The branch, master has been updated
via 4058bd0bd23780d16eb957812f6296c512bf3762 (commit)
from 93b17ee20ed413d79e41250f1cc55ae9961f3123 (commit)
- Log -----------------------------------------------------------------
commit 4058bd0bd23780d16eb957812f6296c512bf3762
Author: Marc Delisle <[email protected]>
Date: Mon Jul 4 07:18:01 2011 -0400
Clarification about need for token
-----------------------------------------------------------------------
Summary of changes:
templates/security/PMASA-2011-7 | 4 +++-
1 files changed, 3 insertions(+), 1 deletions(-)
diff --git a/templates/security/PMASA-2011-7 b/templates/security/PMASA-2011-7
index 294d7d7..a33048c 100644
--- a/templates/security/PMASA-2011-7
+++ b/templates/security/PMASA-2011-7
@@ -11,7 +11,7 @@ PMASA-2011-7
</py:def>
<py:def function="announcement_updated">
-2011-07-03
+2011-07-04
</py:def>
<py:def function="announcement_summary">
@@ -30,6 +30,8 @@ We consider this vulnerability to be serious.
All PHP versions that were current at the time of the advisory (5.3.6,
5.2.17) on all OS are vulnerable, unless the Suhosin patch has been
installed.
+
+An attacker must be logged in via phpMyAdmin to exploit this problem.
</py:def>
<py:def function="announcement_affected">
hooks/post-receive
--
phpMyAdmin website
------------------------------------------------------------------------------
All of the data generated in your IT infrastructure is seriously valuable.
Why? It contains a definitive record of application performance, security
threats, fraudulent activity, and more. Splunk takes this data and makes
sense of it. IT sense. And common sense.
http://p.sf.net/sfu/splunk-d2d-c2
_______________________________________________
Phpmyadmin-git mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/phpmyadmin-git