TWIG 2.6.2 and previous versions allows remote malicious users to perform unauthorized database operations via a SQL injection attack on the id parameter.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
twig development team twig 2.0 |
||
twig development team twig 2.1 |
||
twig development team twig 2.2 |
||
twig development team twig 2.3.1 |
||
twig development team twig 2.4 |
||
twig development team twig 2.2.1 |
||
twig development team twig 2.2.2 |
||
twig development team twig 2.2.3 |
||
twig development team twig 2.3 |
||
twig development team twig 2.0.2 |
||
twig development team twig 2.0.3 |
||
twig development team twig 2.0_beta1 |
||
twig development team twig 2.0_beta2 |
||
twig development team twig 2.5.1 |
||
twig development team twig 2.6 |
||
twig development team twig 2.6.1 |
||
twig development team twig 2.0.1 |
||
twig development team twig 2.0_beta3 |
||
twig development team twig 2.1.1 |
||
twig development team twig 2.3.2 |
||
twig development team twig 2.5 |