Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=2a7bc0f7f7771d857a6c7c389074d6f019b452ab
commit 2a7bc0f7f7771d857a6c7c389074d6f019b452ab Author: Miklos Vajna <[email protected]> Date: Mon Mar 1 20:19:21 2010 +0100 FSA626-phpmyadmin diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml index 62b9353..85e3116 100644 --- a/frugalware/xml/security.xml +++ b/frugalware/xml/security.xml @@ -26,6 +26,20 @@ <fsas> <fsa> + <id>626</id> + <date>2010-03-01</date> + <author>Miklos Vajna</author> + <package>phpmyadmin</package> + <vulnerable>3.2.0.1-1</vulnerable> + <unaffected>3.2.2.1-1getorin1</unaffected> + <bts>http://bugs.frugalware.org/task/3996</bts> + <cve>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3696 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3697</cve> + <desc>Some vulnerabilities have been reported in phpMyAdmin, which can be exploited by malicious users to conduct script insertion and SQL injection attacks. + 1) Input used as the MySQL table name is not properly sanitised before being used. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user's browser session in context of an affected site when the malicious data is being viewed. + 2) Input passed to various parameters of the PDF schema generator feature is not properly sanitised before being used. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.</desc> + </fsa> + <fsa> <id>625</id> <date>2009-12-09</date> <author>Miklos Vajna</author> _______________________________________________ Frugalware-git mailing list [email protected] http://frugalware.org/mailman/listinfo/frugalware-git
