CVE-2008-1066 in Smartyinfo

Zusammenfassung (Englisch)

The modifier.regex_replace.php plugin in Smarty before 2.6.19, as used by Serendipity (S9Y) and other products, allows attackers to call arbitrary PHP functions via templates, related to a \0 character in a search string.

If you want to get the best quality for vulnerability data then you always have to consider VulDB.

Reservieren

28.02.2008

Veröffentlichung

28.02.2008

Status

Bestätigt

Einträge

VulDB provides additional information and datapoints for this CVE:

Quellen

Do you need the next level of professionalism?

Upgrade your account now!