First published: Tue May 17 2022(Updated: )
PHP Code Injection by malicious block or filename
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/smarty/smarty | <3.1.45>=4.0.0<4.1.1 | |
Smarty Smarty | <3.1.45 | |
Smarty Smarty | >=4.0.0<4.1.1 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
Fedoraproject Fedora | =36 | |
Fedoraproject Fedora | =37 | |
debian/smarty3 | 3.1.33+20180830.1.3a78a21f+selfpack1-1+deb10u1 3.1.33+20180830.1.3a78a21f+selfpack1-1+deb10u2 3.1.39-2+deb11u1 3.1.47-2 3.1.48-1 | |
debian/smarty4 | 4.3.0-1+deb12u1 4.3.1-1 | |
ubuntu/postfixadmin | <3.0.2-2ubuntu0.1~ | 3.0.2-2ubuntu0.1~ |
ubuntu/postfixadmin | <3.2.1-3ubuntu0.1~ | 3.2.1-3ubuntu0.1~ |
ubuntu/postfixadmin | <3.3.10-2ubuntu0.1~ | 3.3.10-2ubuntu0.1~ |
ubuntu/smarty3 | <3.1.39-2ubuntu1.22.04.1 | 3.1.39-2ubuntu1.22.04.1 |
ubuntu/smarty3 | <3.1.39-2ubuntu1.22.10.1 | 3.1.39-2ubuntu1.22.10.1 |
ubuntu/smarty3 | <3.1.39-2ubuntu2 | 3.1.39-2ubuntu2 |
ubuntu/smarty3 | <3.1.39-2ubuntu2 | 3.1.39-2ubuntu2 |
ubuntu/smarty3 | <3.1.39-2ubuntu2 | 3.1.39-2ubuntu2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.