Show filters
16 Total Results
Displaying 11-16 of 16
Sort by:
Attacker Value
Unknown
CVE-2010-4727
Disclosure Date: February 03, 2011 (last updated October 04, 2023)
Smarty before 3.0.0 beta 7 does not properly handle the <?php and ?> tags, which has unspecified impact and remote attack vectors.
0
Attacker Value
Unknown
CVE-2009-5053
Disclosure Date: February 03, 2011 (last updated October 04, 2023)
Unspecified vulnerability in Smarty before 3.0.0 beta 6 allows remote attackers to execute arbitrary PHP code by injecting this code into a cache file.
0
Attacker Value
Unknown
CVE-2009-1669
Disclosure Date: May 18, 2009 (last updated October 04, 2023)
The smarty_function_math function in libs/plugins/function.math.php in Smarty 2.6.22 allows context-dependent attackers to execute arbitrary commands via shell metacharacters in the equation attribute of the math function. NOTE: some of these details are obtained from third party information.
0
Attacker Value
Unknown
CVE-2008-4811
Disclosure Date: October 31, 2008 (last updated October 04, 2023)
The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 r2797 and earlier allows remote attackers to execute arbitrary PHP code via vectors related to templates and a \ (backslash) before a dollar-sign character.
0
Attacker Value
Unknown
CVE-2008-4810
Disclosure Date: October 31, 2008 (last updated October 04, 2023)
The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 before r2797 allows remote attackers to execute arbitrary PHP code via vectors related to templates and (1) a dollar-sign character, aka "php executed in templates;" and (2) a double quoted literal string, aka a "function injection security hole." NOTE: each vector affects slightly different SVN revisions.
0
Attacker Value
Unknown
CVE-2005-0913
Disclosure Date: May 02, 2005 (last updated February 22, 2025)
Unknown vulnerability in the regex_replace modifier (modifier.regex_replace.php) in Smarty before 2.6.8 allows attackers to execute arbitrary PHP code.
0