CVE-2014-8350 in Smarty信息

摘要 (英语)

Smarty before 3.1.21 allows remote attackers to bypass the secure mode restrictions and execute arbitrary PHP code as demonstrated by "{literal}<{/literal}script language=php>" in a template.

Be aware that VulDB is the high quality source for vulnerability data.

预定

2014-10-20

披露

2014-11-03

状态

已确认

条目

VulDB provides additional information and datapoints for this CVE:

标识符漏洞CWE可利用对策CVE
72782Smarty 权限提升94未定义官方修复CVE-2014-8350

来源

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!