Loading...
Loading...
Multiple SQL injection vulnerabilities in Plogger 3.0 and earlier allow remote attackers to execute arbitrary SQL commands via (1) the checked array parameter to plog-download.php in an album action and (2) unspecified parameters to plog-remote.php, and (3) allow remote authenticated administrators to execute arbitrary SQL commands via the activate parameter to admin/plog-themes.php, related to theme_dir settings.
August 10, 2008
April 23, 2026
See which npm, PyPI, Go, and Maven packages are affected by CVE-2008-3563
EchelonGraph automatically scans your cloud infrastructure and maps CVE exposure using blast radius analysis.