The branch, master has been updated
       via  4058bd0bd23780d16eb957812f6296c512bf3762 (commit)
      from  93b17ee20ed413d79e41250f1cc55ae9961f3123 (commit)


- Log -----------------------------------------------------------------
commit 4058bd0bd23780d16eb957812f6296c512bf3762
Author: Marc Delisle <[email protected]>
Date:   Mon Jul 4 07:18:01 2011 -0400

    Clarification about need for token

-----------------------------------------------------------------------

Summary of changes:
 templates/security/PMASA-2011-7 |    4 +++-
 1 files changed, 3 insertions(+), 1 deletions(-)

diff --git a/templates/security/PMASA-2011-7 b/templates/security/PMASA-2011-7
index 294d7d7..a33048c 100644
--- a/templates/security/PMASA-2011-7
+++ b/templates/security/PMASA-2011-7
@@ -11,7 +11,7 @@ PMASA-2011-7
 </py:def>
 
 <py:def function="announcement_updated">
-2011-07-03
+2011-07-04
 </py:def>
 
 <py:def function="announcement_summary">
@@ -30,6 +30,8 @@ We consider this vulnerability to be serious.
 All PHP versions that were current at the time of the advisory (5.3.6,
 5.2.17) on all OS are vulnerable, unless the Suhosin patch has been
 installed.
+
+An attacker must be logged in via phpMyAdmin to exploit this problem.
 </py:def>
 
 <py:def function="announcement_affected">


hooks/post-receive
-- 
phpMyAdmin website

------------------------------------------------------------------------------
All of the data generated in your IT infrastructure is seriously valuable.
Why? It contains a definitive record of application performance, security 
threats, fraudulent activity, and more. Splunk takes this data and makes 
sense of it. IT sense. And common sense.
http://p.sf.net/sfu/splunk-d2d-c2
_______________________________________________
Phpmyadmin-git mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/phpmyadmin-git

Reply via email to