16 Fév 2017
CVE-2016-6233 - CVE Vulnerability
The (1) order and (2) group methods in Zend_Db_Select in the Zend Framework before 1.12.19 might allow remote attackers to conduct SQL injection attacks via vectors related to use of the character pattern [\w]* in a regular expression. (CVSS:0.0) (Last Update:2017-02-16)
Vulnerability Details : The (1) order and (2) group methods in Zend_Db_Select in the Zend Framework before 1.12.19 might allow remote attackers to conduct SQL injection attacks via vectors related to use of the character pattern [\w]* in a regular expression. Publish Date : 2017-02-16 Last Update Date : 2017-02-16 - CVSS Scores & Vulnerability Types
- Products Affected By CVE-2016-6233
- References For CVE-2016-6233 | |||||||||||||||||||||||||||||||||||||||||||||
- Metasploit Modules Related To CVE-2016-6233There are not any metasploit modules related to this CVE entry (Please visit www.metasploit.com for more information) |