
Application tecnick tcexam 10.1.010 Yes
Application tecnick tcexam 10.1.011 Yes
Application tecnick tcexam 10.1.012 Yes
Application tecnick tcexam 10.1.013 Yes
Application tecnick tcexam 11.0.000 Yes
Application tecnick tcexam 11.0.001 Yes
Application tecnick tcexam 11.0.002 Yes
Application tecnick tcexam 11.0.003 Yes
Application tecnick tcexam 11.0.004 Yes
Application tecnick tcexam 11.0.005 Yes
Application tecnick tcexam 11.0.006 Yes
Application tecnick tcexam 11.0.007 Yes
Application tecnick tcexam 11.0.008 Yes
Application tecnick tcexam 11.0.009 Yes
Application tecnick tcexam 11.0.010 Yes
Application tecnick tcexam 11.0.011 Yes
Application tecnick tcexam 11.0.012 Yes
Application tecnick tcexam 11.0.013 Yes
Application tecnick tcexam 11.0.014 Yes
Application tecnick tcexam 11.0.015 Yes
Application tecnick tcexam 11.0.016 Yes
Application tecnick tcexam 11.1.000 Yes
Application tecnick tcexam 11.1.001 Yes
Application tecnick tcexam 11.1.002 Yes
Application tecnick tcexam 11.1.003 Yes
Application tecnick tcexam 11.1.004 Yes
Application tecnick tcexam 11.1.005 Yes
Application tecnick tcexam 11.1.006 Yes
Application tecnick tcexam 11.1.007 Yes
Application tecnick tcexam 11.1.008 Yes
Application tecnick tcexam 11.1.009 Yes
Application tecnick tcexam 11.1.010 Yes
Application tecnick tcexam 11.1.011 Yes
Application tecnick tcexam 11.1.012 Yes
Application tecnick tcexam 11.1.013 Yes
Application tecnick tcexam 11.1.014 Yes
Application tecnick tcexam 11.1.015 Yes
Application tecnick tcexam 11.1.016 Yes
Application tecnick tcexam 11.1.017 Yes
Application tecnick tcexam 11.1.018 Yes
Application tecnick tcexam 11.1.019 Yes
Application tecnick tcexam 11.1.020 Yes
Application tecnick tcexam 11.1.021 Yes
Application tecnick tcexam 11.1.022 Yes
Application tecnick tcexam 11.1.023 Yes
Application tecnick tcexam 11.1.024 Yes
Application tecnick tcexam 11.1.025 Yes
Application tecnick tcexam 11.1.026 Yes
Application tecnick tcexam 11.1.027 Yes
Application tecnick tcexam 11.1.028 Yes
Application tecnick tcexam 11.1.029 Yes
Application tecnick tcexam 11.1.030 Yes
Application tecnick tcexam 11.1.031 Yes
Application tecnick tcexam 11.2.000 Yes
Application tecnick tcexam 11.2.001 Yes
Application tecnick tcexam 11.2.002 Yes
Application tecnick tcexam 11.2.003 Yes
Application tecnick tcexam 11.2.004 Yes
Application tecnick tcexam 11.2.005 Yes
Application tecnick tcexam 11.2.006 Yes
Application tecnick tcexam 11.2.007 Yes
Application tecnick tcexam 11.2.008 Yes
Application tecnick tcexam 11.2.010 Yes
Application tecnick tcexam 11.2.011 Yes
Application tecnick tcexam 11.2.012 Yes
Application tecnick tcexam 11.2.013 Yes
Application tecnick tcexam 11.2.014 Yes
Application tecnick tcexam 11.2.015 Yes
Application tecnick tcexam 11.2.016 Yes
Application tecnick tcexam 11.2.017 Yes
Application tecnick tcexam 11.2.018 Yes
Application tecnick tcexam 11.2.020 Yes
Application tecnick tcexam 11.2.021 Yes
Application tecnick tcexam 11.2.022 Yes
Application tecnick tcexam 11.2.023 Yes
Application tecnick tcexam 11.2.025 Yes
Application tecnick tcexam 11.2.026 Yes
Application tecnick tcexam 11.2.027 Yes
Application tecnick tcexam 11.2.028 Yes
Application tecnick tcexam 11.2.029 Yes
Application tecnick tcexam 11.2.030 Yes
Application tecnick tcexam 11.2.031 Yes
Application tecnick tcexam 11.2.032 Yes
Application tecnick tcexam 11.3.000 Yes
Application tecnick tcexam 11.3.001 Yes
Application tecnick tcexam 11.3.002 Yes
Application tecnick tcexam 11.3.003 Yes
Application tecnick tcexam 11.3.004 Yes
Application tecnick tcexam 11.3.005 Yes
Application tecnick tcexam 11.3.006 Yes
Application tecnick tcexam 11.3.007 Yes

References

How SecUtils Interprets This CVE

SecUtils normalizes and enriches National Vulnerability Database (NVD) records by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and providing structured context for security teams. For tecnick's affected products, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference data to enable rapid vulnerability prioritization and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and security operations.