Joomla! 'Jfaq' Component SQL Injection and HTML Injection Vulnerabilities

An attacker can exploit these issues via a browser.

The following example URIs are available:

SQL Injection:

http://www.example.com/index.php?option=com_jfaq &task=detail&id=[sqli]

http://www.example.com/index.php?option=com_jfaq &task=categ&id=[sqli]


 

Privacy Statement
Copyright 2010, SecurityFocus