Package: phpmyadmin Severity: important Tags: security Some vulnerabilities have been reported in phpMyAdmin, some of which have unknown impacts, while some can be exploited by malicious people to conduct cross-site scripting attacks.
1) Input passed to unspecified parameters is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. 2) Some vulnerabilities exist, which are caused due to unspecified errors in phpMyAdmin. No further information is currently available. The vulnerabilities are reported in version 2.9.1.1. Other versions may also be affected. Reference: http://secunia.com/advisories/23702 -- System Information: Debian Release: 4.0 APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.18-3-486 Locale: LANG=pt_BR.UTF-8, LC_CTYPE=pt_BR.UTF-8 (charmap=UTF-8) -- .''`. : :' : Alex de Oliveira Silva | enerv `. `' www.enerv.net `- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

