Description
The Zend_Db_Select::order function in Zend Framework before 1.12.7 does not properly handle parentheses, which allows remote attackers to conduct SQL injection attacks via unspecified vectors.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-251-1 | zendframework security update |
Debian DLA |
DLA-251-2 | zendframework regression update |
Debian DSA |
DSA-3265-1 | zendframework security update |
Debian DSA |
DSA-3265-2 | zendframework regression update |
EUVD |
EUVD-2014-4833 | The Zend_Db_Select::order function in Zend Framework before 1.12.7 does not properly handle parentheses, which allows remote attackers to conduct SQL injection attacks via unspecified vectors. |
References
History
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T11:34:36.179Z
Reserved: 2014-07-11T00:00:00.000Z
Link: CVE-2014-4914
No data.
Status : Deferred
Published: 2017-12-29T14:29:00.220
Modified: 2025-04-20T01:37:25.860
Link: CVE-2014-4914
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD