The (1) order and (2) group methods in Zend_Db_Select in the Zend Framework before 1.12.19 might allow remote attackers to conduct SQL injection attacks via vectors related to use of the character pattern [\w]* in a regular expression.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: debian
Published:
Updated: 2024-08-06T01:22:20.678Z
Reserved: 2016-07-16T00:00:00
Link: CVE-2016-6233

No data.

Status : Modified
Published: 2017-02-17T02:59:13.500
Modified: 2024-11-21T02:55:42.337
Link: CVE-2016-6233

No data.