The (1) order and (2) group methods in ZendDbSelect in the Zend Framework before 1.12.19 might allow remote attackers to conduct SQL injection attacks via vectors related to use of the character pattern [\w]*
in a regular expression.
{ "nvd_published_at": "2017-02-17T02:59:00Z", "cwe_ids": [ "CWE-89" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2023-07-28T23:22:04Z" }