[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250363

 
 

909

 
 

196124

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-1520 smarty -- insufficient input sanitising

ID: oval:org.mitre.oval:def:7776Date: (C)2009-12-15   (M)2021-09-11
Class: PATCHFamily: unix




It was discovered that the regex module in Smarty, a PHP templating engine, allows attackers to call arbitrary PHP functions via templates using the regex_replace plugin by a specially crafted search string.

Platform:
Debian 4.0
Debian 3.1
Product:
smarty
Reference:
DSA-1520
CVE-2008-1066
CVE    1
CVE-2008-1066
CPE    2
cpe:/o:debian:debian_linux:3.1
cpe:/o:debian:debian_linux:4.0

© SecPod Technologies