Filtered by vendor Activewebsoftwares Subscriptions
Total 27 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2008-6873 1 Activewebsoftwares 1 Active Web Mail 2025-04-09 N/A
SQL injection vulnerability in Active Web Mail 4.0 allows remote attackers to execute arbitrary SQL commands via the TabOpenQuickTab1 parameter to (1) popaccounts.aspx, (2) addressbook.aspx, and (3) emails.aspx.
CVE-2008-5974 1 Activewebsoftwares 1 Active Price Comparison 2025-04-09 N/A
Multiple SQL injection vulnerabilities in login.aspx in Active Price Comparison 4.0 allow remote attackers to execute arbitrary SQL commands via the (1) password and (2) username fields.
CVE-2009-4436 1 Activewebsoftwares 1 Ewebquiz 2025-04-09 N/A
Multiple SQL injection vulnerabilities in Active Web Softwares eWebquiz 8 allow remote attackers to execute arbitrary SQL commands via the QuizID parameter to (1) questions.asp, (2) importquestions.asp, and (3) quiztakers.asp, different vectors than CVE-2007-1706.
CVE-2008-5365 1 Activewebsoftwares 1 Activevotes 2025-04-09 N/A
SQL injection vulnerability in VoteHistory.asp in ActiveWebSoftwares ActiveVotes 2.2 allows remote attackers to execute arbitrary SQL commands via the AccountID parameter.
CVE-2008-5641 1 Activewebsoftwares 1 Active Photo Gallery 2025-04-09 N/A
SQL injection vulnerability in account.asp in Active Photo Gallery 6.2 allows remote attackers to execute arbitrary SQL commands via the (1) username and (2) password parameters.
CVE-2008-5632 1 Activewebsoftwares 1 Active Time Billing 2025-04-09 N/A
SQL injection vulnerability in Account.asp in Active Time Billing 3.2 allows remote attackers to execute arbitrary SQL commands via the (1) username and (2) password parameters, possibly related to start.asp. NOTE: some of these details are obtained from third party information.
CVE-2008-5631 1 Activewebsoftwares 1 Active Ewebquiz 2025-04-09 N/A
SQL injection vulnerability in start.asp in Active eWebquiz 8.0 allows remote attackers to execute arbitrary SQL commands via the (1) useremail parameter (aka username field) or the (2) password parameter. NOTE: some of these details are obtained from third party information.