CVE-2008-3258

Multiple SQL injection vulnerabilities in Zoph before 0.7.0.5 allow remote attackers to execute arbitrary SQL commands via unspecified vectors.
Configurations

Configuration 1

cpe:2.3:a:zoph:zoph:0.7.0.3:*:*:*:*:*:*:*
cpe:2.3:a:zoph:zoph:0.6:*:*:*:*:*:*:*
cpe:2.3:a:zoph:zoph:0.7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:zoph:zoph:0.7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:zoph:zoph:0.4:*:*:*:*:*:*:*
cpe:2.3:a:zoph:zoph:0.7:*:*:*:*:*:*:*
cpe:2.3:a:zoph:zoph:0.5.1:*:*:*:*:*:*:*
cpe:2.3:a:zoph:zoph:0.5:*:*:*:*:*:*:*
cpe:2.3:a:zoph:zoph:0.7.0.4:*:*:*:*:*:*:*
cpe:2.3:a:zoph:zoph:0.3.3:*:*:*:*:*:*:*

Information

Published : 2008-07-22 04:41

Updated : 2017-08-08 01:31


NVD link : CVE-2008-3258

Mitre link : CVE-2008-3258

Products Affected
No products.
CWE