CVE-2009-4933

Winterwebs Ezwebitor - SQL Injection

Title source: rule
STIX 2.1

Description

Multiple SQL injection vulnerabilities in login.php in EZ Webitor allow remote attackers to execute arbitrary SQL commands via the (1) txtUserId (Username) and (2) txtPassword (Password) parameters. NOTE: some of these details are obtained from third party information.

Exploits (1)

exploitdb WORKING POC VERIFIED
by snakespc · textwebappsphp
https://www.exploit-db.com/exploits/8487

References (4)

Core 4
Core References
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/34819
Exploit, Third Party Advisory exploit x_refsource_exploit-db
http://www.exploit-db.com/exploits/8487
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/34604
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/49966

Scores

EPSS 0.0013
EPSS Percentile 32.4%

Details

CWE
CWE-89
Status published
Products (1)
winterwebs/ezwebitor
Published Jul 12, 2010
Tracked Since Feb 18, 2026