CVE-2008-6623

Webbdomain Post Card < 1.02 - SQL Injection

Title source: rule
STIX 2.1

Description

SQL injection vulnerability in getin.php in WEBBDOMAIN Post Card (aka Web Postcards) 1.02 and earlier allows remote attackers to execute arbitrary SQL commands via the username parameter.

Exploits (1)

exploitdb WORKING POC VERIFIED
by x0r · textwebappsphp
https://www.exploit-db.com/exploits/6989

References (5)

Core 5
Core References
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/32108
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/32494
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/6989
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/49824
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/46359

Scores

EPSS 0.0040
EPSS Percentile 60.6%

Details

CWE
CWE-89
Status published
Products (2)
webbdomain/post_card 1.01
webbdomain/post_card < 1.02
Published Apr 06, 2009
Tracked Since Feb 18, 2026