Package: phpmyadmin
Severity: important
Tags: security

Some vulnerabilities have been reported in phpMyAdmin, some of which
have unknown impacts, while some can be exploited by malicious people to
conduct cross-site scripting attacks.

1) Input passed to unspecified parameters is not properly sanitised
before being returned to the user. This can be exploited to execute
arbitrary HTML and script code in a user's browser session in context of
an affected site.

2) Some vulnerabilities exist, which are caused due to unspecified
errors in phpMyAdmin. No further information is currently available.

The vulnerabilities are reported in version 2.9.1.1. Other versions may
also be affected.

Reference: http://secunia.com/advisories/23702

-- System Information:
Debian Release: 4.0
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-3-486
Locale: LANG=pt_BR.UTF-8, LC_CTYPE=pt_BR.UTF-8 (charmap=UTF-8)

-- 
   .''`.  
  : :' :    Alex de Oliveira Silva | enerv
  `. `'     www.enerv.net
    `- 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to