Joomla! 2.5.x prior to 2.5.10 and 3.0.x prior to 3.0.4 allows remote authenticated users to bypass intended privilege requirements and list the privileges of arbitrary users via unspecified vectors.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
joomla joomla\\! 2.5.5 |
||
joomla joomla\\! 2.5.6 |
||
joomla joomla\\! 2.5.7 |
||
joomla joomla\\! 2.5.8 |
||
joomla joomla\\! 2.5.1 |
||
joomla joomla\\! 2.5.3 |
||
joomla joomla\\! 2.5.0 |
||
joomla joomla\\! 2.5.2 |
||
joomla joomla\\! 2.5.4 |
||
joomla joomla\\! 2.5.9 |
||
joomla joomla\\! 3.0.2 |
||
joomla joomla\\! 3.0.3 |
||
joomla joomla\\! 3.0.1 |
||
joomla joomla\\! 3.0.0 |