DESCRIPTION: A vulnerability has been reported in the MooFAQ component for Joomla!, which can be exploited by malicious people to disclose potentially sensitive information.
Input passed to the "file" parameter in com_moofaq/includes/file_includer.php is not properly verified before being used to display files, which can be exploited to disclose the content of arbitrary files.
SOLUTION: Edit the source code to ensure that input is properly verified.
DESCRIPTION: Some vulnerabilities have been reported in Joomla!, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to conduct cross-site scripting attacks.
1) Certain unspecified input is not properly sanitised before being used. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user's browser session in the context of an affected site when the malicious data is displayed.
2) Certain unspecified input passed to the user view of the com_users core component is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
3) Certain unspecified input passed to the "JA_Purity" template is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
The vulnerabilities are reported in Joomla! 1.5.10 and all prior 1.5.x releases.