
We found results for “”
CVE-2014-8089
Good to know:

Date: February 17, 2020
SQL injection vulnerability in Zend Framework before 1.12.9, 2.2.x before 2.2.8, and 2.3.x before 2.3.3, when using the sqlsrv PHP extension, allows remote attackers to execute arbitrary SQL commands via a null byte.
Language: PHP
Severity Score
Related Resources (10)
Severity Score
Weakness Type (CWE)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CWE-89Top Fix

Upgrade Version
Upgrade to version zendframework/zend-db - 2.2.8;zendframework/zend-db - 2.2.3;zendframework/zend-db - 2.3.3;zendframework/zend-db - 2.2.6;dev7ch/zend-db - release-2.3.1;dev7ch/zend-db - release-2.2.4;dev7ch/zend-db - release-2.3.2;dev7ch/zend-db - release-2.2.5;dev7ch/zend-db - release-2.2.2;dev7ch/zend-db - release-2.2.3;dev7ch/zend-db - release-2.2.0rc3;dev7ch/zend-db - release-2.2.0;dev7ch/zend-db - release-2.2.1;dev7ch/zend-db - release-2.2.6;dev7ch/zend-db - release-2.2.7;dev7ch/zend-db - release-2.3.0;vufind/vufind - dev-legacy/bundled-dependencies;vufind/vufind - dev-autocomplete-v2-1-10;vufind/vufind - dev-release-2.4;vufind/vufind - RD1;zzh-php/lib - no_fix;gotcms/gotcms - 0.1.0;gotcms/gotcms - 1.5.1;s9y/serendipity - 2.3-beta1;s9y/serendipity - dev-feature_subscription;s9y/serendipity - dev-feature/limit2k11searchbox;vivaweb/zendframework - 2.3.3;vivaweb/zendframework - 2.2.8;zendframework/zendframework - 2.2.8;zendframework/zendframework - 2.3.3;obimet/tool_console - no_fix;webino/zend-db - 2.2.8;webino/zend-db - 2.3.3;pi/pi - 2.5.0
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | HIGH |
Integrity (I): | HIGH |
Availability (A): | HIGH |
CVSS v2
Base Score: |
|
---|---|
Access Vector (AV): | NETWORK |
Access Complexity (AC): | LOW |
Authentication (AU): | NONE |
Confidentiality (C): | PARTIAL |
Integrity (I): | PARTIAL |
Availability (A): | PARTIAL |
Additional information: |