CVE-2008-5631

Active eWebquiz 8.0 - SQL Injection

Title source: llm
STIX 2.1

Description

SQL injection vulnerability in start.asp in Active eWebquiz 8.0 allows remote attackers to execute arbitrary SQL commands via the (1) useremail parameter (aka username field) or the (2) password parameter. NOTE: some of these details are obtained from third party information.

Exploits (1)

exploitdb WORKING POC VERIFIED
by R3d-D3V!L · textwebappsasp
https://www.exploit-db.com/exploits/7279

References (3)

Core 3
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/46910
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/7279
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/32927

Scores

EPSS 0.0049
EPSS Percentile 65.4%

Details

CWE
CWE-89
Status published
Products (1)
activewebsoftwares/active_ewebquiz 8.0
Published Dec 17, 2008
Tracked Since Feb 18, 2026