Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2005-0913
Unknown vulnerability in the regex_replace modifier (modifier.regex_replace.php) in Smarty before 2.6.8 allows attackers to execute arbitrary PHP code.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.009
EPSS Ranking
74.7%
CVSS Severity
CVSS v2 Score
7.5
References
http://news.php.net/php.smarty.dev/2673
http://secunia.com/advisories/14729/
http://security.gentoo.org/glsa/glsa-200503-35.xml
http://securitytracker.com/id?1013556
http://www.securityfocus.com/bid/12941
https://exchange.xforce.ibmcloud.com/vulnerabilities/19880
http://news.php.net/php.smarty.dev/2673
http://secunia.com/advisories/14729/
http://security.gentoo.org/glsa/glsa-200503-35.xml
http://securitytracker.com/id?1013556
http://www.securityfocus.com/bid/12941
https://exchange.xforce.ibmcloud.com/vulnerabilities/19880
Products affected by CVE-2005-0913
Smarty
»
Smarty
»
Version:
2.6.2
cpe:2.3:a:smarty:smarty:2.6.2
Smarty
»
Smarty
»
Version:
2.6.3
cpe:2.3:a:smarty:smarty:2.6.3
Smarty
»
Smarty
»
Version:
2.6.4
cpe:2.3:a:smarty:smarty:2.6.4
Smarty
»
Smarty
»
Version:
2.6.5
cpe:2.3:a:smarty:smarty:2.6.5
Smarty
»
Smarty
»
Version:
2.6.6
cpe:2.3:a:smarty:smarty:2.6.6
Smarty
»
Smarty
»
Version:
2.6.7
cpe:2.3:a:smarty:smarty:2.6.7
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved