Page 2 of 23 results (0.012 seconds)

CVSS: 9.8EPSS: 0%CPEs: 8EXPL: 1

30 Mar 2015 — SQL injection vulnerability in Zend Framework before 1.12.9, 2.2.x before 2.2.8, and 2.3.x before 2.3.3, when using the sqlsrv PHP extension, allows remote attackers to execute arbitrary SQL commands via a null byte. Una vulnerabilidad de inyección SQL en Zend Framework versiones anteriores a 1.12.9, versiones 2.2.x anteriores a 2.2.8 y versiones 2.3.x anteriores a 2.3.3, cuando se usa la extensión PHP sqlsrv, permite a atacantes remotos ejecutar comandos SQL arbitrarios por medio de un byte null. XML eXter... • http://framework.zend.com/security/advisory/ZF2014-06 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 5.3EPSS: 0%CPEs: 21EXPL: 0

22 Oct 2014 — The (1) Zend_Ldap class in Zend before 1.12.9 and (2) Zend\Ldap component in Zend 2.x before 2.2.8 and 2.3.x before 2.3.3 allows remote attackers to bypass authentication via a password starting with a null byte, which triggers an unauthenticated bind. (1) La clase Zend_Ldap en Zend anterior a 1.12.9 y (2) el componente Zend\Ldap en Zend 2.x anterior a 2.2.8 y 2.3.x anterior a 2.3.3 permite a atacantes remotos evadir la autenticación a través de una contraseña que empiece por un byte nulo, lo que provoca un... • http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141070.html • CWE-287: Improper Authentication •

CVSS: 9.8EPSS: 7%CPEs: 4EXPL: 2

04 Aug 2014 — SQL injection vulnerability in Zend Framework 1.10.x before 1.10.9 and 1.11.x before 1.11.6 when using non-ASCII-compatible encodings in conjunction PDO_MySql in PHP before 5.3.6. Una vulnerabilidad de inyección SQL en Zend Framework versiones 1.10.x anteriores a la versión 1.10.9 y versiones 1.11.x anteriores a la versión 1.11.6, cuando son utilizadas codificaciones no compatibles con ASCII junto con PDO_MySql en PHP versiones anteriores a la versión 5.3.6. A vulnerability in Zend Framework could allow a r... • https://www.exploit-db.com/exploits/35784 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 9.8EPSS: 0%CPEs: 3EXPL: 0

01 Aug 2014 — The Zend_Db_Select::order function in Zend Framework before 1.12.7 does not properly handle parentheses, which allows remote attackers to conduct SQL injection attacks via unspecified vectors. La función Zend_Db_Select::order en Zend Framework, en versiones anteriores a la 1.12.7, no gestiona correctamente los paréntesis. Esto permite que atacantes remotos lleven a cabo ataques de inyección SQL mediante vectores sin especificar. XML eXternal Entity flaws were discovered in the Zend Framework. An attacker co... • http://framework.zend.com/security/advisory/ZF2014-04 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 9.8EPSS: 0%CPEs: 12EXPL: 0

09 Apr 2014 — Zend Framework 1 (ZF1) before 1.12.4, Zend Framework 2 before 2.1.6 and 2.2.x before 2.2.6, ZendOpenId, ZendRest, ZendService_AudioScrobbler, ZendService_Nirvanix, ZendService_SlideShare, ZendService_Technorati, and ZendService_WindowsAzure before 2.0.2, ZendService_Amazon before 2.0.3, and ZendService_Api before 1.0.0, when PHP-FPM is used, does not properly share the libxml_disable_entity_loader setting between threads, which might allow remote attackers to conduct XML External Entity (XXE) attacks via an... • http://advisories.mageia.org/MGASA-2014-0151.html • CWE-19: Data Processing Errors •

CVSS: 9.8EPSS: 2%CPEs: 12EXPL: 0

09 Apr 2014 — Zend Framework 1 (ZF1) before 1.12.4, Zend Framework 2 before 2.1.6 and 2.2.x before 2.2.6, ZendOpenId, ZendRest, ZendService_AudioScrobbler, ZendService_Nirvanix, ZendService_SlideShare, ZendService_Technorati, and ZendService_WindowsAzure before 2.0.2, ZendService_Amazon before 2.0.3, and ZendService_Api before 1.0.0 allow remote attackers to cause a denial of service (CPU consumption) via (1) recursive or (2) circular references in an XML entity definition in an XML DOCTYPE declaration, aka an XML Entity... • http://advisories.mageia.org/MGASA-2014-0151.html • CWE-17: DEPRECATED: Code •

CVSS: 9.1EPSS: 1%CPEs: 2EXPL: 0

09 Apr 2014 — The GenericConsumer class in the Consumer component in ZendOpenId before 2.0.2 and the Zend_OpenId_Consumer class in Zend Framework 1 before 1.12.4 does not verify that the openid_op_endpoint value identifies the same Identity Provider as the provider used in the association handle, which allows remote attackers to bypass authentication and spoof arbitrary OpenID identities by using a malicious OpenID Provider that generates OpenID tokens with arbitrary identifier and claimed_id values. La clase GenericCons... • http://advisories.mageia.org/MGASA-2014-0151.html • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 9.8EPSS: 1%CPEs: 12EXPL: 0

09 Apr 2014 — Zend Framework 1 (ZF1) before 1.12.4, Zend Framework 2 before 2.1.6 and 2.2.x before 2.2.6, ZendOpenId, ZendRest, ZendService_AudioScrobbler, ZendService_Nirvanix, ZendService_SlideShare, ZendService_Technorati, and ZendService_WindowsAzure before 2.0.2, ZendService_Amazon before 2.0.3, and ZendService_Api before 1.0.0 allow remote attackers to read arbitrary files, send HTTP requests to intranet servers, and possibly cause a denial of service (CPU and memory consumption) via an XML External Entity (XXE) at... • http://advisories.mageia.org/MGASA-2014-0151.html • CWE-19: Data Processing Errors •

CVSS: 9.8EPSS: 1%CPEs: 97EXPL: 0

09 Apr 2014 — The GenericConsumer class in the Consumer component in ZendOpenId before 2.0.2 and the Zend_OpenId_Consumer class in Zend Framework 1 before 1.12.4 violate the OpenID 2.0 protocol by ensuring only that at least one field is signed, which allows remote attackers to bypass authentication by leveraging an assertion from an OpenID provider. La clase GenericConsumer en el componente Consumer en ZendOpenId anterior a 2.0.2 y la clase Zend_OpenId_Consumer en Zend Framework 1 anterior a 1.12.4 violan el protocolo O... • http://advisories.mageia.org/MGASA-2014-0151.html • CWE-287: Improper Authentication •

CVSS: 9.1EPSS: 0%CPEs: 15EXPL: 0

02 May 2013 — The (1) Zend_Feed_Rss and (2) Zend_Feed_Atom classes in Zend_Feed in Zend Framework 1.11.x before 1.11.15 and 1.12.x before 1.12.1 allow remote attackers to read arbitrary files, send HTTP requests to intranet servers, and possibly cause a denial of service (CPU and memory consumption) via an XML External Entity (XXE) attack. Las clases (1) Zend_Feed_Rss y (2) Zend_Feed_Atom en Zend_Feed en Zend Framework v1.11.x antes de v1.11.15 y v1.12.x antes de v1.12.1 permite a atacantes remotos leer ficheros, enviar ... • http://framework.zend.com/security/advisory/ZF2012-05 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •