Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2012-4602
Deferred
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-23 Nov, 2012 | 20:55
Updated At-11 Apr, 2025 | 00:51

Multiple cross-site scripting (XSS) vulnerabilities in admin/code/tce_select_users_popup.php in Nicola Asuni TCExam before 11.3.009 allow remote attackers to inject arbitrary web script or HTML via the (1) cid or (2) uids parameter.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.04.3MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
Type: Primary
Version: 2.0
Base score: 4.3
Base severity: MEDIUM
Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N
CPE Matches

tecnick
tecnick
>>tcexam>>Versions up to 11.3.008(inclusive)
cpe:2.3:a:tecnick:tcexam:*:*:*:*:*:*:*:*
tecnick
tecnick
>>tcexam>>10.1.000
cpe:2.3:a:tecnick:tcexam:10.1.000:*:*:*:*:*:*:*
tecnick
tecnick
>>tcexam>>10.1.001
cpe:2.3:a:tecnick:tcexam:10.1.001:*:*:*:*:*:*:*
tecnick
tecnick
>>tcexam>>10.1.002
cpe:2.3:a:tecnick:tcexam:10.1.002:*:*:*:*:*:*:*
tecnick
tecnick
>>tcexam>>10.1.003
cpe:2.3:a:tecnick:tcexam:10.1.003:*:*:*:*:*:*:*
tecnick
tecnick
>>tcexam>>10.1.004
cpe:2.3:a:tecnick:tcexam:10.1.004:*:*:*:*:*:*:*
tecnick
tecnick
>>tcexam>>10.1.005
cpe:2.3:a:tecnick:tcexam:10.1.005:*:*:*:*:*:*:*
tecnick
tecnick
>>tcexam>>10.1.006
cpe:2.3:a:tecnick:tcexam:10.1.006:*:*:*:*:*:*:*
tecnick
tecnick
>>tcexam>>10.1.007
cpe:2.3:a:tecnick:tcexam:10.1.007:*:*:*:*:*:*:*
tecnick
tecnick
>>tcexam>>10.1.008
cpe:2.3:a:tecnick:tcexam:10.1.008:*:*:*:*:*:*:*
tecnick
tecnick
>>tcexam>>10.1.009
cpe:2.3:a:tecnick:tcexam:10.1.009:*:*:*:*:*:*:*
tecnick
tecnick
>>tcexam>>10.1.010
cpe:2.3:a:tecnick:tcexam:10.1.010:*:*:*:*:*:*:*
tecnick
tecnick
>>tcexam>>10.1.011
cpe:2.3:a:tecnick:tcexam:10.1.011:*:*:*:*:*:*:*
tecnick
tecnick
>>tcexam>>10.1.012
cpe:2.3:a:tecnick:tcexam:10.1.012:*:*:*:*:*:*:*
tecnick
tecnick
>>tcexam>>10.1.013
cpe:2.3:a:tecnick:tcexam:10.1.013:*:*:*:*:*:*:*
tecnick
tecnick
>>tcexam>>11.0.000
cpe:2.3:a:tecnick:tcexam:11.0.000:*:*:*:*:*:*:*
tecnick
tecnick
>>tcexam>>11.0.001
cpe:2.3:a:tecnick:tcexam:11.0.001:*:*:*:*:*:*:*
tecnick
tecnick
>>tcexam>>11.0.002
cpe:2.3:a:tecnick:tcexam:11.0.002:*:*:*:*:*:*:*
tecnick
tecnick
>>tcexam>>11.0.003
cpe:2.3:a:tecnick:tcexam:11.0.003:*:*:*:*:*:*:*
tecnick
tecnick
>>tcexam>>11.0.004
cpe:2.3:a:tecnick:tcexam:11.0.004:*:*:*:*:*:*:*
tecnick
tecnick
>>tcexam>>11.0.005
cpe:2.3:a:tecnick:tcexam:11.0.005:*:*:*:*:*:*:*
tecnick
tecnick
>>tcexam>>11.0.006
cpe:2.3:a:tecnick:tcexam:11.0.006:*:*:*:*:*:*:*
tecnick
tecnick
>>tcexam>>11.0.007
cpe:2.3:a:tecnick:tcexam:11.0.007:*:*:*:*:*:*:*
tecnick
tecnick
>>tcexam>>11.0.008
cpe:2.3:a:tecnick:tcexam:11.0.008:*:*:*:*:*:*:*
tecnick
tecnick
>>tcexam>>11.0.009
cpe:2.3:a:tecnick:tcexam:11.0.009:*:*:*:*:*:*:*
tecnick
tecnick
>>tcexam>>11.0.010
cpe:2.3:a:tecnick:tcexam:11.0.010:*:*:*:*:*:*:*
tecnick
tecnick
>>tcexam>>11.0.011
cpe:2.3:a:tecnick:tcexam:11.0.011:*:*:*:*:*:*:*
tecnick
tecnick
>>tcexam>>11.0.012
cpe:2.3:a:tecnick:tcexam:11.0.012:*:*:*:*:*:*:*
tecnick
tecnick
>>tcexam>>11.0.013
cpe:2.3:a:tecnick:tcexam:11.0.013:*:*:*:*:*:*:*
tecnick
tecnick
>>tcexam>>11.0.014
cpe:2.3:a:tecnick:tcexam:11.0.014:*:*:*:*:*:*:*
tecnick
tecnick
>>tcexam>>11.0.015
cpe:2.3:a:tecnick:tcexam:11.0.015:*:*:*:*:*:*:*
tecnick
tecnick
>>tcexam>>11.0.016
cpe:2.3:a:tecnick:tcexam:11.0.016:*:*:*:*:*:*:*
tecnick
tecnick
>>tcexam>>11.1.000
cpe:2.3:a:tecnick:tcexam:11.1.000:*:*:*:*:*:*:*
tecnick
tecnick
>>tcexam>>11.1.001
cpe:2.3:a:tecnick:tcexam:11.1.001:*:*:*:*:*:*:*
tecnick
tecnick
>>tcexam>>11.1.002
cpe:2.3:a:tecnick:tcexam:11.1.002:*:*:*:*:*:*:*
tecnick
tecnick
>>tcexam>>11.1.003
cpe:2.3:a:tecnick:tcexam:11.1.003:*:*:*:*:*:*:*
tecnick
tecnick
>>tcexam>>11.1.004
cpe:2.3:a:tecnick:tcexam:11.1.004:*:*:*:*:*:*:*
tecnick
tecnick
>>tcexam>>11.1.005
cpe:2.3:a:tecnick:tcexam:11.1.005:*:*:*:*:*:*:*
tecnick
tecnick
>>tcexam>>11.1.006
cpe:2.3:a:tecnick:tcexam:11.1.006:*:*:*:*:*:*:*
tecnick
tecnick
>>tcexam>>11.1.007
cpe:2.3:a:tecnick:tcexam:11.1.007:*:*:*:*:*:*:*
tecnick
tecnick
>>tcexam>>11.1.008
cpe:2.3:a:tecnick:tcexam:11.1.008:*:*:*:*:*:*:*
tecnick
tecnick
>>tcexam>>11.1.009
cpe:2.3:a:tecnick:tcexam:11.1.009:*:*:*:*:*:*:*
tecnick
tecnick
>>tcexam>>11.1.010
cpe:2.3:a:tecnick:tcexam:11.1.010:*:*:*:*:*:*:*
tecnick
tecnick
>>tcexam>>11.1.011
cpe:2.3:a:tecnick:tcexam:11.1.011:*:*:*:*:*:*:*
tecnick
tecnick
>>tcexam>>11.1.012
cpe:2.3:a:tecnick:tcexam:11.1.012:*:*:*:*:*:*:*
tecnick
tecnick
>>tcexam>>11.1.013
cpe:2.3:a:tecnick:tcexam:11.1.013:*:*:*:*:*:*:*
tecnick
tecnick
>>tcexam>>11.1.014
cpe:2.3:a:tecnick:tcexam:11.1.014:*:*:*:*:*:*:*
tecnick
tecnick
>>tcexam>>11.1.015
cpe:2.3:a:tecnick:tcexam:11.1.015:*:*:*:*:*:*:*
tecnick
tecnick
>>tcexam>>11.1.016
cpe:2.3:a:tecnick:tcexam:11.1.016:*:*:*:*:*:*:*
tecnick
tecnick
>>tcexam>>11.1.017
cpe:2.3:a:tecnick:tcexam:11.1.017:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-79Primarynvd@nist.gov
CWE ID: CWE-79
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://freecode.com/projects/tcexam/releases/347588cve@mitre.org
N/A
http://secunia.com/advisories/50539cve@mitre.org
Vendor Advisory
http://sourceforge.net/projects/tcexam/files/CHANGELOG.TXT/viewcve@mitre.org
N/A
http://tcexam.git.sourceforge.net/git/gitweb.cgi?p=tcexam/tcexam%3Ba=commit%3Bh=3e1ed3c02122eae182f076daabe903b0c8837971cve@mitre.org
N/A
https://www.htbridge.com/advisory/HTB23111cve@mitre.org
N/A
http://freecode.com/projects/tcexam/releases/347588af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/50539af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://sourceforge.net/projects/tcexam/files/CHANGELOG.TXT/viewaf854a3a-2127-422b-91ae-364da2661108
N/A
http://tcexam.git.sourceforge.net/git/gitweb.cgi?p=tcexam/tcexam%3Ba=commit%3Bh=3e1ed3c02122eae182f076daabe903b0c8837971af854a3a-2127-422b-91ae-364da2661108
N/A
https://www.htbridge.com/advisory/HTB23111af854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: http://freecode.com/projects/tcexam/releases/347588
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/50539
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://sourceforge.net/projects/tcexam/files/CHANGELOG.TXT/view
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://tcexam.git.sourceforge.net/git/gitweb.cgi?p=tcexam/tcexam%3Ba=commit%3Bh=3e1ed3c02122eae182f076daabe903b0c8837971
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://www.htbridge.com/advisory/HTB23111
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://freecode.com/projects/tcexam/releases/347588
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/50539
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://sourceforge.net/projects/tcexam/files/CHANGELOG.TXT/view
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://tcexam.git.sourceforge.net/git/gitweb.cgi?p=tcexam/tcexam%3Ba=commit%3Bh=3e1ed3c02122eae182f076daabe903b0c8837971
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://www.htbridge.com/advisory/HTB23111
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Change History
0Changes found

Details not found