296,857
Total vulnerabilities in the database
Multiple SQL injection vulnerabilities in Zoph before 0.7.0.5 allow remote attackers to execute arbitrary SQL commands via unspecified vectors.
| Software | From | Fixed in | 
|---|---|---|
| zoph / zoph | 0.7.0.3 | 0.7.0.3.x | 
| zoph / zoph | 0.6 | 0.6.x | 
| zoph / zoph | 0.7.0.2 | 0.7.0.2.x | 
| zoph / zoph | 0.7.0.1 | 0.7.0.1.x | 
| zoph / zoph | 0.4 | 0.4.x | 
| zoph / zoph | 0.7 | 0.7.x | 
| zoph / zoph | 0.5.1 | 0.5.1.x | 
| zoph / zoph | 0.5 | 0.5.x | 
| zoph / zoph | 0.7.0.4 | 0.7.0.4.x | 
| zoph / zoph | 0.3.3 | 0.3.3.x |