296,202
Total vulnerabilities in the database
Joomla! 2.5.x before 2.5.10 and 3.0.x before 3.0.4 allows remote authenticated users to bypass intended privilege requirements and list the privileges of arbitrary users via unspecified vectors.
Software | From | Fixed in |
---|---|---|
Joomla / joomla | 2.5.7 | 2.5.7.x |
Joomla / joomla | 2.5.8 | 2.5.8.x |
Joomla / joomla | 2.5.2 | 2.5.2.x |
Joomla / joomla | 2.5.1 | 2.5.1.x |
Joomla / joomla | 2.5.3 | 2.5.3.x |
Joomla / joomla | 2.5.9 | 2.5.9.x |
Joomla / joomla | 2.5.4 | 2.5.4.x |
Joomla / joomla | 2.5.6 | 2.5.6.x |
Joomla / joomla | 2.5.5 | 2.5.5.x |
Joomla / joomla | 2.5.0 | 2.5.0.x |
Joomla / joomla | 3.0.2 | 3.0.2.x |
Joomla / joomla | 3.0.3 | 3.0.3.x |
Joomla / joomla | 3.0.1 | 3.0.1.x |
Joomla / joomla | 3.0.0 | 3.0.0.x |