Page 7 of 32 results (0.022 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

PHP remote file inclusion vulnerability in libs/Smarty.class.php in Smarty 2.6.9 allows remote attackers to execute arbitrary PHP code via a URL in the filename parameter. NOTE: in the original disclosure, filename is used in a function definition, so this report is probably incorrect ** IMPUGNADA ** Vulnerabilidad PHP de inclusión remota de archivo en libs/Smarty.class.php en Smarty 2.6.9 permite a atacantes remotos ejecutar código PHP de su elección a través de una URL en el parámetro filename. NOTA: en el acceso original, el nombre de fichero se utiliza en una definición de la función, así que este informe es probablemente incorrecto. • http://www.security-express.com/archives/fulldisclosure/2006-10/0292.html http://www.security-express.com/archives/fulldisclosure/2006-10/0299.html http://www.securityfocus.com/bid/20557 https://exchange.xforce.ibmcloud.com/vulnerabilities/29603 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.5EPSS: 0%CPEs: 6EXPL: 0

Unknown vulnerability in the regex_replace modifier (modifier.regex_replace.php) in Smarty before 2.6.8 allows attackers to execute arbitrary PHP code. • http://news.php.net/php.smarty.dev/2673 http://secunia.com/advisories/14729 http://security.gentoo.org/glsa/glsa-200503-35.xml http://securitytracker.com/id?1013556 http://www.securityfocus.com/bid/12941 https://exchange.xforce.ibmcloud.com/vulnerabilities/19880 •