The (1) order and (2) group methods in Zend_Db_Select in the Zend Framework before 1.12.19 might allow remote attackers to conduct SQL injection attacks via vectors related to use of the character pattern [\w]* in a regular expression.
| Package (Ecosystem) | Introduced | Fixed | Limit |
|---|---|---|---|
| zendframework/zendframework(Packagist) | 0 | 1.12.19 | N/A |
| zendframework/zendframework1(Packagist) | 0 | 1.12.19 | N/A |
CVSS Metrics