CVE-2008-6624

Webbdomain Petition - SQL Injection

Title source: rule
STIX 2.1

Description

SQL injection vulnerability in getin.php in WEBBDOMAIN Petition 1.02, 2.0, and 3.0 allows remote attackers to execute arbitrary SQL commands via the username parameter.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Hakxer · textwebappsphp
https://www.exploit-db.com/exploits/6983

References (4)

Core 4
Core References
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/32108
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/46362
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/6983
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/49759

Scores

EPSS 0.0032
EPSS Percentile 55.3%

Details

CWE
CWE-89
Status published
Products (4)
webbdomain/petition 1.0
webbdomain/petition 1.02
webbdomain/petition 2.0
webbdomain/petition 3.0
Published Apr 06, 2009
Tracked Since Feb 18, 2026