Total
30 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2010-4723 | 1 Smarty | 1 Smarty | 2024-02-04 | 9.3 HIGH | N/A |
Smarty before 3.0.0, when security is enabled, does not prevent access to the (1) dynamic and (2) private object members of an assigned object, which has unspecified impact and remote attack vectors. | |||||
CVE-2010-4725 | 1 Smarty | 1 Smarty | 2024-02-04 | 10.0 HIGH | N/A |
Smarty before 3.0.0 RC3 does not properly handle an on value of the asp_tags option in the php.ini file, which has unspecified impact and remote attack vectors. | |||||
CVE-2010-4727 | 1 Smarty | 1 Smarty | 2024-02-04 | 10.0 HIGH | N/A |
Smarty before 3.0.0 beta 7 does not properly handle the <?php and ?> tags, which has unspecified impact and remote attack vectors. | |||||
CVE-2010-4726 | 1 Smarty | 1 Smarty | 2024-02-04 | 10.0 HIGH | N/A |
Unspecified vulnerability in the math plugin in Smarty before 3.0.0 RC1 has unknown impact and remote attack vectors. NOTE: this might overlap CVE-2009-1669. | |||||
CVE-2010-4722 | 1 Smarty | 1 Smarty | 2024-02-04 | 10.0 HIGH | N/A |
Unspecified vulnerability in the fetch plugin in Smarty before 3.0.2 has unknown impact and remote attack vectors. | |||||
CVE-2009-1669 | 1 Smarty | 1 Smarty | 2024-02-04 | 10.0 HIGH | N/A |
The smarty_function_math function in libs/plugins/function.math.php in Smarty 2.6.22 allows context-dependent attackers to execute arbitrary commands via shell metacharacters in the equation attribute of the math function. NOTE: some of these details are obtained from third party information. | |||||
CVE-2008-4811 | 1 Smarty | 1 Smarty | 2024-02-04 | 7.5 HIGH | N/A |
The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 r2797 and earlier allows remote attackers to execute arbitrary PHP code via vectors related to templates and a \ (backslash) before a dollar-sign character. | |||||
CVE-2008-4810 | 1 Smarty | 1 Smarty | 2024-02-04 | 7.5 HIGH | N/A |
The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 before r2797 allows remote attackers to execute arbitrary PHP code via vectors related to templates and (1) a dollar-sign character, aka "php executed in templates;" and (2) a double quoted literal string, aka a "function injection security hole." NOTE: each vector affects slightly different SVN revisions. | |||||
CVE-2008-1066 | 1 Smarty | 1 Smarty | 2024-02-04 | 7.5 HIGH | N/A |
The modifier.regex_replace.php plugin in Smarty before 2.6.19, as used by Serendipity (S9Y) and other products, allows attackers to call arbitrary PHP functions via templates, related to a '\0' character in a search string. | |||||
CVE-2005-0913 | 1 Smarty | 1 Smarty | 2024-02-04 | 7.5 HIGH | N/A |
Unknown vulnerability in the regex_replace modifier (modifier.regex_replace.php) in Smarty before 2.6.8 allows attackers to execute arbitrary PHP code. |