Originally Posted by siemaeniu500
So why it exist?
You can do what you like I'm just giving you advice as a professional. A simple search in the National Vulnerability Database
is proof enough. Most script kiddie toolkits come with exploits to software like phpmyadmin, webmin, etc. If you still insist on using it then I highly recommend you learning how to secure it. Here's a few tips from a website
. Personally, I wouldn't run it and simply use MySQL directly from the CLI with a firewall enabled on the serving ports.
Just because it exists does not mean it is the best tool to use.