Filtered by vendor Zoph
Subscriptions
Filtered by product Zoph
Subscriptions
Total
7 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2014-9236 | 1 Zoph | 1 Zoph | 2024-11-21 | N/A |
Cross-site scripting (XSS) vulnerability in php/edit_photos.php in Zoph (aka Zoph Organizes Photos) 0.9.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) photographer_id or (2) _crumb parameter. | ||||
CVE-2014-9235 | 1 Zoph | 1 Zoph | 2024-11-21 | N/A |
Multiple SQL injection vulnerabilities in Zoph (aka Zoph Organizes Photos) 0.9.1 and earlier allow remote authenticated users to execute arbitrary SQL commands via the (1) _action parameter to group.php or (2) user.php or the (3) location_id parameter to photos.php in php/. | ||||
CVE-2009-2343 | 1 Zoph | 1 Zoph | 2024-11-21 | N/A |
Cross-site scripting (XSS) vulnerability in people.php in Zoph before 0.7.0.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: some of these details are obtained from third party information. | ||||
CVE-2008-6838 | 1 Zoph | 1 Zoph | 2024-11-21 | N/A |
Cross-site scripting (XSS) vulnerability in search.php in Zoph 0.7.2.1 allows remote attackers to inject arbitrary web script or HTML via the _off parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | ||||
CVE-2008-6837 | 1 Zoph | 1 Zoph | 2024-11-21 | N/A |
SQL injection vulnerability in Zoph 0.7.2.1 allows remote attackers to execute arbitrary SQL commands via unspecified vectors, a different issue than CVE-2008-3258. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | ||||
CVE-2008-3258 | 1 Zoph | 1 Zoph | 2024-11-21 | N/A |
Multiple SQL injection vulnerabilities in Zoph before 0.7.0.5 allow remote attackers to execute arbitrary SQL commands via unspecified vectors. | ||||
CVE-2007-3905 | 1 Zoph | 1 Zoph | 2024-11-21 | N/A |
SQL injection vulnerability in Zoph before 0.7.0.1 might allow remote attackers to execute arbitrary SQL commands via the _order parameter to (1) photos.php and (2) edit_photos.php. |
Page 1 of 1.