Lorem ipsum dolor sit amet, consectetur adipiscing elit.
Lorem ipsum dolor sit amet, consectetur adipiscing elit.
Lorem ipsum dolor sit amet, consectetur adipiscing elit.
Lorem ipsum dolor sit amet, consectetur adipiscing elit.
Lorem ipsum dolor sit amet, consectetur adipiscing elit.
Lorem ipsum dolor sit amet, consectetur adipiscing elit.
Inadequate escaping leads to XSS vulnerability.
Joomla! version 1.6.5 and all earlier 1.6.x versions
Upgrade to the latest Joomla! version (1.6.6 or later)
Reported by Aung Khant
The JSST at the Joomla! Security Center.
Inadequate filtering leads to XSS vulnerability.
Joomla! version 1.6.3 and all earlier 1.6.x versions
Upgrade to the latest Joomla! version (1.6.4 or later)
Reported by Mesut Timur
The JSST at the Joomla! Security Center.
Inadequate permission checking causes potential for unauthorised access.
Joomla! version 1.6.3 and all earlier 1.6.x versions
Upgrade to the latest Joomla! version (1.6.4 or later)
Reported by Mark Dexter
The JSST at the Joomla! Security Center.
Inadequate filtering causes possible information disclosure.
Joomla! version 1.6.3 and all earlier 1.6.x versions
Upgrade to the latest Joomla! version (1.6.4 or later)
Reported by Aung Khant
The JSST at the Joomla! Security Center.
Inadequate filtering leads to XSS vulnerability.
Joomla! version 1.6.3 and all earlier 1.6.x versions
Upgrade to the latest Joomla! version (1.6.4 or later)
Reported by Aung Khant
The JSST at the Joomla! Security Center.