Description
SQL injection vulnerability in start.asp in Active eWebquiz 8.0 allows remote attackers to execute arbitrary SQL commands via the (1) useremail parameter (aka username field) or the (2) password parameter. NOTE: some of these details are obtained from third party information.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by R3d-D3V!L · textwebappsasp
https://www.exploit-db.com/exploits/7279
References (3)
Core 3
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/46910
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/7279
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/32927
Scores
EPSS
0.0049
EPSS Percentile
65.4%
Details
CWE
CWE-89
Status
published
Products (1)
activewebsoftwares/active_ewebquiz
8.0
Published
Dec 17, 2008
Tracked Since
Feb 18, 2026