Количество 6
Количество 6

CVE-2024-35226
Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. In affected versions template authors could inject php code by choosing a malicious file name for an extends-tag. Sites that cannot fully trust template authors should update asap. All users are advised to update. There is no patch for users on the v3 branch. There are no known workarounds for this vulnerability.

CVE-2024-35226
Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. In affected versions template authors could inject php code by choosing a malicious file name for an extends-tag. Sites that cannot fully trust template authors should update asap. All users are advised to update. There is no patch for users on the v3 branch. There are no known workarounds for this vulnerability.
CVE-2024-35226
Smarty is a template engine for PHP, facilitating the separation of pr ...

ROS-20250212-09
Уязвимость postfixadmin
GHSA-4rmg-292m-wg3w
Smarty vulnerable to PHP Code Injection by malicious attribute in extends-tag

BDU:2025-03330
Уязвимость шаблонизатора для PHP Smarty, связанная с неверным управлением генерацией кода, позволяющая нарушителю выполнить произвольный PHP-код
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2024-35226 Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. In affected versions template authors could inject php code by choosing a malicious file name for an extends-tag. Sites that cannot fully trust template authors should update asap. All users are advised to update. There is no patch for users on the v3 branch. There are no known workarounds for this vulnerability. | CVSS3: 7.3 | 0% Низкий | около 1 года назад |
![]() | CVE-2024-35226 Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. In affected versions template authors could inject php code by choosing a malicious file name for an extends-tag. Sites that cannot fully trust template authors should update asap. All users are advised to update. There is no patch for users on the v3 branch. There are no known workarounds for this vulnerability. | CVSS3: 7.3 | 0% Низкий | около 1 года назад |
CVE-2024-35226 Smarty is a template engine for PHP, facilitating the separation of pr ... | CVSS3: 7.3 | 0% Низкий | около 1 года назад | |
![]() | ROS-20250212-09 Уязвимость postfixadmin | CVSS3: 7.3 | 0% Низкий | 4 месяца назад |
GHSA-4rmg-292m-wg3w Smarty vulnerable to PHP Code Injection by malicious attribute in extends-tag | CVSS3: 7.3 | 0% Низкий | около 1 года назад | |
![]() | BDU:2025-03330 Уязвимость шаблонизатора для PHP Smarty, связанная с неверным управлением генерацией кода, позволяющая нарушителю выполнить произвольный PHP-код | CVSS3: 7.3 | 0% Низкий | около 1 года назад |
Уязвимостей на страницу