Description
Joomla! 2.5.x before 2.5.10 and 3.0.x before 3.0.4 allows remote authenticated users to bypass intended privilege requirements and list the privileges of arbitrary users via unspecified vectors.
Remediation
References
Related Vulnerabilities
b2evolution Improper Input Validation Vulnerability (CVE-2017-1000423)
WebLogic CVE-2018-2893 Vulnerability (CVE-2018-2893)
WordPress Plugin Search Everything SQL Injection (7.0.2)
WordPress Plugin Ad Inserter-Ad Manager & AdSense Ads Multiple Vulnerabilities (1.5.2)
qdPM Sensitive Information Disclosure Vulnerability (CVE-2015-3882)