Lucene search

K

Unsafe handling of preg_replace parameters

🗓️ 23 Jun 2016 00:00:00Reported by phpMyAdminType 
phpmyadmin
 phpmyadmin
🔗 www.phpmyadmin.net👁 32 Views

Unsafe handling of preg_replace parameters, update to PHP 7.0 or newer versio

Show more
Related
Detection
Vulners
Node
softwarephpmyadminRange4.6.3

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
23 Jun 2016 00:00Current
8.4High risk
Vulners AI Score8.4
EPSS0.917
32
.json
Report