• Joomla!®
    • About us
    • Joomla Home
    • What is Joomla?
    • Benefits & Features
    • Project & Leadership
    • Trademark & Licensing
    • The Joomla Foundation
    • Support us
    • Contribute
    • Sponsor
    • Partner
    • Shop
  • Download & Extend
    • Downloads
    • Extensions
    • Languages
    • Get a free site
    • Get a domain
  • Discover & Learn
    • Documentation
    • Training
    • Certification
    • Site Showcase
    • Announcements
    • Blogs
    • Magazine
  • Community & Support
    • Community Portal
    • Events
    • User Groups
    • Forum
    • Service Providers Directory
    • Volunteers Portal
    • Vulnerable Extensions List
  • Developer Resources
    • Developer Network
    • Security Centre
    • Issue Tracker
    • GitHub
    • API Documentation
    • Joomla! Framework

Joomla! Extensions Directory™

Download
Launch
  • Home
  • Browse Extensions
    • Top Rated
    • Most Reviewed
    • New
    • Recently Updated
    • Compatible with J4
    • Compatible with J5
    • Compatible with J5 (with b/c plugin)
  • Search
  • Community
    • Meet the JED Team
    • Blog
    • JED Newsletter
    • Terms of Service
    • Help Joomla!
  • Support
    • Knowledgebase
    • Sponsor Joomla!
  • Vulnerable Extensions
    • About
    • Vulnerable Extensions
    • Resolved Extensions
    • Abandoned Extensions
    • Submit a Report
    • Submit an Update
    • Submit AbandonWare
    • JSON Feed
  • Log in
  • Register
  • Home
  • Vulnerable Extensions
  • Resolved Extensions

Resolved Extensions

This category lists vulnerable versions of extensions for which a patch exists. If your site uses a vulnerable version of an extension listed here, then you are recommended to update.

Filters
List of articles in category Resolved Extensions
Title Published Date
AcyMailing 5.6.0 PHP Mailer vulnerability 28 December 2016
Chronoforms 5.0.12 PHP mailer vulnerability 27 December 2016
aWeb Cart Watching System 2.6.0 21 December 2016
DT Register, sql/xss, 3.1.12 / 2.8.18 and previous 19 December 2016
JS Jobs,1.1.5 and all previous,SQL Injection 06 December 2016
Kunena,K4.0.0 - K5.0.3,XSS (Cross Site Scripting) 26 November 2016
JoomDoc 4.0.3 and previous 11 November 2016
ja-k2- filter-and- search, SQL Injection 20 October 2016
Huge IT Slider,1.0.9,SQL Injection 27 September 2016
Huge IT Video Gallery,1.1.1,XSS (Cross Site Scripting) 24 September 2016

Page 21 of 27

  • 16
  • 17
  • 18
  • ...
  • 20
  • 21
  • 22
  • 23
  • 24
  • ...
Vulnerable Extensions
  • JEVents, 3.6.87, SQL Injection
  • osTicky2, , Other
  • EasyShop, 1.4.1, XSS (Cross Site Scripting)
  • LivingWord, , XSS (Cross Site Scripting)
  • Plugin Creative Gallery , , SQL Injection
  • Proforms Basic via sort_order parameter, , SQL Injection
  • EXTPLORER, 2.1.15, XSS (Cross Site Scripting)
  • LM-CUSTOM-ADMIN, , Other
  • admirror gallery, , XSS (Cross Site Scripting)
  • Proforms Basic Joomla Module, , Other
Resolved Extensions
  • Convert Forms, 4.4.10, XSS (Cross Site Scripting)
  • JS Jobs, 1.4.2, SQL Injection
  • Regularlabs Sourcer, pre version 12.00, Other/RFI
  • HikaShop, 5.1.1, XSS (Cross Site Scripting)
  • Advanced custom fields, 2.7.7, SQL Injection
  • Phoca Gallery, 5.0.0, XSS (Cross Site Scripting)
  • HikaShop Starter 4.7.5 [2308101603], HikaShop Starter 4.7.5 [2308101603], XSS (Cross Site Scripting)
  • LazyDbBackup, 3.9.0, Other
  • Virtual Classroom, , SQL Injection
  • bagallery , , Other

  • Joomla! on Twitter
  • Joomla! on Facebook
  • Joomla! on YouTube
  • Joomla! on LinkedIn
  • Joomla! on Pinterest
  • Joomla! on Instagram
  • Joomla! on GitHub
  • Home
  • About
  • Community
  • Forum
  • Extensions
  • Services
  • Docs
  • Developer
  • Shop
  • Accessibility Statement
  • Privacy Policy
  • Cookie Policy
  • Sponsor Joomla! with $5
  • Help Translate
  • Report an Issue
  • Log in

© 2005 - 2025 Open Source Matters, Inc. All Rights Reserved.

Rochen
Joomla! Hosting by Rochen
× We have detected that you are using an ad blocker. The Joomla! Project relies on revenue from these advertisements so please consider disabling the ad blocker for this domain.