CVE-2008-3258
22.07.2008, 16:41
Multiple SQL injection vulnerabilities in Zoph before 0.7.0.5 allow remote attackers to execute arbitrary SQL commands via unspecified vectors.
Vendor | Product | Version |
---|---|---|
zoph | zoph | 0.3.3 |
zoph | zoph | 0.4 |
zoph | zoph | 0.5 |
zoph | zoph | 0.5.1 |
zoph | zoph | 0.6 |
zoph | zoph | 0.7 |
zoph | zoph | 0.7.0.1 |
zoph | zoph | 0.7.0.2 |
zoph | zoph | 0.7.0.3 |
zoph | zoph | 0.7.0.4 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
References