Page 3 of 26 results (0.003 seconds)

CVSS: 10.0EPSS: 0%CPEs: 68EXPL: 0

03 Feb 2011 — Smarty before 3.0.0 RC3 does not properly handle an on value of the asp_tags option in the php.ini file, which has unspecified impact and remote attack vectors. El motor de plantillas PHP Smarty antes de su versión v3.0.0 RC3 no controla correctamente el valor de la opción asp_tags del archivo php.ini, lo cual tiene un impacto no especificado y vectores de ataque a distancia. • http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt •

CVSS: 9.8EPSS: 0%CPEs: 63EXPL: 0

03 Feb 2011 — Unspecified vulnerability in Smarty before 3.0.0 beta 6 allows remote attackers to execute arbitrary PHP code by injecting this code into a cache file. Vulnerabilidad no especificada en Smarty anterior a v3.0.0 beta 6 permite a atacantes remotos ejecutar código PHP arbitrario inyectando este código dentro de un fichero cache. • http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt •

CVSS: 9.8EPSS: 1%CPEs: 56EXPL: 0

31 Oct 2008 — The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 before r2797 allows remote attackers to execute arbitrary PHP code via vectors related to templates and (1) a dollar-sign character, aka "php executed in templates;" and (2) a double quoted literal string, aka a "function injection security hole." NOTE: each vector affects slightly different SVN revisions. La función _expand_quoted_text en libs/Smarty_Compiler.class.php en Smarty 2.6.20 antes de r2797 permite a atacantes rem... • http://code.google.com/p/smarty-php/source/detail?r=2784&path=/trunk/libs/Smarty_Compiler.class.php • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 9.8EPSS: 1%CPEs: 57EXPL: 0

31 Oct 2008 — The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 r2797 and earlier allows remote attackers to execute arbitrary PHP code via vectors related to templates and a \ (backslash) before a dollar-sign character. La función _expand_quoted_text en libs/Smarty_Compiler.class.php en Smarty 2.6.20 r2797 y anteriores permite a atacantes remotos ejecutar código PHP de su elección mediante vectores relacionados con plantillas y una \ (barra invertida) antes de un carácter del signo del ... • http://secunia.com/advisories/32329 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 0

28 Feb 2008 — The modifier.regex_replace.php plugin in Smarty before 2.6.19, as used by Serendipity (S9Y) and other products, allows attackers to call arbitrary PHP functions via templates, related to a '\0' character in a search string. La extensión modifier.regex_replace.php de Smarty before 2.6.19,utilizado como Serendipity (S9Y) y otros productos, permite a atacantes llamar a funciones PHP de su elección a través de plantillas, relacionado con un carácter '\0' en una cadena de búsqueda. It was discovered that the reg... • http://blog.s9y.org/archives/191-Serendipity-1.3-beta1-released.html • CWE-20: Improper Input Validation •

CVSS: 9.8EPSS: 0%CPEs: 6EXPL: 0

29 Mar 2005 — Unknown vulnerability in the regex_replace modifier (modifier.regex_replace.php) in Smarty before 2.6.8 allows attackers to execute arbitrary PHP code. • http://news.php.net/php.smarty.dev/2673 •