CVE-2015-5161 (GCVE-0-2015-5161)
Vulnerability from cvelistv5
Published
2015-08-25 17:00
Modified
2024-08-06 06:41
Severity ?
CWE
  • n/a
Summary
The Zend_Xml_Security::scan in ZendXml before 1.0.1 and Zend Framework before 1.12.14, 2.x before 2.4.6, and 2.5.x before 2.5.2, when running under PHP-FPM in a threaded environment, allows remote attackers to bypass security checks and conduct XML external entity (XXE) and XML entity expansion (XEE) attacks via multibyte encoded characters.
References
secalert@redhat.com http://framework.zend.com/security/advisory/ZF2015-06 Vendor Advisory
secalert@redhat.com http://legalhackers.com/advisories/zend-framework-XXE-vuln.txt Exploit
secalert@redhat.com http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164409.html
secalert@redhat.com http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165147.html
secalert@redhat.com http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165173.html
secalert@redhat.com http://packetstormsecurity.com/files/133068/Zend-Framework-2.4.2-1.12.13-XXE-Injection.html Exploit
secalert@redhat.com http://seclists.org/fulldisclosure/2015/Aug/46 Exploit
secalert@redhat.com http://www.debian.org/security/2015/dsa-3340
secalert@redhat.com http://www.securityfocus.com/bid/76177 Exploit
secalert@redhat.com https://www.exploit-db.com/exploits/37765/ Exploit
af854a3a-2127-422b-91ae-364da2661108 http://framework.zend.com/security/advisory/ZF2015-06 Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://legalhackers.com/advisories/zend-framework-XXE-vuln.txt Exploit
af854a3a-2127-422b-91ae-364da2661108 http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164409.html
af854a3a-2127-422b-91ae-364da2661108 http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165147.html
af854a3a-2127-422b-91ae-364da2661108 http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165173.html
af854a3a-2127-422b-91ae-364da2661108 http://packetstormsecurity.com/files/133068/Zend-Framework-2.4.2-1.12.13-XXE-Injection.html Exploit
af854a3a-2127-422b-91ae-364da2661108 http://seclists.org/fulldisclosure/2015/Aug/46 Exploit
af854a3a-2127-422b-91ae-364da2661108 http://www.debian.org/security/2015/dsa-3340
af854a3a-2127-422b-91ae-364da2661108 http://www.securityfocus.com/bid/76177 Exploit
af854a3a-2127-422b-91ae-364da2661108 https://www.exploit-db.com/exploits/37765/ Exploit
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T06:41:07.867Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/133068/Zend-Framework-2.4.2-1.12.13-XXE-Injection.html"
          },
          {
            "name": "FEDORA-2015-13488",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165173.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://legalhackers.com/advisories/zend-framework-XXE-vuln.txt"
          },
          {
            "name": "76177",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/76177"
          },
          {
            "name": "FEDORA-2015-13529",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165147.html"
          },
          {
            "name": "37765",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/37765/"
          },
          {
            "name": "FEDORA-2015-13314",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164409.html"
          },
          {
            "name": "DSA-3340",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2015/dsa-3340"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://framework.zend.com/security/advisory/ZF2015-06"
          },
          {
            "name": "20150813 Zend Framework \u003c= 2.4.2 XML eXternal Entity Injection (XXE) on PHP FPM",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2015/Aug/46"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-08-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Zend_Xml_Security::scan in ZendXml before 1.0.1 and Zend Framework before 1.12.14, 2.x before 2.4.6, and 2.5.x before 2.5.2, when running under PHP-FPM in a threaded environment, allows remote attackers to bypass security checks and conduct XML external entity (XXE) and XML entity expansion (XEE) attacks via multibyte encoded characters."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-12-22T18:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/133068/Zend-Framework-2.4.2-1.12.13-XXE-Injection.html"
        },
        {
          "name": "FEDORA-2015-13488",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165173.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://legalhackers.com/advisories/zend-framework-XXE-vuln.txt"
        },
        {
          "name": "76177",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/76177"
        },
        {
          "name": "FEDORA-2015-13529",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165147.html"
        },
        {
          "name": "37765",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/37765/"
        },
        {
          "name": "FEDORA-2015-13314",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164409.html"
        },
        {
          "name": "DSA-3340",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2015/dsa-3340"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://framework.zend.com/security/advisory/ZF2015-06"
        },
        {
          "name": "20150813 Zend Framework \u003c= 2.4.2 XML eXternal Entity Injection (XXE) on PHP FPM",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2015/Aug/46"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2015-5161",
    "datePublished": "2015-08-25T17:00:00",
    "dateReserved": "2015-07-01T00:00:00",
    "dateUpdated": "2024-08-06T06:41:07.867Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2015-5161\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2015-08-25T17:59:03.307\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Zend_Xml_Security::scan in ZendXml before 1.0.1 and Zend Framework before 1.12.14, 2.x before 2.4.6, and 2.5.x before 2.5.2, when running under PHP-FPM in a threaded environment, allows remote attackers to bypass security checks and conduct XML external entity (XXE) and XML entity expansion (XEE) attacks via multibyte encoded characters.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad en el Zend_Xml_Security::scan en ZendXml en versiones anteriores a 1.0.1 y Zend Framework en versiones anteriores a 1.12.14, 2.x en versiones anteriores a 2.4.6 y 2.5.x en versiones anteriores a 2.5.2, cuando se ejecuta bajo PHP-FPM en un entorno con hilos, permite a atacantes remotos evadir la verificaci\u00f3n de seguridad y realizar ataques de entidad externa XML (XXE) y de expansi\u00f3n de entidad XML (XEE) a trav\u00e9s de caracteres multibyte codificados.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C42B4F3-D79C-42DE-B86C-9E7612E71661\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.0.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"536CC39B-D305-492F-892C-6431BD7BA95F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.0.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"17673E8C-CB65-447E-8A6B-1083E6E77B42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.0.0:rc2a:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA85105D-B9FB-4147-87B7-4F4DD0324AE7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.0.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"99C549AF-2C59-4D8E-B651-EA630C3B2975\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50EF804C-102C-47F5-A85A-63EAA7EF9BAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B648466-36AD-4EC0-BDE1-C976F697D58F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C9DCE27-D2D1-4329-88F5-911DA763469C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1417EB1F-5342-443B-AC81-3256FCCE1BFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.5.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE350CD6-54CA-4BDF-9327-60F872098D68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.5.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3603D2F-91FE-4B12-A5BC-2F63E1612A39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.5.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"04524F0F-6C21-4670-9B2C-A3B06C151799\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01BD97A6-336A-4B8A-AFC5-C9EA1DDCCC8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B636257-9941-4997-9525-F8C5A920AB8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"118C20B5-FC8D-4EBF-A7D7-975A568A31BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CEB67E5-D7D9-443A-9176-3104A9C068AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.6.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"20C61B54-2D08-45FD-A10A-34AD50EC3BED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.6.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FD68242-67DB-4C1D-8265-7839976DBCEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.6.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C32036E-14BC-48AE-92A4-9DDCC96EC557\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F965C4F5-5F12-42CF-B120-758205E0E050\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"531B7A51-2B4C-4A50-A8C8-D81040FF6E31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16D75279-B5A8-4C82-B2C0-C58DEF56A086\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.7.0:pl1:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE99D584-E652-4B9F-BD2E-45A167B1524C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.7.0:pr:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EE1CCE3-4AD0-4ABD-B4C9-5390F9CDB37F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57D97342-CF37-486E-A3C9-FBA000F5A041\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"819E0C25-1413-4532-9427-24520E23C07B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9A96DF1-81D9-4BD3-9E62-CEECE377406D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.7.3:pl1:*:*:*:*:*:*\",\"matchCriteriaId\":\"744FEDE8-5825-4C5C-887D-9ADCC9183AA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF957F4D-FDFD-419B-AD2B-02E572A3BA9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"000BAA0C-6546-4DEC-8B85-146508C19F5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"429128C9-689E-49EA-BD8C-138FC337AB08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2096048C-7E4A-415E-AEBF-9AB7E8BCE894\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.7.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B72E45D-E298-45BD-9EE5-127D3EFEC17C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.7.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07D06D35-CE63-456D-A970-5AE663175E8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11459424-1BA2-44D0-B831-92BE6E2664E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.8.0:a1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FACC0F56-C6CB-4BC7-946E-8077B2C90B2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.8.0:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB4F6AA5-8320-4451-9C8C-02D68FE4CA3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A847F7F6-18EF-44FB-9153-BD7D3223D6ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBE53880-D68C-49CB-BFE7-D1806AAD5C6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.8.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45B7421E-E0C4-4594-AE81-4F3811CAAB33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EABF4FA-D4A6-4C82-BF9C-A828B906F499\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.8.4:pl1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EA1EBE6-0E18-44FA-BE72-D6512E7409B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.8.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F10191E-9EF7-47B8-9CDC-FCFE47AEFE50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C3E24C3-21CC-4ED2-8669-5D94BD5D99AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.9.0:a1:*:*:*:*:*:*\",\"matchCriteriaId\":\"075019DE-CC38-4DFF-B869-5884A7AC9000\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.9.0:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"81CC10E4-37A8-4BAD-AC6D-EAD3A7E70CD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.9.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B3E9C9A-E12F-43EC-9134-4EFF2BA6B4D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75B01DA0-E43B-456F-98CB-B806E3A54E94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD3BA6AE-8D0D-48C4-82C2-90164113232A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.9.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C405425-36E0-458C-9EB8-760703DF39DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.9.3:pl1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E3911A0-F189-488A-9246-BA8B1CF9B8CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.9.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAC94846-2345-4A62-8E57-AC7EAFCD05D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.9.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8074B0AD-C349-4BAC-9076-DD08893F5574\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.9.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18F43C9F-1EE9-4B77-AD35-EB1286BED2EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.9.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"557E4E4E-0022-4EEA-A08D-BFE2392147EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.9.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AC4C9BC-B0FC-4050-B998-5DB523C26EE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C844B367-8CE3-4347-B822-FA74D29E87C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.10.0:alpha1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AAF2D17-6E72-4E27-B94B-397DB9C3A682\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.10.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF93FB2E-0F51-4EE0-9A29-91B2A2311FF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.10.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"528D7214-C4EE-40D9-83CF-F9B81382F257\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78EAC4C3-D9D3-4F3C-A56E-C434F15860CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.10.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6322EB6C-3CAD-4E61-AC47-FDB416F9BAEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.10.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A341606-0AD5-442B-BEF3-D8246402CE00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.10.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F033605-4770-453C-9C8D-48AB36B93F23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.10.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CF3E847-EF03-4B57-B54F-01E2D4DA2261\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.10.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5E7A156-6F31-48D6-B1A7-991CDC120602\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.10.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AC72907-188E-4B2B-AA08-482A98227961\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.10.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB1E9C46-CF7B-4142-A178-C21EB3E4C844\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.10.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0227AEB0-4C45-4744-8501-B20F7B4254D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A033B19-5C9B-4948-88C6-9B8E69135112\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.11.0:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5B221F8-CF2D-4994-87D9-57375D0942DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.11.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8BCCB2A-7873-4027-AECE-024EF7A71E60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81773611-D93F-4A8A-AE36-BEE60385F39B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.11.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AAF5871-E892-4EDE-8845-E3633E10F733\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.11.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99D5C2A0-11C8-458A-910F-58E7F39243C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.11.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE49C5F9-1C3D-44FD-831D-663013EDFA30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.11.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B338FCC6-506F-468D-9551-B7FA22D31BD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.11.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"687ABF79-8F2F-4E5F-BF2A-42AD4F60C178\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.11.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82E96CB5-E6F8-4163-8A95-B72C243FF133\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.11.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F486B0E-45D9-4B15-B4B7-1C35C3B9A8C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.11.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A751B994-80CF-475C-AFCC-C3645A4B2BF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.11.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F25F13A3-867D-4D79-8B7B-9771D3DB0540\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.11.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64C08E10-14D4-4ACE-9064-8322A09773C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.11.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDA4B247-94D3-400C-A575-3DBA755C24E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.11.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D934F3F-997E-44B8-A4D2-CC07FEEB7271\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DBCDD61-759D-4623-B7ED-88E78BDE7397\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.12.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A78C7EE7-7C12-45D2-913E-DC4902886C11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.12.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"97F3ED10-8D1F-4D01-A79B-95AAF864B0BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.12.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E65648D-78FF-47D8-9F9E-66E9A8C121AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.12.0:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA6467DF-3983-4BB9-ACC7-C6AFE753E319\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93186E8D-5681-4350-A6B1-C020B3C47560\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A65D2D2-766B-4C47-B6B8-352184D4D15A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DA1CB81-12EF-4509-9D64-726B6E29C3FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.12.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0156E81D-4059-4B2E-A0CB-16DE1769DD57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.12.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0724571D-979D-4608-94A0-139848A37AFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.12.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C3CE5F6-2B7C-4DDC-A8AD-15850DD98235\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.12.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD215689-EFF4-47D4-B6B2-573857E84288\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.12.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74B48102-DC93-4C5A-9297-0FCE790AD62D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.12.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"287EB2A5-CAC2-45F7-9980-2F003249AFBF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.12.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1D2AEAB-A3F6-4DC4-A590-75B8F0153605\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.12.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBD287F1-7CB2-4DCA-84A0-495DE57EAB4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.12.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E37F6DF4-A6F6-476C-AF90-5703E5054532\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:1.12.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61A46B5E-3BCB-4296-9BAE-44AA3648BD3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED897A0F-2530-4414-A7B1-D505952E2B78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:2.0.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED954B74-0A27-4DFE-B4FD-FCD996043A7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:2.0.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"24801F0A-F796-41BF-9E87-AEA99490CD9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:2.0.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D0E7E8F-C212-42DB-9EB5-816AD5B3A681\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:2.0.0:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"12645463-1317-48D2-AA01-E835CD296510\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:2.0.0:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3F15A9A-DC75-45B8-B674-FA47166B9BA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:2.0.0:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF328AB4-C203-40AC-AB50-C3065236CB7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:2.0.0:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F6122C6-8332-40DC-B5EF-5403C3DE5594\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADD454CB-F1E7-4373-815F-896D68D150D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:2.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F1D7828-D023-46D6-8F1B-A7D62C8F133E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:2.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A123161-76A3-4AAF-ACE6-6EF7A686B74F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:2.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16C3EFB5-99A7-4F05-B17C-56451FFB5860\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:2.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62D6D1C8-4733-4758-8883-2F85B8DB3A72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:2.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43A6BA3C-F356-4A64-9AEE-2262DB0B46A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:2.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02AEF2B4-B24C-42E2-8525-E7595E9283F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:2.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6B584F0-75AB-4670-A460-92A1CF27F0CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:2.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2E14CED-60C4-4D16-9807-1B86F69FB516\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:2.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C32DC80-7367-4D82-A755-DE397629EA4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:2.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30AEC279-C346-48D1-B3E1-92C64CA1A4B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:2.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"328F76F9-F195-4212-803F-CD3D104F3A6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:2.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB893A06-1A7D-43A9-B51B-C9242F74AAD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:2.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CA225A4-8427-4016-AFD1-6BDC3421A531\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:2.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4D51607-3FA8-4E30-8B02-004F056583E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:2.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90A9D6B0-D34B-423A-AB7D-D6B14F3F1FA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:2.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E258FDD6-AF80-4166-A3C0-BC41EAFD894C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:2.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B537EBA-396D-4C52-A65D-CD26E59EE44A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:2.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80CD59F7-E5F7-4146-A422-79C652121D39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:2.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F760DAF-39EE-400E-BEF4-B6816080538A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:2.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CB89CEA-8DC2-4DD2-8A41-BD944261E1CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:2.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C85F6A88-33E7-4C71-B52B-99D13CD23F3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:2.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75E530D7-6033-4151-AEF6-F7A0E3CC86CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:2.2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2ACABA67-F66C-4597-B0F6-A6A6B7DF85EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:2.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF6A15D7-27BB-4625-BD14-A0CE2F213D54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:2.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58B32A65-119C-45EF-8122-EBFCA41A1696\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:2.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32E9E662-1642-49D6-9908-9BD4DE479114\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:2.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0ACBA96F-C081-4B66-BC4B-C456FA688EA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:2.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23C2DD7D-3CB8-4E69-9B4D-B0A4552A1177\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:2.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3129429-DD49-416B-BFD0-174713966A9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:2.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CDE54C3-5D05-4CEE-8FA1-840E6DC5D110\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:2.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F95F9508-D1E5-410F-A2B0-635E1524720A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:2.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03CC3191-5BEE-417D-9420-08F65E4F28FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:2.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F8CB49F-F050-4F45-A72E-D5B9C43B0E53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:2.3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF5AD2CD-3CE5-4465-9EEB-0F990AF48588\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:2.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CE2C2D7-D937-427B-9690-B1EA32314042\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:2.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98145CC7-4F7E-40B2-BDD3-08AF81634AF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:2.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35909C93-F7B3-4072-9FB7-E806AFDB585C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:2.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8AFDDAC-A697-4F0C-9C1B-507A85DF8473\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:2.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F724D0C-0A0D-48A0-AE0B-A9645062AEF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:2.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BC1E6B1-1456-419E-9711-10EAD142FE6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:2.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8CF6A3D-A182-4800-89FA-44BC4ACD7291\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zend:zend_framework:2.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCDA71DB-7D92-47EC-A706-2A61ACDC7CEB\"}]}]}],\"references\":[{\"url\":\"http://framework.zend.com/security/advisory/ZF2015-06\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://legalhackers.com/advisories/zend-framework-XXE-vuln.txt\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164409.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165147.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165173.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://packetstormsecurity.com/files/133068/Zend-Framework-2.4.2-1.12.13-XXE-Injection.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\"]},{\"url\":\"http://seclists.org/fulldisclosure/2015/Aug/46\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.debian.org/security/2015/dsa-3340\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/76177\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\"]},{\"url\":\"https://www.exploit-db.com/exploits/37765/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\"]},{\"url\":\"http://framework.zend.com/security/advisory/ZF2015-06\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://legalhackers.com/advisories/zend-framework-XXE-vuln.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164409.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165147.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165173.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://packetstormsecurity.com/files/133068/Zend-Framework-2.4.2-1.12.13-XXE-Injection.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://seclists.org/fulldisclosure/2015/Aug/46\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.debian.org/security/2015/dsa-3340\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/76177\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"https://www.exploit-db.com/exploits/37765/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]}],\"evaluatorComment\":\"\u003ca href=\\\"http://cwe.mitre.org/data/definitions/611.html\\\"\u003eCWE-611: Improper Restriction of XML External Entity Reference (\u0027XXE\u0027)\u003c/a\u003e\"}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…