CVE-2008-5631

SQL injection vulnerability in start.asp in Active eWebquiz 8.0 allows remote attackers to execute arbitrary SQL commands via the (1) useremail parameter (aka username field) or the (2) password parameter. NOTE: some of these details are obtained from third party information.
Configurations

Configuration 1 (hide)

cpe:2.3:a:activewebsoftwares:active_ewebquiz:8.0:*:*:*:*:*:*:*

History

21 Nov 2024, 00:54

Type Values Removed Values Added
References () http://secunia.com/advisories/32927 - Vendor Advisory () http://secunia.com/advisories/32927 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/46910 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/46910 -
References () https://www.exploit-db.com/exploits/7279 - () https://www.exploit-db.com/exploits/7279 -

Information

Published : 2008-12-17 17:30

Updated : 2024-11-21 00:54


NVD link : CVE-2008-5631

Mitre link : CVE-2008-5631

CVE.ORG link : CVE-2008-5631


JSON object : View

Products Affected

activewebsoftwares

  • active_ewebquiz
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')