The vulnerability exists due to insufficient sanitization of user-supplied input in the 'controller' parameter of the 'index.php' script. A remote attacker can send a specially crafted request to the vulnerable script and execute arbitrary PHP code on the target system. Successful exploitation of this vulnerability requires that 'Register Globals' is enabled.
An attacker can exploit this vulnerability by sending a crafted HTTP request to the vulnerable server. The attacker can use the ‘controller’ parameter to inject malicious code into the vulnerable server. For example, an attacker can send a request like www.site.com/index.php?option=com_janews&controller=../../../../../../../../../../etc/passwd%00 to read the /etc/passwd file.
A vulnerability in Joomla Component com_linkr allows an attacker to include local files on the server by manipulating the 'controller' parameter in the URL. An attacker can use this vulnerability to gain access to sensitive information such as the server's /etc/passwd file.
An attacker can exploit this vulnerability by sending a specially crafted request to the vulnerable application. This request contains a malicious file that can be included and executed on the server. The malicious file can be hosted on the attacker's server or any other server that allows remote file inclusion.
This vulnerability allows an attacker to inject arbitrary SQL commands into the query by exploiting the 'letter' parameter in the 'com_org' component of Joomla. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL commands to the vulnerable application. This can be done by appending the malicious SQL commands to the 'letter' parameter in the HTTP request.
A heap overflow vulnerability exists in Liquid XML Studio 2010 <= v8.061970, which is caused by a boundary error when handling a specially crafted OpenFile() request. This can be exploited to cause a stack-based buffer overflow by e.g. enticing a user to open a specially crafted file. Successful exploitation may allow execution of arbitrary code.
Subdreamer.v3.0.1 cms is vulnerable to an upload vulnerability. An attacker can register on the website and then use tamper data to insert an image into the website. This can be exploited to upload malicious files and gain access to the website.
An attacker can exploit this vulnerability by accessing the backup directory of the application and uploading a malicious shell. The attacker can then access the application and execute arbitrary code.
An attacker can exploit this vulnerability by sending a malicious file to the ava_upl.php or ava_upl2.php page, which will be stored in the avatar/ directory.
An attacker can exploit a vulnerability in Torrent Hoster Remont to upload malicious files. The vulnerability exists in the 'upload.php' file, which allows an attacker to upload a malicious file without any authentication. The malicious file can be uploaded by using the 'upfile' parameter in the 'upload.php' file. The malicious file can then be accessed by visiting the 'torrents' directory. Additionally, an attacker can also exploit an XSS vulnerability in the 'forgot_password.php' file to execute malicious JavaScript code.