• Joomla!®
    • About us
    • Joomla Home
    • What is Joomla?
    • Benefits & Features
    • Project & Leadership
    • Trademark & Licensing
    • The Joomla Foundation
    • Support us
    • Contribute
    • Sponsor
    • Partner
    • Shop
  • Download & Extend
    • Downloads
    • Extensions
    • Languages
    • Get a free site
    • Get a domain
  • Discover & Learn
    • Documentation
    • Training
    • Certification
    • Site Showcase
    • Announcements
    • Blogs
    • Magazine
  • Community & Support
    • Community Portal
    • Events
    • User Groups
    • Forum
    • Service Providers Directory
    • Volunteers Portal
    • Vulnerable Extensions List
  • Developer Resources
    • Developer Network
    • Security Centre
    • Issue Tracker
    • GitHub
    • API Documentation
    • Joomla! Framework

Joomla! Extensions Directory™

Download
Launch
  • Home
  • Browse Extensions
    • Top Rated
    • Most Reviewed
    • New
    • Recently Updated
    • Compatible with J4
  • Search
  • Community
    • Meet the JED Team
    • Blog
    • JED Newsletter
    • Terms of Service
    • Help Joomla!
  • Support
    • Knowledgebase
    • Sponsor Joomla!
  • Vulnerable Extensions
    • About
    • Vulnerable Extensions
    • Resolved Extensions
    • Abandoned Extensions
    • Submit a Report
    • Submit an Update
    • Submit AbandonWare
    • JSON Feed
  • Log in
  • Register
  • Home
  • Vulnerable Extensions
  • Resolved Extensions

Resolved Extensions

This category lists vulnerable versions of extensions for which a patch exists. If your site uses a vulnerable version of an extension listed here, then you are recommended to update.

Filters
List of articles in category Resolved Extensions
Title Published Date
J-BusinessDirectory, 5.7.7 and prior, Other 10 March 2023
LDAP Integration with Active Directory and OpenLDAP - NTLM & Kerberos Login , 5.0.2, Other 15 January 2023
jCart for OpenCart, jCart for OpenCart 3.0.3.19, XSS (Cross Site Scripting) 02 October 2022
JoomRecipe, 4.2.2, XSS (Cross Site Scripting) 02 October 2022
EDocman, 1.23.3, XSS (Cross Site Scripting) 30 September 2022
EShop Joomla Shopping-Cart, 3.6.0, XSS (Cross Site Scripting) 29 September 2022
easyblog, , Other 14 September 2022
ZH Googlemap, 11.22.3.1, XSS (Cross Site Scripting) 08 July 2022
ijoomla guru, , various 08 July 2022
JUX Timetable, 1.0.4, SQL Injection 08 July 2022

Page 1 of 25

  • 1
  • 2
  • 3
  • 4
  • ...
  • 6
  • 7
  • 8
  • 9
  • 10
Vulnerable Extensions
  • JKassa, 2.0.0, SQL Injection
  • YooRecipe, All, SQL Injection
  • publisher, 3.0.19, XSS (Cross Site Scripting)
  • paGO Commerce, 2.5.9.0, SQL Injection
  • Social Chat, 1.5 and Below, SQL Injection Iacopo Guarneri
  • hwdplayer,4.2,SQL Injection
  • Rapicode, Multiple Extensions, Back Door
  • Google Map Landkarten,4.2.3,SQL Injection
  • Fastball, SQL Injection
  • File Download Tracker,3.0,SQL Injection
Resolved Extensions
  • J-BusinessDirectory, 5.7.7 and prior, Other
  • LDAP Integration with Active Directory and OpenLDAP - NTLM & Kerberos Login , 5.0.2, Other
  • jCart for OpenCart, jCart for OpenCart 3.0.3.19, XSS (Cross Site Scripting)
  • JoomRecipe, 4.2.2, XSS (Cross Site Scripting)
  • EDocman, 1.23.3, XSS (Cross Site Scripting)
  • EShop Joomla Shopping-Cart, 3.6.0, XSS (Cross Site Scripting)
  • easyblog, , Other
  • ZH Googlemap, 11.22.3.1, XSS (Cross Site Scripting)
  • ijoomla guru, , various
  • JUX Timetable, 1.0.4, SQL Injection

  • Joomla! on Twitter
  • Joomla! on Facebook
  • Joomla! on YouTube
  • Joomla! on LinkedIn
  • Joomla! on Pinterest
  • Joomla! on Instagram
  • Joomla! on GitHub
  • Home
  • About
  • Community
  • Forum
  • Extensions
  • Services
  • Docs
  • Developer
  • Shop
  • Accessibility Statement
  • Privacy Policy
  • Cookie Policy
  • Sponsor Joomla! with $5
  • Help Translate
  • Report an Issue
  • Log in

© 2005 - 2023 Open Source Matters, Inc. All Rights Reserved.

Rochen
Joomla! Hosting by Rochen
× We have detected that you are using an ad blocker. The Joomla! Project relies on revenue from these advertisements so please consider disabling the ad blocker for this domain.