Filtered by vendor Smarty
Subscriptions
Total
31 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2010-4723 | 1 Smarty | 1 Smarty | 2024-11-21 | N/A |
Smarty before 3.0.0, when security is enabled, does not prevent access to the (1) dynamic and (2) private object members of an assigned object, which has unspecified impact and remote attack vectors. | ||||
CVE-2010-4722 | 1 Smarty | 1 Smarty | 2024-11-21 | N/A |
Unspecified vulnerability in the fetch plugin in Smarty before 3.0.2 has unknown impact and remote attack vectors. | ||||
CVE-2009-5054 | 1 Smarty | 1 Smarty | 2024-11-21 | N/A |
Smarty before 3.0.0 beta 4 does not consider the umask value when setting the permissions of files, which might allow attackers to bypass intended access restrictions via standard filesystem operations. | ||||
CVE-2009-5053 | 1 Smarty | 1 Smarty | 2024-11-21 | N/A |
Unspecified vulnerability in Smarty before 3.0.0 beta 6 allows remote attackers to execute arbitrary PHP code by injecting this code into a cache file. | ||||
CVE-2009-5052 | 1 Smarty | 1 Smarty | 2024-11-21 | N/A |
Multiple unspecified vulnerabilities in Smarty before 3.0.0 beta 6 have unknown impact and attack vectors. | ||||
CVE-2009-1669 | 1 Smarty | 1 Smarty | 2024-11-21 | N/A |
The smarty_function_math function in libs/plugins/function.math.php in Smarty 2.6.22 allows context-dependent attackers to execute arbitrary commands via shell metacharacters in the equation attribute of the math function. NOTE: some of these details are obtained from third party information. | ||||
CVE-2008-4811 | 1 Smarty | 1 Smarty | 2024-11-21 | N/A |
The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 r2797 and earlier allows remote attackers to execute arbitrary PHP code via vectors related to templates and a \ (backslash) before a dollar-sign character. | ||||
CVE-2008-4810 | 1 Smarty | 1 Smarty | 2024-11-21 | N/A |
The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 before r2797 allows remote attackers to execute arbitrary PHP code via vectors related to templates and (1) a dollar-sign character, aka "php executed in templates;" and (2) a double quoted literal string, aka a "function injection security hole." NOTE: each vector affects slightly different SVN revisions. | ||||
CVE-2008-1066 | 1 Smarty | 1 Smarty | 2024-11-21 | N/A |
The modifier.regex_replace.php plugin in Smarty before 2.6.19, as used by Serendipity (S9Y) and other products, allows attackers to call arbitrary PHP functions via templates, related to a '\0' character in a search string. | ||||
CVE-2006-7193 | 1 Smarty | 1 Smarty | 2024-11-21 | N/A |
PHP remote file inclusion vulnerability in unit_test/test_cases.php in Smarty 2.6.1 allows remote attackers to execute arbitrary PHP code via a URL in the SMARTY_DIR parameter. NOTE: this issue is disputed by CVE and a third party because SMARTY_DIR is a constant | ||||
CVE-2005-0913 | 1 Smarty | 1 Smarty | 2024-11-20 | N/A |
Unknown vulnerability in the regex_replace modifier (modifier.regex_replace.php) in Smarty before 2.6.8 allows attackers to execute arbitrary PHP code. |