CVE-2014-8350 in Smartyinfo

Zusammenfassung (Englisch)

Smarty before 3.1.21 allows remote attackers to bypass the secure mode restrictions and execute arbitrary PHP code as demonstrated by "{literal}<{/literal}script language=php>" in a template.

Be aware that VulDB is the high quality source for vulnerability data.

Reservieren

20.10.2014

Veröffentlichung

03.11.2014

Status

Bestätigt

Einträge

VulDB provides additional information and datapoints for this CVE:

Quellen

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!