CVE-2008-3258

Multiple SQL injection vulnerabilities in Zoph before 0.7.0.5 allow remote attackers to execute arbitrary SQL commands via unspecified vectors.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:zoph:zoph:0.3.3:*:*:*:*:*:*:*
cpe:2.3:a:zoph:zoph:0.4:*:*:*:*:*:*:*
cpe:2.3:a:zoph:zoph:0.5:*:*:*:*:*:*:*
cpe:2.3:a:zoph:zoph:0.5.1:*:*:*:*:*:*:*
cpe:2.3:a:zoph:zoph:0.6:*:*:*:*:*:*:*
cpe:2.3:a:zoph:zoph:0.7:*:*:*:*:*:*:*
cpe:2.3:a:zoph:zoph:0.7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:zoph:zoph:0.7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:zoph:zoph:0.7.0.3:*:*:*:*:*:*:*
cpe:2.3:a:zoph:zoph:0.7.0.4:*:*:*:*:*:*:*

History

No history.

Information

Published : 2008-07-22 16:41

Updated : 2024-02-04 17:33


NVD link : CVE-2008-3258

Mitre link : CVE-2008-3258

CVE.ORG link : CVE-2008-3258


JSON object : View

Products Affected

zoph

  • zoph
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')