aboutsummaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorPav Lucistnik <pav@FreeBSD.org>2004-07-01 23:55:39 +0000
committerPav Lucistnik <pav@FreeBSD.org>2004-07-01 23:55:39 +0000
commitf2d50f5392deb62f228b2f599c7d5e628007cbb2 (patch)
tree2bcec56da436f4eb1f65573c393f45626a002a44 /security
parent42aa428c90298e0752a41a3abc5dbfffb6e3c3ba (diff)
Notes
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml25
1 files changed, 25 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 4b42235ddf8d..f3c781adb774 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -3648,4 +3648,29 @@ misc.c:
<modified>2003-10-25</modified>
</dates>
</vuln>
+
+ <vuln vid="9fe115e6-cbb9-11d8-a8d4-0002b34cc336">
+ <topic>Remote code injection in phpMyAdmin</topic>
+ <affects>
+ <package>
+ <name>phpmyadmin</name>
+ <range><lt>2.5.7.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>This vulnerability would allow remote user to inject PHP code
+ to be executed by eval() function. This vulnerability is only
+ exploitable if variable $cfg['LeftFrameLight'] is set to FALSE (in
+ file config.inc.php).</p>
+ </body>
+ </description>
+ <references>
+ <url>http://www.securityfocus.com/archive/1/367486/2004-06-28/2004-07-04/0</url>
+ </references>
+ <dates>
+ <discovery>2004-06-29</discovery>
+ <entry>2004-07-02</entry>
+ </dates>
+ </vuln>
</vuxml>