Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 14 May 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 14 May 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Joomsky
Joomsky j2 Jobs |
|
| Vendors & Products |
Joomsky
Joomsky j2 Jobs |
Wed, 13 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Joomla J2 JOBS 1.3.0 contains an authenticated SQL injection vulnerability that allows authenticated attackers to manipulate database queries by injecting SQL code through the 'sortby' parameter. Attackers can send POST requests to the administrator index with malicious 'sortby' values to extract sensitive database information. | |
| Title | Joomla J2 JOBS 1.3.0 Authenticated SQL Injection via sortby | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-14T15:58:22.982Z
Reserved: 2026-05-13T14:13:46.970Z
Link: CVE-2020-37224
Updated: 2026-05-14T15:58:14.931Z
Status : Deferred
Published: 2026-05-13T16:16:33.990
Modified: 2026-05-13T17:07:21.030
Link: CVE-2020-37224
No data.
OpenCVE Enrichment
Updated: 2026-05-14T14:34:17Z