Total
7 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2008-6838 | 1 Zoph | 1 Zoph | 2017-08-16 | 4.3 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in search.php in Zoph 0.7.2.1 allows remote attackers to inject arbitrary web script or HTML via the _off parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | |||||
CVE-2008-6837 | 1 Zoph | 1 Zoph | 2017-08-16 | 7.5 HIGH | N/A |
SQL injection vulnerability in Zoph 0.7.2.1 allows remote attackers to execute arbitrary SQL commands via unspecified vectors, a different issue than CVE-2008-3258. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | |||||
CVE-2008-3258 | 1 Zoph | 1 Zoph | 2017-08-07 | 7.5 HIGH | N/A |
Multiple SQL injection vulnerabilities in Zoph before 0.7.0.5 allow remote attackers to execute arbitrary SQL commands via unspecified vectors. | |||||
CVE-2007-3905 | 1 Zoph | 1 Zoph | 2017-07-28 | 7.5 HIGH | N/A |
SQL injection vulnerability in Zoph before 0.7.0.1 might allow remote attackers to execute arbitrary SQL commands via the _order parameter to (1) photos.php and (2) edit_photos.php. | |||||
CVE-2014-9235 | 1 Zoph | 1 Zoph | 2014-12-05 | 6.5 MEDIUM | N/A |
Multiple SQL injection vulnerabilities in Zoph (aka Zoph Organizes Photos) 0.9.1 and earlier allow remote authenticated users to execute arbitrary SQL commands via the (1) _action parameter to group.php or (2) user.php or the (3) location_id parameter to photos.php in php/. | |||||
CVE-2014-9236 | 1 Zoph | 1 Zoph | 2014-12-05 | 4.3 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in php/edit_photos.php in Zoph (aka Zoph Organizes Photos) 0.9.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) photographer_id or (2) _crumb parameter. | |||||
CVE-2009-2343 | 1 Zoph | 1 Zoph | 2009-07-08 | 4.3 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in people.php in Zoph before 0.7.0.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: some of these details are obtained from third party information. |