Eval injection vulnerability in index.php in phpSlash 0.8.1.1 and previous versions allows remote malicious users to execute arbitrary PHP code via the fields parameter, which is supplied to an eval function call within the generic function in include/class/tz_env.class. NOTE: some of these details are obtained from third party information.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
phpslash phpslash 0.7.2 |
||
phpslash phpslash 0.7.1 |
||
phpslash phpslash 0.6.1 |
||
phpslash phpslash 0.8.1 |
||
phpslash phpslash 065 |
||
phpslash phpslash 0.6 |
||
phpslash phpslash |
||
phpslash phpslash 0.5.3.2 |
||
phpslash phpslash 0.6.2 |
||
phpslash phpslash 0.61 |
||
phpslash phpslash 0.8.0 |