Description
|
|
Multiple vulnerabilities were identified in Zoph, which could be exploited by remote attackers to execute arbitrary SQL commands. These flaws are due to input validation errors in various scripts that do not properly validate certain parameters before being used in SQL statements, which could be exploited by malicious people to conduct SQL injection attacks.
|