(#Several vulnerabilities were reported in Joomla Third-Party Plugin:#- several SQL injection:#* Price List: in the parameter "cat"#* Nice Ajax Poll: in the parameter "getpliseid"#* FireBoard: in the parameter "func"#* SCatalog: in the parameter "Itemid"#* JB Bus: in the parameter "id".##A remote attacker could exploit them by sending HTTP requests with specially crafted SQL statements in order to perform arbitrary operations on the database such as access to restricted data, alter or delete them. These vulnerabilities stems from an improper sanitation of user supplied input##- Kubik-Rubik Simple Image Gallery Extended (SIGE): stored cross-site scripting in the "htmlImageAddTitleAttribute()" function of the "sige.php" page. A remote attacker could exploit it by enticing their victim into following a specially crafted link in order to execute arbitrary JavaScript or HTML code (CVE-2018-7717).##Proofs of concept are available.)