![]() ![]() Users are advised to upgrade to v4.1.6 or later. We are aware of a working exploit, which can lead to SQL injection. Remote attackers may inject auto-loadable arbitrary objects with this vulnerability, and possibly execute existing PHP code on the server. Deserialization of Untrusted Data was found in the `old()` function in CodeIgniter4. CodeIgniter is an open source PHP full-stack web framework.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |