Filtered by vendor Zend
Subscriptions
Total
46 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2006-5717 | 1 Zend | 1 Zend Google Data Client Library Preview | 2025-04-09 | N/A |
Multiple cross-site scripting (XSS) vulnerabilities in Zend Google Data Client Library (ZendGData) Preview 0.2.0 allow remote attackers to inject arbitrary web script or HTML via unspecified parameters in (1) basedemo.php and (2) calenderdemo.php in samples/, and other unspecified files. | ||||
CVE-2007-1370 | 1 Zend | 1 Zend Platform | 2025-04-09 | N/A |
Zend Platform 2.2.3 and earlier has incorrect ownership for scd.sh and certain other files, which allows local users to gain root privileges by modifying the files. NOTE: this only occurs when safe_mode and open_basedir are disabled; other settings require leverage for other vulnerabilities. | ||||
CVE-2006-4432 | 1 Zend | 1 Zend Platform | 2025-04-03 | N/A |
Directory traversal vulnerability in Zend Platform 2.2.1 and earlier allows remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in the final component of the PHP session identifier (PHPSESSID). NOTE: in some cases, this issue can be leveraged to perform direct static code injection. | ||||
CVE-2006-4431 | 1 Zend | 1 Zend Platform | 2025-04-03 | N/A |
Multiple buffer overflows in the (a) Session Clustering Daemon and the (b) mod_cluster module in the Zend Platform 2.2.1 and earlier allow remote attackers to cause a denial of service (crash) or execute arbitrary code via a (1) empty or (2) crafted PHP session identifier (PHPSESSID). | ||||
CVE-2020-29312 | 1 Zend | 1 Zend Framework | 2025-02-18 | 9.8 Critical |
An issue found in Zend Framework v.3.1.3 and before allow a remote attacker to execute arbitrary code via the unserialize function. Note: This has been disputed by third parties as incomplete and incorrect. The framework does not have a version that surpasses 2.x.x and was deprecated in early 2020. | ||||
CVE-2021-3007 | 2 Getlaminas, Zend | 2 Laminas-http, Zend Framework | 2024-11-21 | 9.8 Critical |
Laminas Project laminas-http before 2.14.2, and Zend Framework 3.0.0, has a deserialization vulnerability that can lead to remote code execution if the content is controllable, related to the __destruct method of the Zend\Http\Response\Stream class in Stream.php. NOTE: Zend Framework is no longer supported by the maintainer. NOTE: the laminas-http vendor considers this a "vulnerability in the PHP language itself" but has added certain type checking as a way to prevent exploitation in (unrecommended) use cases where attacker-supplied data can be deserialized | ||||
CVE-2021-27888 | 1 Zend | 1 Zendto | 2024-11-21 | 6.1 Medium |
ZendTo before 6.06-4 Beta allows XSS during the display of a drop-off in which a filename has unexpected characters. | ||||
CVE-2020-8986 | 1 Zend | 1 Zendto | 2024-11-21 | 9.8 Critical |
lib/NSSDropbox.php in ZendTo prior to 5.22-2 Beta failed to properly check for equality when validating the session cookie, allowing an attacker to gain administrative access with a large number of requests. | ||||
CVE-2020-8985 | 1 Zend | 1 Zendto | 2024-11-21 | 8.8 High |
ZendTo prior to 5.22-2 Beta allowed reflected XSS and CSRF via the unlock.tpl unlock user functionality. | ||||
CVE-2020-8984 | 1 Zend | 1 Zendto | 2024-11-21 | 7.5 High |
lib/NSSDropbox.php in ZendTo prior to 5.22-2 Beta allowed IP address spoofing via the X-Forwarded-For header. | ||||
CVE-2018-10230 | 1 Zend | 1 Zend Server | 2024-11-21 | N/A |
Zend Debugger in Zend Server before 9.1.3 has XSS, aka ZSR-2455. | ||||
CVE-2018-1000841 | 1 Zend | 1 Zendto | 2024-11-21 | N/A |
Zend.To version Prior to 5.15-1 contains a Cross Site Scripting (XSS) vulnerability in The verify.php page that can result in An attacker could execute arbitrary Javascript code in the context of the victim's browser.. This attack appear to be exploitable via HTTP POST request. This vulnerability appears to have been fixed in 5.16-1 Beta. | ||||
CVE-2016-6233 | 2 Fedoraproject, Zend | 2 Fedora, Zend Framework | 2024-11-21 | N/A |
The (1) order and (2) group methods in Zend_Db_Select in the Zend Framework before 1.12.19 might allow remote attackers to conduct SQL injection attacks via vectors related to use of the character pattern [\w]* in a regular expression. | ||||
CVE-2016-4861 | 2 Fedoraproject, Zend | 2 Fedora, Zend Framework | 2024-11-21 | N/A |
The (1) order and (2) group methods in Zend_Db_Select in the Zend Framework before 1.12.20 might allow remote attackers to conduct SQL injection attacks by leveraging failure to remove comments from an SQL statement before validation. | ||||
CVE-2015-7503 | 1 Zend | 1 Zend Framework | 2024-11-21 | N/A |
Zend Framework before 2.4.9, zend-framework/zend-crypt 2.4.x before 2.4.9, and 2.5.x before 2.5.2 allows remote attackers to recover the RSA private key. | ||||
CVE-2015-3257 | 1 Zend | 1 Diactoros | 2024-11-21 | N/A |
Zend/Diactoros/Uri::filterPath in zend-diactoros before 1.0.4 does not properly sanitize path input, which allows remote attackers to perform cross-site scripting (XSS) or open redirect attacks. | ||||
CVE-2015-3154 | 1 Zend | 1 Zend Framework | 2024-11-21 | 6.1 Medium |
CRLF injection vulnerability in Zend\Mail (Zend_Mail) in Zend Framework before 1.12.12, 2.x before 2.3.8, and 2.4.x before 2.4.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in the header of an email. | ||||
CVE-2015-1786 | 1 Zend | 1 Zend Framework | 2024-11-21 | N/A |
Cross-site request forgery (CSRF) vulnerability in Zend/Validator/Csrf in Zend Framework 2.3.x before 2.3.6 via null or malformed token identifiers. | ||||
CVE-2015-1555 | 1 Zend | 1 Zend Framework | 2024-11-21 | N/A |
Zend/Session/SessionManager in Zend Framework 2.2.x before 2.2.9, 2.3.x before 2.3.4 allows remote attackers to create valid sessions without using session validators. | ||||
CVE-2015-0270 | 1 Zend | 1 Framework | 2024-11-21 | 9.8 Critical |
Zend Framework before 2.2.10 and 2.3.x before 2.3.5 has Potential SQL injection in PostgreSQL Zend\Db adapter. |