Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-4914

Опубликовано: 29 дек. 2017
Источник: debian
EPSS Низкий

Описание

The Zend_Db_Select::order function in Zend Framework before 1.12.7 does not properly handle parentheses, which allows remote attackers to conduct SQL injection attacks via unspecified vectors.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
zendframeworkfixed1.12.7-0.1package

Примечания

  • http://framework.zend.com/security/advisory/ZF2014-04

  • https://github.com/zendframework/zf1/commit/da09186c60b9168520e994af4253fba9c19c2b3d

EPSS

Процентиль: 87%
0.03436
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 8 лет назад

The Zend_Db_Select::order function in Zend Framework before 1.12.7 does not properly handle parentheses, which allows remote attackers to conduct SQL injection attacks via unspecified vectors.

CVSS3: 9.8
nvd
около 8 лет назад

The Zend_Db_Select::order function in Zend Framework before 1.12.7 does not properly handle parentheses, which allows remote attackers to conduct SQL injection attacks via unspecified vectors.

CVSS3: 9.8
github
больше 3 лет назад

The Zend_Db_Select::order function in Zend Framework before 1.12.7 does not properly handle parentheses, which allows remote attackers to conduct SQL injection attacks via unspecified vectors.

EPSS

Процентиль: 87%
0.03436
Низкий