Unsafe handling of preg_replace parameters, update to PHP 7.0 or newer versio
Reporter | Title | Published | Views | Family All 30 |
---|---|---|---|---|
seebug.org | PhpMyAdmin 4.3.0—4.6.2 authorized users remote command execution vulnerability | 1 Aug 201600:00 | – | seebug |
Packet Storm | phpMyAdmin 4.x Remote Code Execution | 18 Jun 201800:00 | – | packetstorm |
Metasploit | phpMyAdmin Authenticated Remote Code Execution | 18 Jun 201812:33 | – | metasploit |
Check Point Advisories | Web Servers PHPMyAdmin Remote Code Execution (CVE-2016-5734) | 19 Jun 201800:00 | – | checkpoint_advisories |
0day.today | phpMyAdmin 4.x Remote Code Execution Exploit | 19 Jun 201800:00 | – | zdt |
0day.today | phpMyAdmin 4.6.2 - Authenticated Remote Code Execution | 29 Jul 201600:00 | – | zdt |
Cvelist | CVE-2016-5734 | 3 Jul 201601:00 | – | cvelist |
Prion | Design/Logic Flaw | 3 Jul 201601:59 | – | prion |
Exploit DB | phpMyAdmin 4.6.2 - (Authenticated) Remote Code Execution | 29 Jul 201600:00 | – | exploitdb |
CVE | CVE-2016-5734 | 3 Jul 201601:59 | – | cve |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo