
CVE-2021-43617 – PHP Laravel 8.70.1 - Cross Site Scripting (XSS) to Cross Site Request Forgery (CSRF)
https://notcve.org/view.php?id=CVE-2021-43617
14 Nov 2021 — Laravel Framework through 8.70.2 does not sufficiently block the upload of executable PHP content because Illuminate/Validation/Concerns/ValidatesAttributes.php lacks a check for .phar files, which are handled as application/x-httpd-php on systems based on Debian. NOTE: this CVE Record is for Laravel Framework, and is unrelated to any reports concerning incorrectly written user applications for image upload. Laravel Framework hasta la versión 8.70.2 no bloquea suficientemente la subida de contenido PHP ejec... • https://www.exploit-db.com/exploits/50525 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVE-2015-0270
https://notcve.org/view.php?id=CVE-2015-0270
25 Oct 2019 — Zend Framework before 2.2.10 and 2.3.x before 2.3.5 has Potential SQL injection in PostgreSQL Zend\Db adapter. Zend Framework versiones anteriores a 2.2.10 y versiones 2.3.x anteriores a 2.3.5, presenta una Inyección SQL Potencial en el adaptador Zend\Db de PostgreSQL. • https://framework.zend.com/security/advisory/ZF2015-02 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2019-14987
https://notcve.org/view.php?id=CVE-2019-14987
13 Aug 2019 — Adive Framework through 2.0.7 is affected by XSS in the Create New Table and Create New Navigation Link functions. Adive Framework hasta la versión 2.0.7 se ve afectado por XSS en las funciones Create New Table y Create New Navigation Link • https://www.sevenlayers.com/index.php/231-adive-framework-2-0-7-xss • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2015-5161 – Zend Framework 2.4.2 - PHP FPM XML eXternal Entity Injection
https://notcve.org/view.php?id=CVE-2015-5161
13 Aug 2015 — The Zend_Xml_Security::scan in ZendXml before 1.0.1 and Zend Framework before 1.12.14, 2.x before 2.4.6, and 2.5.x before 2.5.2, when running under PHP-FPM in a threaded environment, allows remote attackers to bypass security checks and conduct XML external entity (XXE) and XML entity expansion (XEE) attacks via multibyte encoded characters. Vulnerabilidad en el Zend_Xml_Security::scan en ZendXml en versiones anteriores a 1.0.1 y Zend Framework en versiones anteriores a 1.12.14, 2.x en versiones anteriores ... • https://packetstorm.news/files/id/133068 •

CVE-2014-2685 – Mandriva Linux Security Advisory 2014-072
https://notcve.org/view.php?id=CVE-2014-2685
09 Apr 2014 — The GenericConsumer class in the Consumer component in ZendOpenId before 2.0.2 and the Zend_OpenId_Consumer class in Zend Framework 1 before 1.12.4 violate the OpenID 2.0 protocol by ensuring only that at least one field is signed, which allows remote attackers to bypass authentication by leveraging an assertion from an OpenID provider. La clase GenericConsumer en el componente Consumer en ZendOpenId anterior a 2.0.2 y la clase Zend_OpenId_Consumer en Zend Framework 1 anterior a 1.12.4 violan el protocolo O... • http://advisories.mageia.org/MGASA-2014-0151.html • CWE-287: Improper Authentication •

CVE-2012-5657
https://notcve.org/view.php?id=CVE-2012-5657
02 May 2013 — The (1) Zend_Feed_Rss and (2) Zend_Feed_Atom classes in Zend_Feed in Zend Framework 1.11.x before 1.11.15 and 1.12.x before 1.12.1 allow remote attackers to read arbitrary files, send HTTP requests to intranet servers, and possibly cause a denial of service (CPU and memory consumption) via an XML External Entity (XXE) attack. Las clases (1) Zend_Feed_Rss y (2) Zend_Feed_Atom en Zend_Feed en Zend Framework v1.11.x antes de v1.11.15 y v1.12.x antes de v1.12.1 permite a atacantes remotos leer ficheros, enviar ... • http://framework.zend.com/security/advisory/ZF2012-05 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2012-6531
https://notcve.org/view.php?id=CVE-2012-6531
13 Feb 2013 — (1) Zend_Dom, (2) Zend_Feed, and (3) Zend_Soap in Zend Framework 1.x before 1.11.13 and 1.12.x before 1.12.0 do not properly handle SimpleXMLElement classes, which allow remote attackers to read arbitrary files or create TCP connections via an external entity reference in a DOCTYPE element in an XML-RPC request, aka an XML external entity (XXE) injection attack, a different vulnerability than CVE-2012-3363. (1) Zend_Dom, (2) Zend_Feed, y (3) Zend_Soap en Zend Framework v1.x antes de v1.11.13 y v1.12.0 1.12.... • http://framework.zend.com/security/advisory/ZF2012-01 • CWE-20: Improper Input Validation •

CVE-2012-6532
https://notcve.org/view.php?id=CVE-2012-6532
13 Feb 2013 — (1) Zend_Dom, (2) Zend_Feed, (3) Zend_Soap, and (4) Zend_XmlRpc in Zend Framework 1.x before 1.11.13 and 1.12.x before 1.12.0 allow remote attackers to cause a denial of service (CPU consumption) via recursive or circular references in an XML entity definition in an XML DOCTYPE declaration, aka an XML Entity Expansion (XEE) attack. (1) Zend_Dom, (2) Zend_Feed, (3) Zend_Soap, y (4) Zend_XmlRpc en Zend Framework v1.x antes de v1.11.13 y antes v1.12.0 1.12.x de permitir a atacantes remotos provocar una denegac... • http://framework.zend.com/security/advisory/ZF2012-02 • CWE-399: Resource Management Errors •

CVE-2011-3825
https://notcve.org/view.php?id=CVE-2011-3825
24 Sep 2011 — Zend Framework 1.11.3 in Zend Server CE 5.1.0 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by Validate.php and certain other files. Zend Framework v1.11.3 en Zend Server CE v5.1.0 permite a atacantes remotos obtener información sensible a través de una petición directa a un archivo .php, lo que revela la ruta de instalación en un mensaje de error, como se demostró con Validate.php y algun... • http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •