The "JEXTN Question And Answer" extension 3.1.0 for Joomla! has SQL Injection via the an parameter in a view=tags action, or the ques-srch parameter.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.exploit-db.com/exploits/43329/ |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T21:06:49.493Z
Reserved: 2017-12-23T00:00:00
Link: CVE-2017-17871

No data.

Status : Deferred
Published: 2017-12-27T17:08:20.810
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-17871

No data.