296,855
Total vulnerabilities in the database
Multiple SQL injection vulnerabilities in Zoph before 0.7.0.5 allow remote attackers to execute arbitrary SQL commands via unspecified vectors.
| Software | From | Fixed in |
|---|---|---|
| zoph / zoph | 0.7.0.3 | 0.7.0.3.x |
| zoph / zoph | 0.6 | 0.6.x |
| zoph / zoph | 0.7.0.2 | 0.7.0.2.x |
| zoph / zoph | 0.7.0.1 | 0.7.0.1.x |
| zoph / zoph | 0.4 | 0.4.x |
| zoph / zoph | 0.7 | 0.7.x |
| zoph / zoph | 0.5.1 | 0.5.1.x |
| zoph / zoph | 0.5 | 0.5.x |
| zoph / zoph | 0.7.0.4 | 0.7.0.4.x |
| zoph / zoph | 0.3.3 | 0.3.3.x |