[Phpmyadmin-git] [SCM] phpMyAdmin website branch, master, updated. 4058bd0bd23780d16eb957812f6296c512bf3762
Marc Delisle
lem9 at users.sourceforge.net
Mon Jul 4 13:18:11 CEST 2011
The branch, master has been updated
via 4058bd0bd23780d16eb957812f6296c512bf3762 (commit)
from 93b17ee20ed413d79e41250f1cc55ae9961f3123 (commit)
- Log -----------------------------------------------------------------
commit 4058bd0bd23780d16eb957812f6296c512bf3762
Author: Marc Delisle <marc at infomarc.info>
Date: Mon Jul 4 07:18:01 2011 -0400
Clarification about need for token
-----------------------------------------------------------------------
Summary of changes:
templates/security/PMASA-2011-7 | 4 +++-
1 files changed, 3 insertions(+), 1 deletions(-)
diff --git a/templates/security/PMASA-2011-7 b/templates/security/PMASA-2011-7
index 294d7d7..a33048c 100644
--- a/templates/security/PMASA-2011-7
+++ b/templates/security/PMASA-2011-7
@@ -11,7 +11,7 @@ PMASA-2011-7
</py:def>
<py:def function="announcement_updated">
-2011-07-03
+2011-07-04
</py:def>
<py:def function="announcement_summary">
@@ -30,6 +30,8 @@ We consider this vulnerability to be serious.
All PHP versions that were current at the time of the advisory (5.3.6,
5.2.17) on all OS are vulnerable, unless the Suhosin patch has been
installed.
+
+An attacker must be logged in via phpMyAdmin to exploit this problem.
</py:def>
<py:def function="announcement_affected">
hooks/post-receive
--
phpMyAdmin website
More information about the Git
mailing list