PHProjekt 2.0 through 3.1 allows remote attackers to view or modify data via requests to certain scripts that do not verify if the user is logged in.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Phprojekt | Phprojekt | 2.0 (including) | 2.0 (including) |
Phprojekt | Phprojekt | 2.0.1 (including) | 2.0.1 (including) |
Phprojekt | Phprojekt | 2.1 (including) | 2.1 (including) |
Phprojekt | Phprojekt | 2.1a (including) | 2.1a (including) |
Phprojekt | Phprojekt | 2.2 (including) | 2.2 (including) |
Phprojekt | Phprojekt | 2.3 (including) | 2.3 (including) |
Phprojekt | Phprojekt | 2.4 (including) | 2.4 (including) |
Phprojekt | Phprojekt | 2.4a (including) | 2.4a (including) |
Phprojekt | Phprojekt | 3.0 (including) | 3.0 (including) |
Phprojekt | Phprojekt | 3.1 (including) | 3.1 (including) |
Phprojekt | Phprojekt | 3.1a (including) | 3.1a (including) |