CVE-2008-2065
YourFreeWorld Jokes Site Script - SQL Injection via Jokes.php Catagorie Parameter
Title source: llmExploitation Summary
EIP tracks 1 public exploit for CVE-2008-2065. PoCs published by ProgenTR.
AI-analyzed exploit summary This exploit demonstrates a SQL injection vulnerability in the 'jokes.php' script of the Jokes Site Script. The payload uses a UNION-based SQLi to extract database information, including database name, user, and version.
Description
SQL injection vulnerability in jokes.php in YourFreeWorld Jokes Site Script allows remote attackers to execute arbitrary SQL commands via the catagorie parameter.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by ProgenTR · textwebappsphp
https://www.exploit-db.com/exploits/5508
This exploit demonstrates a SQL injection vulnerability in the 'jokes.php' script of the Jokes Site Script. The payload uses a UNION-based SQLi to extract database information, including database name, user, and version.
Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:
Jokes Site Script (version unspecified)
No auth needed
Prerequisites:
Target must be running the vulnerable Jokes Site Script · The 'jokes.php' script must be accessible
devstral-2 · analyzed Feb 16, 2026
Full analysis →
References (4)
Core 4
Core References
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/28963
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/29981
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/42047
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/5508
Scores
EPSS
0.0054
EPSS Percentile
67.9%
Details
CWE
CWE-89
Status
published
Products (1)
yourfreeworld/jokes_site_script
Published
May 02, 2008
Tracked Since
Feb 18, 2026