Exploitation Summary
EIP tracks 1 public exploit for CVE-2008-0281. PoCs published by consultant.securite.
AI-analyzed exploit summary The provided text describes an SQL injection vulnerability in ID-Commerce, with example URLs demonstrating the exploit. It lacks executable code but provides clear proof-of-concept payloads.
Description
SQL injection vulnerability in liste.php in ID-Commerce 2.0 and earlier allows remote attackers to execute arbitrary SQL commands via the idFamille parameter.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by consultant.securite · textwebappsphp
https://www.exploit-db.com/exploits/31009
The provided text describes an SQL injection vulnerability in ID-Commerce, with example URLs demonstrating the exploit. It lacks executable code but provides clear proof-of-concept payloads.
Classification
Writeup 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:
ID-Commerce (version unspecified)
No auth needed
Prerequisites:
Network access to the vulnerable application
devstral-2 · analyzed Feb 16, 2026
Full analysis →
References (5)
Core 5
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/39594
Mailing List mailing-list
x_refsource_fulldisc
http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059533.html
Mailing List mailing-list
x_refsource_fulldisc
http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059538.html
Mailing List mailing-list
x_refsource_fulldisc
http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059537.html
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/27220
Scores
EPSS
0.0037
EPSS Percentile
59.1%
Details
CWE
CWE-89
Status
published
Products (1)
id-commerce/id-commerce
< 2.0
Published
Jan 15, 2008
Tracked Since
Feb 18, 2026