| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| An Open Redirect vulnerability was found in osTicky2 below 2.2.8. osTicky (osTicket Bridge) by SmartCalc is a Joomla 3.x extension that provides Joomla fronted integration with osTicket, a popular Support ticket system. The Open Redirect vulnerability allows attackers to control the return parameter in the URL to a base64 malicious URL. |
| Inadequate validation of URLs could result into an invalid check whether an redirect URL is internal or not.. |
| The pagination class includes arbitrary parameters in links, leading to cache poisoning attack vectors. |
| The mail template feature lacks an escaping mechanism, causing XSS vectors in multiple extensions. |
| Improper Access Controls allows backend users to overwrite their username when disallowed. |
| The stripImages and stripIframes methods didn't properly process inputs, leading to XSS vectors. |
| Unrestricted file upload via security bypass in Convert Forms component for Joomla in versions before 4.4.8. |
| Reflected Cross site scripting vulnerability in Convert Forms component for Joomla in versions before 4.4.8. |
| Various module chromes didn't properly process inputs, leading to XSS vectors. |
| Lack of output escaping in the id attribute of menu lists. |
| Improper Access Controls allows access to protected views. |
| Improper control of generation of code in the sourcerer extension for Joomla in versions before 11.0.0 lead to a remote code execution vulnerability. |
| Improper handling of input variables lead to multiple path traversal vulnerabilities in the Admiror Gallery extension for Joomla in version branch 4.x. |
| A SQL injection vulnerability in the JS Jobs plugin versions 1.1.5-1.4.2 for Joomla allows authenticated attackers (administrator) to execute arbitrary SQL commands via the 'fieldfor' parameter in the GDPR Field feature. |
| A SQL injection vulnerability in the JS Jobs plugin versions 1.1.5-1.4.3 for Joomla allows authenticated attackers (administrator) to execute arbitrary SQL commands via the 'filter_email' parameter in the GDPR Erase Data Request search feature. |
| A SQL injection vulnerability in the JS Jobs plugin versions 1.1.5-1.4.3 for Joomla allows authenticated attackers (administrator) to execute arbitrary SQL commands via the 'searchpaymentstatus' parameter in the Employer Payment History search feature. |
| A SQL injection vulnerability in the Hikashop component versions 3.3.0-5.1.4 for Joomla allows authenticated attackers (administrator) to execute arbitrary SQL commands in the category management area in backend. |
| Improper handling of identifiers lead to a SQL injection vulnerability in the quoteNameStr method of the database package. Please note: the affected method is a protected method. It has no usages in the original packages in neither the 2.x nor 3.x branch and therefore the vulnerability in question can not be exploited when using the original database class. However, classes extending the affected class might be affected, if the vulnerable method is used. |
| Insufficient state checks lead to a vector that allows to bypass 2FA checks. |
| The Photo Gallery, Images, Slider in Rbs Image Gallery WordPress plugin before 3.2.22 does not sanitise and escape some of its settings, which could allow high privilege users such as contributor to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). |