
CVE-2010-4725
https://notcve.org/view.php?id=CVE-2010-4725
03 Feb 2011 — Smarty before 3.0.0 RC3 does not properly handle an on value of the asp_tags option in the php.ini file, which has unspecified impact and remote attack vectors. El motor de plantillas PHP Smarty antes de su versión v3.0.0 RC3 no controla correctamente el valor de la opción asp_tags del archivo php.ini, lo cual tiene un impacto no especificado y vectores de ataque a distancia. • http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt •

CVE-2009-5053
https://notcve.org/view.php?id=CVE-2009-5053
03 Feb 2011 — Unspecified vulnerability in Smarty before 3.0.0 beta 6 allows remote attackers to execute arbitrary PHP code by injecting this code into a cache file. Vulnerabilidad no especificada en Smarty anterior a v3.0.0 beta 6 permite a atacantes remotos ejecutar código PHP arbitrario inyectando este código dentro de un fichero cache. • http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt •

CVE-2008-4810 – Ubuntu Security Notice 791-1
https://notcve.org/view.php?id=CVE-2008-4810
31 Oct 2008 — The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 before r2797 allows remote attackers to execute arbitrary PHP code via vectors related to templates and (1) a dollar-sign character, aka "php executed in templates;" and (2) a double quoted literal string, aka a "function injection security hole." NOTE: each vector affects slightly different SVN revisions. La función _expand_quoted_text en libs/Smarty_Compiler.class.php en Smarty 2.6.20 antes de r2797 permite a atacantes rem... • http://code.google.com/p/smarty-php/source/detail?r=2784&path=/trunk/libs/Smarty_Compiler.class.php • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2008-4811 – Ubuntu Security Notice 791-1
https://notcve.org/view.php?id=CVE-2008-4811
31 Oct 2008 — The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 r2797 and earlier allows remote attackers to execute arbitrary PHP code via vectors related to templates and a \ (backslash) before a dollar-sign character. La función _expand_quoted_text en libs/Smarty_Compiler.class.php en Smarty 2.6.20 r2797 y anteriores permite a atacantes remotos ejecutar código PHP de su elección mediante vectores relacionados con plantillas y una \ (barra invertida) antes de un carácter del signo del ... • http://secunia.com/advisories/32329 • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2008-1066 – Debian Linux Security Advisory 1520-1
https://notcve.org/view.php?id=CVE-2008-1066
28 Feb 2008 — The modifier.regex_replace.php plugin in Smarty before 2.6.19, as used by Serendipity (S9Y) and other products, allows attackers to call arbitrary PHP functions via templates, related to a '\0' character in a search string. La extensión modifier.regex_replace.php de Smarty before 2.6.19,utilizado como Serendipity (S9Y) y otros productos, permite a atacantes llamar a funciones PHP de su elección a través de plantillas, relacionado con un carácter '\0' en una cadena de búsqueda. It was discovered that the reg... • http://blog.s9y.org/archives/191-Serendipity-1.3-beta1-released.html • CWE-20: Improper Input Validation •

CVE-2005-0913
https://notcve.org/view.php?id=CVE-2005-0913
29 Mar 2005 — Unknown vulnerability in the regex_replace modifier (modifier.regex_replace.php) in Smarty before 2.6.8 allows attackers to execute arbitrary PHP code. • http://news.php.net/php.smarty.dev/2673 •