CVE-2008-5589

Katy Whitton RankEm - SQL Injection

Title source: llm
STIX 2.1

Description

SQL injection vulnerability in processlogin.asp in Katy Whitton RankEm allows remote attackers to execute arbitrary SQL commands via the (1) txtusername parameter (aka username field) or the (2) txtpassword parameter (aka password field). NOTE: some of these details are obtained from third party information.

Exploits (1)

exploitdb WORKING POC VERIFIED
by AlpHaNiX · textwebappsasp
https://www.exploit-db.com/exploits/7350

References (5)

Core 5
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/47114
Exploit third-party-advisory x_refsource_secunia
http://secunia.com/advisories/33012
Third Party Advisory third-party-advisory x_refsource_sreason
http://securityreason.com/securityalert/4746
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/32686
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/7350

Scores

EPSS 0.0044
EPSS Percentile 63.1%

Details

CWE
CWE-89
Status published
Products (1)
katywhitton/rankem
Published Dec 16, 2008
Tracked Since Feb 18, 2026