VYPR
Critical severity9.8NVD Advisory· Published Feb 17, 2017· Updated May 13, 2026

CVE-2016-6233

CVE-2016-6233

Description

The (1) order and (2) group methods in Zend_Db_Select in the Zend Framework before 1.12.19 might allow remote attackers to conduct SQL injection attacks via vectors related to use of the character pattern [\w]* in a regular expression.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
zendframework/zendframeworkPackagist
< 1.12.191.12.19
zendframework/zendframework1Packagist
< 1.12.191.12.19

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

13

News mentions

0

No linked articles in our index yet.