����JFIF��x�x����'
Server IP : 66.29.137.217 / Your IP : 3.17.129.242 Web Server : LiteSpeed System : Linux premium294.web-hosting.com 4.18.0-513.11.1.lve.el8.x86_64 #1 SMP Thu Jan 18 16:21:02 UTC 2024 x86_64 User : gltevjme ( 1095) PHP Version : 7.0.33 Disable Function : NONE MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : ON | Sudo : OFF | Pkexec : OFF Directory : /home/gltevjme/cbt.gltechlimited.com/vendor/voku/portable-utf8/ |
Upload File : |
# Security Policy ## Supported Versions Please use the latest release you can find in the CHANGELOG.md. ## Reporting a Vulnerability Please disclose any vulnerabilities found responsibly - report any security problems found to the maintainers privately. For example you can write me a email: lars@moelleken.org ## Known vulnerabilities Portable UTF-8 versions prior to 5.4.26 (released 2019-11-05) have an open redirect vulnerability. The `Bootup::filterRequestUri()` method used a unsecure `header('Location ...` implentation. And because it's most secure to not use this method at all, I decided to disable the function by default.