Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-8350

Опубликовано: 03 нояб. 2014
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.5

Описание

Smarty before 3.1.21 allows remote attackers to bypass the secure mode restrictions and execute arbitrary PHP code as demonstrated by "{literal}<{/literal}script language=php>" in a template.

РелизСтатусПримечание
artful

DNE

bionic

DNE

cosmic

DNE

devel

DNE

disco

DNE

esm-infra-legacy/trusty

DNE

lucid

not-affected

uses system smarty
precise

not-affected

uses system smarty
precise/esm

DNE

precise was not-affected [uses system smarty]
trusty

DNE

Показывать по

РелизСтатусПримечание
artful

not-affected

uses system smarty
bionic

not-affected

uses system smarty
cosmic

not-affected

uses system smarty
devel

not-affected

uses system smarty
disco

not-affected

uses system smarty
esm-apps/bionic

not-affected

uses system smarty
esm-apps/xenial

not-affected

uses system smarty
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [uses system smarty]]
lucid

not-affected

uses system smarty
precise

not-affected

uses system smarty

Показывать по

РелизСтатусПримечание
artful

DNE

bionic

DNE

cosmic

DNE

devel

DNE

disco

DNE

esm-infra-legacy/trusty

DNE

lucid

ignored

end of life
precise

ignored

end of life
precise/esm

DNE

precise was needed
trusty

DNE

Показывать по

РелизСтатусПримечание
artful

ignored

end of life
bionic

not-affected

3.1.21-1
cosmic

not-affected

3.1.21-1
devel

not-affected

3.1.21-1
disco

not-affected

3.1.21-1
esm-apps/bionic

not-affected

3.1.21-1
esm-apps/xenial

not-affected

3.1.21-1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was needed]
lucid

DNE

precise

ignored

end of life

Показывать по

Ссылки на источники

EPSS

Процентиль: 64%
0.00473
Низкий

7.5 High

CVSS2

Связанные уязвимости

nvd
больше 11 лет назад

Smarty before 3.1.21 allows remote attackers to bypass the secure mode restrictions and execute arbitrary PHP code as demonstrated by "{literal}<{/literal}script language=php>" in a template.

debian
больше 11 лет назад

Smarty before 3.1.21 allows remote attackers to bypass the secure mode ...

github
больше 3 лет назад

Smarty arbitrary PHP code execution

EPSS

Процентиль: 64%
0.00473
Низкий

7.5 High

CVSS2