Multiple SQL injection vulnerabilities in Zoph before 0.7.0.5 allow remote attackers to execute arbitrary SQL commands via unspecified vectors.
Software | From | Fixed in |
---|---|---|
zoph / zoph | 0.3.3 | 0.3.3.x |
zoph / zoph | 0.4 | 0.4.x |
zoph / zoph | 0.5 | 0.5.x |
zoph / zoph | 0.5.1 | 0.5.1.x |
zoph / zoph | 0.6 | 0.6.x |
zoph / zoph | 0.7 | 0.7.x |
zoph / zoph | 0.7.0.1 | 0.7.0.1.x |
zoph / zoph | 0.7.0.2 | 0.7.0.2.x |
zoph / zoph | 0.7.0.3 | 0.7.0.3.x |
zoph / zoph | 0.7.0.4 | 0.7.0.4.x |