Package: smarty
Severity: important

Hello,

I was looking into Smarty today and noticed that at

http://smarty.php.net/

is this note.

[21-March-2005] For those using template security: A vulnerability in
the regex_replace modifier has been fixed that allowed PHP code to be
executed from a template, even with template security enabled. If you
are using template security features, it is highly recommended to
upgrade, or at least replace the modifier plugin. A problem with the
{strip}{/strip} tags (that was introduced in 2.6.7) has been
fixed. Casting objects to arrays in the {foreach} "item" attribute has
been addressed.

Regards,
Blair Zajac

-- System Information:
Debian Release: 3.1
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)
Kernel: Linux 2.6.8-2-686
Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to