Joomla! CMS 2.5.x prior to 2.5.19 and 3.x prior to 3.2.3 allows remote malicious users to authenticate and bypass intended restrictions via vectors involving GMail authentication.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
joomla joomla\\! 2.5.15 |
||
joomla joomla\\! 2.5.16 |
||
joomla joomla\\! 2.5.17 |
||
joomla joomla\\! 2.5.18 |
||
joomla joomla\\! 3.1.0 |
||
joomla joomla\\! 3.1.1 |
||
joomla joomla\\! 3.1.2 |
||
joomla joomla\\! 3.1.3 |
||
joomla joomla\\! 2.5.12 |
||
joomla joomla\\! 2.5.14 |
||
joomla joomla\\! 2.5.2 |
||
joomla joomla\\! 2.5.4 |
||
joomla joomla\\! 3.0.1 |
||
joomla joomla\\! 3.0.3 |
||
joomla joomla\\! 3.1.5 |
||
joomla joomla\\! 3.2.0 |
||
joomla joomla\\! 2.5.0 |
||
joomla joomla\\! 2.5.1 |
||
joomla joomla\\! 2.5.10 |
||
joomla joomla\\! 2.5.6 |
||
joomla joomla\\! 2.5.7 |
||
joomla joomla\\! 2.5.8 |
||
joomla joomla\\! 2.5.9 |
||
joomla joomla\\! 3.2.1 |
||
joomla joomla\\! 3.2.2 |
||
joomla joomla\\! 2.5.11 |
||
joomla joomla\\! 2.5.13 |
||
joomla joomla\\! 2.5.3 |
||
joomla joomla\\! 2.5.5 |
||
joomla joomla\\! 3.0.0 |
||
joomla joomla\\! 3.0.2 |
||
joomla joomla\\! 3.0.4 |
||
joomla joomla\\! 3.1.4 |
||
joomla joomla\\! 3.1.6 |