FKIE_CVE-2014-8350
Vulnerability from fkie_nvd - Published: 2014-11-03 16:55 - Updated: 2025-04-12 10:46
Severity ?
Summary
Smarty before 3.1.21 allows remote attackers to bypass the secure mode restrictions and execute arbitrary PHP code as demonstrated by "{literal}<{/literal}script language=php>" in a template.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*",
"matchCriteriaId": "996AF6BF-920D-4A80-83C9-A367B7024537",
"versionEndIncluding": "3.1.20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D5FB053C-A0E3-49AF-ADF6-06A268B63061",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:1.0a:*:*:*:*:*:*:*",
"matchCriteriaId": "20D6D0EB-C680-479C-867A-13A90408E3C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:1.0b:*:*:*:*:*:*:*",
"matchCriteriaId": "C83A1128-0AE1-41F4-A836-67F16CD65DD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:1.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5A8EB346-D9D3-4EDC-A2BC-C08FE1B72183",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1C647DEF-268B-4259-9C06-A802C6688AC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:1.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D59EC271-7B08-4058-85EA-5C5B68915BC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:1.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F786C297-9711-4753-AE70-F1EC8F3DC36C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "64819A4D-5F8C-4FFF-92DD-BBFA53840043",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:1.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9B07FF05-D669-4323-B987-F8D33CF41CD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:1.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A6DEB456-742C-42A1-B96D-604ADFFB30B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EACD5727-71A3-4CFE-8F66-246B1BA378A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b1:*:*:*:*:*:*",
"matchCriteriaId": "8E7033B8-8298-497B-ADD2-4A3E73205EF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b2:*:*:*:*:*:*",
"matchCriteriaId": "AC146CA8-F777-43A8-850B-85DBCB1A1E88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:1.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DB4902CC-B3BE-4C5F-9550-F33E8DBE94EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:1.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5BEA9CF5-BB3D-47FD-91F2-24AE73388B23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:1.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "3638BE10-DA43-4821-92ED-A60FF38AEB5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:1.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "CAE038A6-11B7-4A33-A5F6-864331C72828",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:1.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "44EAF434-A6A7-460D-B138-A7DBE27963AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:1.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "E76D49D2-4D30-475D-848E-C5D7986A18CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:1.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B13B482E-D2CF-4EE7-A4BC-0E866051D6A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "96E029B3-0375-4300-AB75-7FF25ABEC03C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:1.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5289CD34-B0C5-4421-AF45-F121D1BC05A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1A405A14-0B55-4EA7-8F14-55AD784D6618",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "406D30AC-2746-4C9A-A886-6B9946C503B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4B3690F3-EEC9-4D00-B5C6-EBAFA7983E0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:2.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C1C62C2F-702C-4D6B-BA9B-36C3A84C5029",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9D459162-8F88-4187-B683-7A873CFED17A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:2.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8575FCF2-8F3B-4274-8201-D51A50C55ED9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:2.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E1DD77B1-E9BE-4386-9986-B733D9D41A09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:2.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B488FCA5-B5CA-49D7-AE78-AB5DC0039CE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:2.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7BCB54B1-99D8-4D4C-BCD5-47A34AB7540B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:2.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "979E2B4D-CDB8-41AB-AC83-476BF0858E04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:2.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "457C0F14-9FD1-4BEE-87BB-CDAE861592B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "36394FA5-1E04-4C06-A36D-2A661AED7BD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "644F6E4E-2B11-436F-A3A1-60042A7631D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:2.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F1F93CC1-7BD4-4006-BF13-3A044CF917ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "0C344438-31E7-4180-9FE4-A0C575BA3CCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "249A2041-C515-4072-8091-32E65A1F42A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "243A99DD-A54E-4D96-BF67-5853CE2FC5C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:2.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "18214825-9B27-4DF1-A715-C1B825450070",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:2.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "46D805C7-D9B9-4E3A-8A6A-0F4AD53AF0A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:2.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "15A5DCDA-32CC-4675-A1C1-E07AEFEE1491",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:2.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "31588789-D836-44F4-AD3C-26A4E071B451",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:2.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "96D8E66D-8726-460C-A60D-6F2E534AA507",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:2.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "DDCDF3E7-441D-48E2-BA45-41E11AEB7458",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:2.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "EBD88BE2-82D0-4122-95F3-B3DB85F5A31E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:2.6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "DB7094A7-426F-44D6-AD97-97A10F46A3FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:2.6.10:*:*:*:*:*:*:*",
"matchCriteriaId": "560FF27F-4899-4139-80E6-C7F6E4FAAA15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:2.6.11:*:*:*:*:*:*:*",
"matchCriteriaId": "039BD24A-B097-44AF-A145-469AE27F3B86",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:2.6.12:*:*:*:*:*:*:*",
"matchCriteriaId": "BD4087E3-9EE0-4FDD-A822-973619B51FA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:2.6.13:*:*:*:*:*:*:*",
"matchCriteriaId": "8DB44614-3BBB-4F3F-8558-D2FE258E1CDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:2.6.14:*:*:*:*:*:*:*",
"matchCriteriaId": "3488FA52-8180-42B8-9B36-EFB83051802E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:2.6.15:*:*:*:*:*:*:*",
"matchCriteriaId": "EB761B72-10D4-4E8F-8E2E-C0D9F1D07E1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:2.6.16:*:*:*:*:*:*:*",
"matchCriteriaId": "AE7458AC-3220-45B1-AA56-F7B82688105A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:2.6.17:*:*:*:*:*:*:*",
"matchCriteriaId": "E8AAAB3C-403D-4912-884A-4D258AA03698",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:2.6.18:*:*:*:*:*:*:*",
"matchCriteriaId": "EEE3397B-7AF2-418F-8A07-7CF9A9CA8558",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:2.6.20:*:*:*:*:*:*:*",
"matchCriteriaId": "351FAC14-8538-480C-8A8D-4E3E422EB00D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:2.6.22:*:*:*:*:*:*:*",
"matchCriteriaId": "7B95000D-10A0-4D15-946E-24E432C6A464",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:2.6.24:*:*:*:*:*:*:*",
"matchCriteriaId": "EFA96BC2-78D3-4052-8AFA-F679E3FDF6A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:2.6.25:*:*:*:*:*:*:*",
"matchCriteriaId": "DF85AE00-A22D-4B57-B9BF-CDAF5B6B4B4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:2.6.26:*:*:*:*:*:*:*",
"matchCriteriaId": "E5B9A3AD-53C7-4844-B01E-085906C54F77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F60BF56B-7165-456C-B7D1-AF6E869B7337",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "DD3C622D-56F3-422B-AD47-A4256A22D127",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta5:*:*:*:*:*:*",
"matchCriteriaId": "7C5F04CB-E990-49CF-97FD-ADE86C5BBC59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta6:*:*:*:*:*:*",
"matchCriteriaId": "947BF560-DA03-4688-A31B-F9FA3323113C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta7:*:*:*:*:*:*",
"matchCriteriaId": "F3E0F000-17CC-4240-B7A2-23D403856CCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta8:*:*:*:*:*:*",
"matchCriteriaId": "D968667D-FB0C-4AE8-8275-959F7A96B2E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "B785A65E-3EB4-4E6E-8238-E1312D3692A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "53A4DCB2-AD64-4BD8-99AD-5D8AEB42240A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "A46B316A-0D93-4B17-AFF7-C52FFFF361FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc4:*:*:*:*:*:*",
"matchCriteriaId": "3DC9CDED-796C-4081-83DD-7AE59700FF39",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0AA427E6-AE83-4227-B45B-BD84569ACA2C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8C8DB2D9-9D3D-4F01-869F-AA5BEB2891DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:3.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9FE6E86E-623A-4136-9945-1E99629916B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:3.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9A55A97A-FD19-4385-92D7-D511D53EE38C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:3.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8F7BBD2A-45A1-4C98-9C73-DBBF2161BE29",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:3.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "0CB86C08-AE24-4B3C-90FE-917996A0A48C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:3.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "DADDE896-B711-4ECD-B560-E9665B178173",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:3.1:rc1:*:*:*:*:*:*",
"matchCriteriaId": "293032B8-72CB-4201-901E-3A70613B7518",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA2F1ACE-C3BD-4DEA-A317-38CD4928A781",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "469D55FF-5436-4000-8FF3-B3761761A429",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "34C390AB-D6A6-4ABF-AA1E-A9294AC2FD70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:3.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "21D02454-647C-43B9-9DAC-A0306FB52F36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:3.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FF0159CD-A5A9-4C7A-9EDC-9A6BC8740847",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:3.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "AB73E7D4-A784-41EF-8DC8-3BF9245A549D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:3.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "0BD8A9C9-FFA8-46E8-874C-F5A31A785102",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:3.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "FE74F83B-33BB-4303-A022-51422BFBB8C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:3.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "D780E5BB-4DC5-4E7C-A1B5-FE6E9E75B5D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:3.1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "0CE55049-426E-4B43-8A55-A643B423A921",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:3.1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "88CDDA12-5690-442E-A893-47E9E2E60617",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:3.1.11:*:*:*:*:*:*:*",
"matchCriteriaId": "D731309D-2418-4382-B565-E74C4593527F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:3.1.12:*:*:*:*:*:*:*",
"matchCriteriaId": "3C9A9770-5A48-45D8-A3E3-16867CED4B2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:3.1.13:*:*:*:*:*:*:*",
"matchCriteriaId": "2F9C2F03-33E0-4A2B-B363-68DC3337AF22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:3.1.14:*:*:*:*:*:*:*",
"matchCriteriaId": "5346D673-2803-4F22-A66F-3398D0999816",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:3.1.15:*:*:*:*:*:*:*",
"matchCriteriaId": "05ECDD17-2C52-4C74-99C5-7047C56B6DCA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:3.1.16:*:*:*:*:*:*:*",
"matchCriteriaId": "2E3A977F-9F73-401E-AD8E-A165F5BEE622",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:3.1.17:*:*:*:*:*:*:*",
"matchCriteriaId": "3718C076-3A47-46F6-A780-A4FF7FC03062",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:3.1.18:*:*:*:*:*:*:*",
"matchCriteriaId": "BC520821-A9AA-47BB-A771-DFF0692A77C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:smarty:smarty:3.1.19:*:*:*:*:*:*:*",
"matchCriteriaId": "C211F361-2A62-4D69-ADDA-657417657EFC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Smarty before 3.1.21 allows remote attackers to bypass the secure mode restrictions and execute arbitrary PHP code as demonstrated by \"{literal}\u003c{/literal}script language=php\u003e\" in a template."
},
{
"lang": "es",
"value": "Smarty anterior a 3.1.21 permite a atacantes remotos evadir las restricciones del modo seguro y ejecutar c\u00f3digo PHP arbitrario tal y como fue demostrado por \u0027{literal}\u003c{/literal}script language=php\u003e\u0027 en una plantilla."
}
],
"id": "CVE-2014-8350",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-11-03T16:55:08.010",
"references": [
{
"source": "security@debian.org",
"url": "http://advisories.mageia.org/MGASA-2014-0468.html"
},
{
"source": "security@debian.org",
"tags": [
"Exploit"
],
"url": "http://seclists.org/oss-sec/2014/q4/420"
},
{
"source": "security@debian.org",
"tags": [
"Exploit"
],
"url": "http://seclists.org/oss-sec/2014/q4/421"
},
{
"source": "security@debian.org",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:221"
},
{
"source": "security@debian.org",
"url": "http://www.securityfocus.com/bid/70708"
},
{
"source": "security@debian.org",
"tags": [
"Exploit"
],
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=765920"
},
{
"source": "security@debian.org",
"url": "https://code.google.com/p/smarty-php/source/browse/trunk/distribution/change_log.txt?r=4902"
},
{
"source": "security@debian.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97725"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://advisories.mageia.org/MGASA-2014-0468.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://seclists.org/oss-sec/2014/q4/420"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://seclists.org/oss-sec/2014/q4/421"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:221"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/70708"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=765920"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://code.google.com/p/smarty-php/source/browse/trunk/distribution/change_log.txt?r=4902"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97725"
}
],
"sourceIdentifier": "security@debian.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-94"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…