Total vulnerabilities in the database
TWIG 2.6.2 and earlier allows remote attackers to perform unauthorized database operations via a SQL injection attack on the id parameter.
Software | From | Fixed in |
---|---|---|
twig_development_team / twig | 2.2 | 2.2.x |
twig_development_team / twig | 2.5.1 | 2.5.1.x |
twig_development_team / twig | 2.3.1 | 2.3.1.x |
twig_development_team / twig | 2.0.3 | 2.0.3.x |
twig_development_team / twig | 2.3 | 2.3.x |
twig_development_team / twig | 2.6 | 2.6.x |
twig_development_team / twig | 2.0.1 | 2.0.1.x |
twig_development_team / twig | 2.4 | 2.4.x |
twig_development_team / twig | 2.2.2 | 2.2.2.x |
twig_development_team / twig | 2.1 | 2.1.x |
twig_development_team / twig | 2.5 | 2.5.x |
twig_development_team / twig | 2.0_beta1 | 2.0_beta1.x |
twig_development_team / twig | 2.0.2 | 2.0.2.x |
twig_development_team / twig | 2.3.2 | 2.3.2.x |
twig_development_team / twig | 2.0_beta2 | 2.0_beta2.x |
twig_development_team / twig | 2.0_beta3 | 2.0_beta3.x |
twig_development_team / twig | 2.1.1 | 2.1.1.x |
twig_development_team / twig | 2.6.1 | 2.6.1.x |
twig_development_team / twig | 2.2.3 | 2.2.3.x |
twig_development_team / twig | 2.0 | 2.0.x |
twig_development_team / twig | 2.2.1 | 2.2.1.x |