
An attacker can bypass access restrictions to data of Joomla Core, via Passkey User Enumeration, in order to read sensitive information.
- Security VulnerabilityEspace publicitaire · 300×250


An attacker can bypass access restrictions to data of Joomla Core, via Passkey User Enumeration, in order to read sensitive information.
- Security Vulnerability






