• Joomla!®
    • About us
    • Joomla Home
    • What is Joomla?
    • Benefits & Features
    • Project & Leadership
    • Trademark & Licensing
    • Support us
    • Contribute
    • Sponsor
    • Partner
    • Shop
  • Download & Extend
    • Downloads
    • Extensions
    • Languages
    • Get a free site
  • Discover & Learn
    • Documentation
    • Training
    • Certification
    • Site Showcase
    • Announcements
    • Blogs
    • Magazine
  • Community & Support
    • Community Portal
    • Events
    • User Groups
    • Forum
    • Resources Directory
    • Find Hosting
    • Volunteers Portal
    • Vulnerable Extensions List
  • Developer Resources
    • Developer Network
    • Security Centre
    • Issue Tracker
    • GitHub
    • API Documentation
    • Joomla! Framework
    • JoomlaCode

Joomla! Extensions Directory™

Download
Launch
  • Home
  • Browse Extensions
    • Top Rated
    • Most Reviewed
    • New
    • Recently Updated
    • Compatible with J4
  • Search
  • Community
    • Meet the JED Team
    • Blog
    • JED Newsletter
    • Terms of Service
    • Help Joomla!
  • Support
    • Knowledgebase
    • Sponsor Joomla!
  • Vulnerable Extensions
    • About
    • Vulnerable Extensions
    • Resolved Extensions
    • Abandoned Extensions
    • Submit a Report
    • Submit an Update
    • Submit AbandonWare
    • JSON Feed
  • Log in
  • Register
  • Home
  • Vulnerable Extensions
  • Abandoned Extensions

Abandoned Extensions

Abandonware is a product, ignored by its owner and manufacturer, and for which no support is available. It may or may not be vulnerable but is listed here for public knowledge.

In some cases there are forks available for the original project. For the assistance of users we may list known forks, but this does not imply any recommendation for their use.

Report abandonware

Filters
List of articles in category Abandoned Extensions
Title Published Date
jck editor 11 October 2018
Booking Calendar for Joomla! 23 May 2018
Akeeba Subscriptions 09 April 2018
ExtendedReg 09 April 2018
AIST 15 March 2018
AllVideos Reloaded 15 March 2018
Staff Master 01 March 2018
J Clock 01 January 2018
Author List 01 January 2018
XMAP 16 November 2017

Page 3 of 4

  • 1
  • 2
  • 3
  • 4
Vulnerable Extensions
  • JKassa, 2.0.0, SQL Injection
  • YooRecipe, All, SQL Injection
  • publisher, 3.0.19, XSS (Cross Site Scripting)
  • paGO Commerce, 2.5.9.0, SQL Injection
  • Social Chat, 1.5 and Below, SQL Injection Iacopo Guarneri
  • hwdplayer,4.2,SQL Injection
  • Rapicode, Multiple Extensions, Back Door
  • Google Map Landkarten,4.2.3,SQL Injection
  • Fastball, SQL Injection
  • File Download Tracker,3.0,SQL Injection
Resolved Extensions
  • HikaShop Joomla Plugin, , SQL Injection
  • Visforms Base Package for Joomla!, 3.14.10, SQL Injection
  • J-BusinessDirectory, 5.7.7 and prior, Other
  • LDAP Integration with Active Directory and OpenLDAP - NTLM & Kerberos Login , 5.0.2, Other
  • jCart for OpenCart, jCart for OpenCart 3.0.3.19, XSS (Cross Site Scripting)
  • JoomRecipe, 4.2.2, XSS (Cross Site Scripting)
  • EDocman, 1.23.3, XSS (Cross Site Scripting)
  • EShop Joomla Shopping-Cart, 3.6.0, XSS (Cross Site Scripting)
  • easyblog, , Other
  • ZH Googlemap, 11.22.3.1, XSS (Cross Site Scripting)

  • Joomla! on Twitter
  • Joomla! on Facebook
  • Joomla! on YouTube
  • Joomla! on LinkedIn
  • Joomla! on Pinterest
  • Joomla! on Instagram
  • Joomla! on GitHub
  • Home
  • About
  • Community
  • Forum
  • Extensions
  • Resources
  • Docs
  • Developer
  • Shop
  • Accessibility Statement
  • Privacy Policy
  • Sponsor Joomla! with $5
  • Help Translate
  • Report an Issue
  • Log in

© 2005 - 2023 Open Source Matters, Inc. All Rights Reserved.

Rochen
Joomla! Hosting by Rochen
× We have detected that you are using an ad blocker. The Joomla! Project relies on revenue from these advertisements so please consider disabling the ad blocker for this domain.