
CVE-2006-7105
https://notcve.org/view.php?id=CVE-2006-7105
03 Mar 2007 — PHP remote file inclusion vulnerability in libs/Smarty.class.php in Smarty 2.6.9 allows remote attackers to execute arbitrary PHP code via a URL in the filename parameter. NOTE: in the original disclosure, filename is used in a function definition, so this report is probably incorrect ** IMPUGNADA ** Vulnerabilidad PHP de inclusión remota de archivo en libs/Smarty.class.php en Smarty 2.6.9 permite a atacantes remotos ejecutar código PHP de su elección a través de una URL en el parámetro filename. NOTA: en e... • http://www.security-express.com/archives/fulldisclosure/2006-10/0292.html • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2005-0913
https://notcve.org/view.php?id=CVE-2005-0913
29 Mar 2005 — Unknown vulnerability in the regex_replace modifier (modifier.regex_replace.php) in Smarty before 2.6.8 allows attackers to execute arbitrary PHP code. • http://news.php.net/php.smarty.dev/2673 •