Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2008-1066
Description:The modifier.regex_replace.php plugin in Smarty before 2.6.19, as used by Serendipity (S9Y) and other products, allows attackers to call arbitrary PHP functions via templates, related to a '\0' character in a search string.
Test IDs: 1.3.6.1.4.1.25623.1.0.860796   1.3.6.1.4.1.25623.1.0.60610   1.3.6.1.4.1.25623.1.0.60572   1.3.6.1.4.1.25623.1.0.70793   1.3.6.1.4.1.25623.1.0.860627   1.3.6.1.4.1.25623.1.0.860481  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2008-1066
BugTraq ID: 28105
http://www.securityfocus.com/bid/28105
Debian Security Information: DSA-1520 (Google Search)
http://www.debian.org/security/2008/dsa-1520
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00358.html
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00298.html
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00551.html
http://security.gentoo.org/glsa/glsa-201111-04.xml
http://secunia.com/advisories/29241
http://secunia.com/advisories/29392
http://secunia.com/advisories/29398
http://secunia.com/advisories/29405
http://secunia.com/advisories/29562
http://secunia.com/advisories/29839
SuSE Security Announcement: SUSE-SR:2008:007 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00008.html
XForce ISS Database: smarty-modifierregexreplace-security-bypass(41002)
https://exchange.xforce.ibmcloud.com/vulnerabilities/41002




© 1998-2025 E-Soft Inc. All rights reserved.