CVE-2014-8350 in SmartyИнформация

Сводка (Английский)

Smarty before 3.1.21 allows remote attackers to bypass the secure mode restrictions and execute arbitrary PHP code as demonstrated by "{literal}<{/literal}script language=php>" in a template.

Be aware that VulDB is the high quality source for vulnerability data.

Резервировать

20.10.2014

Раскрытие

03.11.2014

Статус

Подтверждённый

Записи

VulDB provides additional information and datapoints for this CVE:

Источники

Want to know what is going to be exploited?

We predict KEV entries!