Логотип exploitDog
bind:CVE-2016-6233
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2016-6233

Количество 4

Количество 4

ubuntu логотип

CVE-2016-6233

почти 9 лет назад

The (1) order and (2) group methods in Zend_Db_Select in the Zend Framework before 1.12.19 might allow remote attackers to conduct SQL injection attacks via vectors related to use of the character pattern [\w]* in a regular expression.

CVSS3: 9.8
EPSS: Низкий
nvd логотип

CVE-2016-6233

почти 9 лет назад

The (1) order and (2) group methods in Zend_Db_Select in the Zend Framework before 1.12.19 might allow remote attackers to conduct SQL injection attacks via vectors related to use of the character pattern [\w]* in a regular expression.

CVSS3: 9.8
EPSS: Низкий
debian логотип

CVE-2016-6233

почти 9 лет назад

The (1) order and (2) group methods in Zend_Db_Select in the Zend Fram ...

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-p9hp-3gpv-52w3

больше 3 лет назад

Zend Framework Allows SQL Injection

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2016-6233

The (1) order and (2) group methods in Zend_Db_Select in the Zend Framework before 1.12.19 might allow remote attackers to conduct SQL injection attacks via vectors related to use of the character pattern [\w]* in a regular expression.

CVSS3: 9.8
2%
Низкий
почти 9 лет назад
nvd логотип
CVE-2016-6233

The (1) order and (2) group methods in Zend_Db_Select in the Zend Framework before 1.12.19 might allow remote attackers to conduct SQL injection attacks via vectors related to use of the character pattern [\w]* in a regular expression.

CVSS3: 9.8
2%
Низкий
почти 9 лет назад
debian логотип
CVE-2016-6233

The (1) order and (2) group methods in Zend_Db_Select in the Zend Fram ...

CVSS3: 9.8
2%
Низкий
почти 9 лет назад
github логотип
GHSA-p9hp-3gpv-52w3

Zend Framework Allows SQL Injection

CVSS3: 9.8
2%
Низкий
больше 3 лет назад

Уязвимостей на страницу