cve-2012-4437
Vulnerability from cvelistv5
Published
2012-10-01 01:00
Modified
2024-08-06 20:35
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in the SmartyException class in Smarty (aka smarty-php) before 3.1.12 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors that trigger a Smarty exception.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:35:09.815Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20120919 CVE Request Smarty / php-Smarty: XSS in Smarty exception messages", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/09/19/1" }, { "name": "FEDORA-2012-14578", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088138.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://code.google.com/p/smarty-php/source/browse/trunk/distribution/change_log.txt" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://advisories.mageia.org/MGASA-2014-0468.html" }, { "name": "50589", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/50589" }, { "name": "MDVSA-2014:221", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:221" }, { "name": "JVNDB-2012-000094", "tags": [ "third-party-advisory", "x_refsource_JVNDB", "x_transferred" ], "url": "http://jvndb.jvn.jp/ja/contents/2012/JVNDB-2012-000094.html" }, { "name": "JVN#63650108", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN63650108/index.html" }, { "name": "[oss-security] 20120919 Re: CVE Request Smarty / php-Smarty: XSS in Smarty exception messages", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/09/20/3" }, { "name": "55506", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/55506" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://code.google.com/p/smarty-php/source/detail?r=4658" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-09-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the SmartyException class in Smarty (aka smarty-php) before 3.1.12 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors that trigger a Smarty exception." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-03-19T15:57:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[oss-security] 20120919 CVE Request Smarty / php-Smarty: XSS in Smarty exception messages", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/09/19/1" }, { "name": "FEDORA-2012-14578", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088138.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://code.google.com/p/smarty-php/source/browse/trunk/distribution/change_log.txt" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://advisories.mageia.org/MGASA-2014-0468.html" }, { "name": "50589", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/50589" }, { "name": "MDVSA-2014:221", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:221" }, { "name": "JVNDB-2012-000094", "tags": [ "third-party-advisory", "x_refsource_JVNDB" ], "url": "http://jvndb.jvn.jp/ja/contents/2012/JVNDB-2012-000094.html" }, { "name": "JVN#63650108", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN63650108/index.html" }, { "name": "[oss-security] 20120919 Re: CVE Request Smarty / php-Smarty: XSS in Smarty exception messages", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/09/20/3" }, { "name": "55506", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/55506" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://code.google.com/p/smarty-php/source/detail?r=4658" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-4437", "datePublished": "2012-10-01T01:00:00", "dateReserved": "2012-08-21T00:00:00", "dateUpdated": "2024-08-06T20:35:09.815Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2012-4437\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2012-10-01T03:26:16.413\",\"lastModified\":\"2024-11-21T01:42:53.733\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Cross-site scripting (XSS) vulnerability in the SmartyException class in Smarty (aka smarty-php) before 3.1.12 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors that trigger a Smarty exception.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en la clase SmartyException en Smarty (tambi\u00e9n conocido como smarty-php), antes de v3.1.12, permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de vectores no especificados que desencadenan una excepci\u00f3n Smarty.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5FB053C-A0E3-49AF-ADF6-06A268B63061\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:1.0a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20D6D0EB-C680-479C-867A-13A90408E3C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:1.0b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C83A1128-0AE1-41F4-A836-67F16CD65DD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:1.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A8EB346-D9D3-4EDC-A2BC-C08FE1B72183\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:1.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C647DEF-268B-4259-9C06-A802C6688AC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:1.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D59EC271-7B08-4058-85EA-5C5B68915BC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:1.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F786C297-9711-4753-AE70-F1EC8F3DC36C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:1.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64819A4D-5F8C-4FFF-92DD-BBFA53840043\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:1.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B07FF05-D669-4323-B987-F8D33CF41CD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:1.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6DEB456-742C-42A1-B96D-604ADFFB30B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:1.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EACD5727-71A3-4CFE-8F66-246B1BA378A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:1.4.0:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E7033B8-8298-497B-ADD2-4A3E73205EF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:1.4.0:b2:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC146CA8-F777-43A8-850B-85DBCB1A1E88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:1.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB4902CC-B3BE-4C5F-9550-F33E8DBE94EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:1.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BEA9CF5-BB3D-47FD-91F2-24AE73388B23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:1.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3638BE10-DA43-4821-92ED-A60FF38AEB5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:1.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAE038A6-11B7-4A33-A5F6-864331C72828\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:1.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44EAF434-A6A7-460D-B138-A7DBE27963AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:1.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E76D49D2-4D30-475D-848E-C5D7986A18CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:1.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B13B482E-D2CF-4EE7-A4BC-0E866051D6A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:1.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96E029B3-0375-4300-AB75-7FF25ABEC03C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:1.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5289CD34-B0C5-4421-AF45-F121D1BC05A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A405A14-0B55-4EA7-8F14-55AD784D6618\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"406D30AC-2746-4C9A-A886-6B9946C503B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:2.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B3690F3-EEC9-4D00-B5C6-EBAFA7983E0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:2.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1C62C2F-702C-4D6B-BA9B-36C3A84C5029\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:2.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D459162-8F88-4187-B683-7A873CFED17A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:2.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8575FCF2-8F3B-4274-8201-D51A50C55ED9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:2.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1DD77B1-E9BE-4386-9986-B733D9D41A09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:2.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B488FCA5-B5CA-49D7-AE78-AB5DC0039CE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:2.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BCB54B1-99D8-4D4C-BCD5-47A34AB7540B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:2.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"979E2B4D-CDB8-41AB-AC83-476BF0858E04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:2.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"457C0F14-9FD1-4BEE-87BB-CDAE861592B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:2.5.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"36394FA5-1E04-4C06-A36D-2A661AED7BD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:2.5.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"644F6E4E-2B11-436F-A3A1-60042A7631D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:2.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1F93CC1-7BD4-4006-BF13-3A044CF917ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:2.6.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C344438-31E7-4180-9FE4-A0C575BA3CCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:2.6.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"249A2041-C515-4072-8091-32E65A1F42A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:2.6.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"243A99DD-A54E-4D96-BF67-5853CE2FC5C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:2.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18214825-9B27-4DF1-A715-C1B825450070\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:2.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46D805C7-D9B9-4E3A-8A6A-0F4AD53AF0A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:2.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15A5DCDA-32CC-4675-A1C1-E07AEFEE1491\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:2.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31588789-D836-44F4-AD3C-26A4E071B451\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:2.6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96D8E66D-8726-460C-A60D-6F2E534AA507\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:2.6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDCDF3E7-441D-48E2-BA45-41E11AEB7458\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:2.6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBD88BE2-82D0-4122-95F3-B3DB85F5A31E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:2.6.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB7094A7-426F-44D6-AD97-97A10F46A3FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:2.6.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"560FF27F-4899-4139-80E6-C7F6E4FAAA15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:2.6.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"039BD24A-B097-44AF-A145-469AE27F3B86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:2.6.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD4087E3-9EE0-4FDD-A822-973619B51FA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:2.6.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DB44614-3BBB-4F3F-8558-D2FE258E1CDF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:2.6.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3488FA52-8180-42B8-9B36-EFB83051802E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:2.6.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB761B72-10D4-4E8F-8E2E-C0D9F1D07E1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:2.6.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE7458AC-3220-45B1-AA56-F7B82688105A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:2.6.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8AAAB3C-403D-4912-884A-4D258AA03698\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:2.6.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEE3397B-7AF2-418F-8A07-7CF9A9CA8558\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:2.6.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"351FAC14-8538-480C-8A8D-4E3E422EB00D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:2.6.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B95000D-10A0-4D15-946E-24E432C6A464\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:2.6.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFA96BC2-78D3-4052-8AFA-F679E3FDF6A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:2.6.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF85AE00-A22D-4B57-B9BF-CDAF5B6B4B4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:2.6.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5B9A3AD-53C7-4844-B01E-085906C54F77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:3.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F60BF56B-7165-456C-B7D1-AF6E869B7337\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:3.0.0:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD3C622D-56F3-422B-AD47-A4256A22D127\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:3.0.0:beta5:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C5F04CB-E990-49CF-97FD-ADE86C5BBC59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:3.0.0:beta6:*:*:*:*:*:*\",\"matchCriteriaId\":\"947BF560-DA03-4688-A31B-F9FA3323113C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:3.0.0:beta7:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3E0F000-17CC-4240-B7A2-23D403856CCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:3.0.0:beta8:*:*:*:*:*:*\",\"matchCriteriaId\":\"D968667D-FB0C-4AE8-8275-959F7A96B2E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:3.0.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B785A65E-3EB4-4E6E-8238-E1312D3692A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:3.0.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"53A4DCB2-AD64-4BD8-99AD-5D8AEB42240A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:3.0.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"A46B316A-0D93-4B17-AFF7-C52FFFF361FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:3.0.0:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DC9CDED-796C-4081-83DD-7AE59700FF39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:3.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AA427E6-AE83-4227-B45B-BD84569ACA2C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:3.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C8DB2D9-9D3D-4F01-869F-AA5BEB2891DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:3.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FE6E86E-623A-4136-9945-1E99629916B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:3.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A55A97A-FD19-4385-92D7-D511D53EE38C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:3.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F7BBD2A-45A1-4C98-9C73-DBBF2161BE29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:3.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CB86C08-AE24-4B3C-90FE-917996A0A48C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:3.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DADDE896-B711-4ECD-B560-E9665B178173\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:3.1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"293032B8-72CB-4201-901E-3A70613B7518\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:3.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA2F1ACE-C3BD-4DEA-A317-38CD4928A781\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:3.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"469D55FF-5436-4000-8FF3-B3761761A429\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:3.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34C390AB-D6A6-4ABF-AA1E-A9294AC2FD70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:3.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21D02454-647C-43B9-9DAC-A0306FB52F36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:3.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF0159CD-A5A9-4C7A-9EDC-9A6BC8740847\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:3.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB73E7D4-A784-41EF-8DC8-3BF9245A549D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:3.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BD8A9C9-FFA8-46E8-874C-F5A31A785102\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:3.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE74F83B-33BB-4303-A022-51422BFBB8C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:3.1.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D780E5BB-4DC5-4E7C-A1B5-FE6E9E75B5D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:3.1.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CE55049-426E-4B43-8A55-A643B423A921\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:3.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88CDDA12-5690-442E-A893-47E9E2E60617\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smarty:smarty:3.1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D731309D-2418-4382-B565-E74C4593527F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:smarty:smarty:3.1.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C9A9770-5A48-45D8-A3E3-16867CED4B2F\"}]}]}],\"references\":[{\"url\":\"http://advisories.mageia.org/MGASA-2014-0468.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://code.google.com/p/smarty-php/source/browse/trunk/distribution/change_log.txt\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://code.google.com/p/smarty-php/source/detail?r=4658\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://jvn.jp/en/jp/JVN63650108/index.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://jvndb.jvn.jp/ja/contents/2012/JVNDB-2012-000094.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088138.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/50589\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2014:221\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2012/09/19/1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2012/09/20/3\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/55506\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://advisories.mageia.org/MGASA-2014-0468.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://code.google.com/p/smarty-php/source/browse/trunk/distribution/change_log.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://code.google.com/p/smarty-php/source/detail?r=4658\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://jvn.jp/en/jp/JVN63650108/index.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://jvndb.jvn.jp/ja/contents/2012/JVNDB-2012-000094.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088138.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/50589\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2014:221\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2012/09/19/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2012/09/20/3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/55506\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.