Description
Multiple cross-site scripting (XSS) vulnerabilities in FAQMasterFlexPlus, possibly 1.5 or 1.52, allow remote attackers to inject arbitrary web script or HTML via (1) the cat_name parameter to faq.php; and unspecified parameters to the (2) add categories, (3) edit categories, (4) delete categories, (5) add faq, (6) edit faq, and (7) delete faq Admin scripts.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Juan Galiana Lara · textwebappsphp
https://www.exploit-db.com/exploits/30945
References (6)
Core 6
Core References
Mailing List mailing-list
x_refsource_fulldisc
http://lists.grok.org.uk/pipermail/full-disclosure/2007-December/059318.html
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/28248
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/39287
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/39664
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/27051
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/485589/100/0/threaded
Scores
EPSS
0.0262
EPSS Percentile
85.7%
Details
CWE
CWE-79
Status
published
Products (1)
netbizcity/faqmasterflexplus
Published
Jan 04, 2008
Tracked Since
Feb 18, 2026