Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w343-xc9v-r5ww

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 r2797 and earlier allows remote attackers to execute arbitrary PHP code via vectors related to templates and a \ (backslash) before a dollar-sign character.

The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 r2797 and earlier allows remote attackers to execute arbitrary PHP code via vectors related to templates and a \ (backslash) before a dollar-sign character.

EPSS

Процентиль: 77%
0.01003
Низкий

Связанные уязвимости

ubuntu
больше 17 лет назад

The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 r2797 and earlier allows remote attackers to execute arbitrary PHP code via vectors related to templates and a \ (backslash) before a dollar-sign character.

nvd
больше 17 лет назад

The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 r2797 and earlier allows remote attackers to execute arbitrary PHP code via vectors related to templates and a \ (backslash) before a dollar-sign character.

debian
больше 17 лет назад

The _expand_quoted_text function in libs/Smarty_Compiler.class.php in ...

EPSS

Процентиль: 77%
0.01003
Низкий