diff options
author | Pav Lucistnik <pav@FreeBSD.org> | 2004-07-01 23:55:39 +0000 |
---|---|---|
committer | Pav Lucistnik <pav@FreeBSD.org> | 2004-07-01 23:55:39 +0000 |
commit | f2d50f5392deb62f228b2f599c7d5e628007cbb2 (patch) | |
tree | 2bcec56da436f4eb1f65573c393f45626a002a44 /security | |
parent | 42aa428c90298e0752a41a3abc5dbfffb6e3c3ba (diff) |
Notes
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 25 |
1 files changed, 25 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 4b42235ddf8d..f3c781adb774 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -3648,4 +3648,29 @@ misc.c: <modified>2003-10-25</modified> </dates> </vuln> + + <vuln vid="9fe115e6-cbb9-11d8-a8d4-0002b34cc336"> + <topic>Remote code injection in phpMyAdmin</topic> + <affects> + <package> + <name>phpmyadmin</name> + <range><lt>2.5.7.1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>This vulnerability would allow remote user to inject PHP code + to be executed by eval() function. This vulnerability is only + exploitable if variable $cfg['LeftFrameLight'] is set to FALSE (in + file config.inc.php).</p> + </body> + </description> + <references> + <url>http://www.securityfocus.com/archive/1/367486/2004-06-28/2004-07-04/0</url> + </references> + <dates> + <discovery>2004-06-29</discovery> + <entry>2004-07-02</entry> + </dates> + </vuln> </vuxml> |