Smarty before 3.1.21 allows remote attackers to bypass the secure mode restrictions and execute arbitrary PHP code as demonstrated by "{literal}<{/literal}script language=php>" in a template.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: debian
Published:
Updated: 2024-08-06T13:18:48.203Z
Reserved: 2014-10-20T00:00:00
Link: CVE-2014-8350

No data.

Status : Modified
Published: 2014-11-03T16:55:08.010
Modified: 2024-11-21T02:18:55.087
Link: CVE-2014-8350

No data.