Eval injection vulnerability in the template engine for SysCP 1.2.10 and earlier allows remote attackers to execute arbitrary PHP code via a string containing the code within { and } (curly bracket) characters, which are processed by the PHP eval function.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Syscp | Syscp_team | 1.2.10 (including) | 1.2.10 (including) |