The vulnerability exists due to insufficient sanitization of user-supplied input passed via the 'start' and 'cat_id' parameters to 'joke-archives.php' script. A remote attacker can execute arbitrary SQL commands in application's database, inject arbitrary HTML and script code, access or modify sensitive data, exploit vulnerabilities in the underlying database and operating system, etc.
This exploit allows an attacker to include a local file on the server, such as the /etc/passwd file. The exploit is triggered by sending a specially crafted HTTP request to the vulnerable server, containing the path to the local file in the 'fiche' parameter. The exploit is successful if the server responds with the contents of the local file.
A vulnerability exists in the Joomla Component com_agoragroup (id) which allows an attacker to inject malicious SQL code into the application. This can be exploited to gain access to sensitive information such as usernames and passwords. The vulnerability is due to insufficient input validation of the 'id' parameter. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL code. This can be used to gain access to sensitive information such as usernames and passwords.
Million Dollar Text Links 1.0 is vulnerable to an insecure cookie handling vulnerability. An attacker can exploit this vulnerability by sending a malicious JavaScript code to the victim. The malicious code will set a cookie with the userid set to 1, allowing the attacker to gain access to the application.
Dokuwiki 2009-02-14 is vulnerable to Remote/Temporary File Inclusion. This exploit requires register_globals to be set to 'on' and allow_url_fopen to be set to 'On' (default) and allow_url_include to be set to 'On' (not default). The exploit can also be used with file_uploads set to 'On' (default) and a temporary file passed by the $_FILES[] array. The payload should be a shell script with the command passthru($_GET[cmd]); die();.
A remote file upload vulnerability exists in Joomla Component Com_Agora 3.0.0 RC1. An attacker can exploit this vulnerability to upload arbitrary code and execute it in the context of the webserver process. This can be exploited to compromise the web application and the underlying system. The vulnerability is due to insufficient validation of user-supplied input in the 'task' parameter of the 'index.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious code to the vulnerable script. Successful exploitation of this vulnerability can result in arbitrary code execution in the context of the webserver process.
WebMember 1.0 (formID) is vulnerable to a remote SQL injection vulnerability. This vulnerability allows an attacker to inject arbitrary SQL code into the vulnerable application. This can be exploited to gain access to the database and to execute arbitrary commands on the system. The vulnerability is caused due to the formID parameter not being properly sanitized before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
ZeeCareers v2.0 is vulnerable to Insecure Direct Object Reference. The addadminmembercode.php script does not properly validate user-supplied input, allowing an attacker to inject arbitrary code into the application. This can be exploited to add an admin user to the application.
A vulnerability in phpBugTracker 1.0.3 allows an attacker to gain access to the application's path by sending a specially crafted HTTP request. By exploiting this vulnerability, an attacker can gain access to the application's path and use it to launch further attacks.
The vulnerability exists in the Flash Image Gallery 1.1 and maybe last version. An attacker can access the config.xml file which contains the admin username and password. The attacker can then use this information to gain access to the admin panel and upload malicious files.