Total vulnerabilities in the database
Insufficient state checks lead to a vector that allows to bypass 2FA checks.
Software | From | Fixed in |
---|---|---|
![]() |
5.0.0 | 5.2.6 |
![]() |
4.0.0 | 4.4.13 |
Joomla / joomla | 4.0.0 | 4.4.13 |
Joomla / joomla | 5.0.0 | 5.2.6 |