{ "schema_version": "1.4.0", "id": "GHSA-7m27-r66m-w4p6", "modified": "2022-05-01T02:09:32Z", "published": "2022-05-01T02:09:32Z", "aliases": [ "CVE-2005-2568" ], "details": "Eval injection vulnerability in the template engine for SysCP 1.2.10 and earlier allows remote attackers to execute arbitrary PHP code via a string containing the code within \"{\" and \"}\" (curly bracket) characters, which are processed by the PHP eval function.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2568" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq&m=112352095923614&w=2" }, { "type": "WEB", "url": "http://www.hardened-php.net/advisory_132005.64.html" }, { "type": "WEB", "url": "http://www.syscp.de/forum/viewtopic.php?t=1772" } ], "database_specific": { "cwe_ids": [], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2005-08-16T04:00:00Z" } }