Browse all 3 CVE security advisories affecting phpzag. AI-powered Chinese analysis, POCs, and references for each vulnerability.
phpzag is a PHP-based web application primarily used for content management and e-commerce solutions. Historically, it has been susceptible to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, often stemming from unsanitized user inputs and insecure authentication mechanisms. The application has three recorded CVEs, including critical flaws allowing attackers to execute arbitrary code or bypass security controls. While no major public incidents have been widely documented, its vulnerability history suggests consistent issues with input validation and access control, highlighting the need for rigorous security hardening and regular updates for implementations handling sensitive data.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2020-8521 | SpryMedia DataTables SQL注入漏洞 — phpzag live add edit delete data tables records with ajax php mysql | 9.8 | - | 2020-07-07 |
| CVE-2020-8519 | SpryMedia DataTables SQL注入漏洞 — phpzag live add edit delete data tables records with ajax php mysql | 9.8 | - | 2020-07-07 |
| CVE-2020-8520 | SpryMedia DataTables SQL注入漏洞 — phpzag live add edit delete data tables records with ajax php mysql | 9.8 | - | 2020-07-07 |
This page lists every published CVE security advisory associated with phpzag. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.