Show filters
35 Total Results
Displaying 31-35 of 35
Sort by:
Attacker Value
Unknown

CVE-2008-4810

Disclosure Date: October 31, 2008 (last updated October 04, 2023)
The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 before r2797 allows remote attackers to execute arbitrary PHP code via vectors related to templates and (1) a dollar-sign character, aka "php executed in templates;" and (2) a double quoted literal string, aka a "function injection security hole." NOTE: each vector affects slightly different SVN revisions.
0
Attacker Value
Unknown

CVE-2008-1066

Disclosure Date: February 28, 2008 (last updated October 04, 2023)
The modifier.regex_replace.php plugin in Smarty before 2.6.19, as used by Serendipity (S9Y) and other products, allows attackers to call arbitrary PHP functions via templates, related to a '\0' character in a search string.
0
Attacker Value
Unknown

CVE-2006-7193

Disclosure Date: April 12, 2007 (last updated November 08, 2023)
PHP remote file inclusion vulnerability in unit_test/test_cases.php in Smarty 2.6.1 allows remote attackers to execute arbitrary PHP code via a URL in the SMARTY_DIR parameter. NOTE: this issue is disputed by CVE and a third party because SMARTY_DIR is a constant
0
Attacker Value
Unknown

CVE-2006-7105

Disclosure Date: March 03, 2007 (last updated November 08, 2023)
PHP remote file inclusion vulnerability in libs/Smarty.class.php in Smarty 2.6.9 allows remote attackers to execute arbitrary PHP code via a URL in the filename parameter. NOTE: in the original disclosure, filename is used in a function definition, so this report is probably incorrect
0
Attacker Value
Unknown

CVE-2005-0913

Disclosure Date: May 02, 2005 (last updated February 22, 2025)
Unknown vulnerability in the regex_replace modifier (modifier.regex_replace.php) in Smarty before 2.6.8 allows attackers to execute arbitrary PHP code.
0