{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[],"affected_systems_content":"<p>phpMyAdmin versions 2.8.0.2 et  ant\u00e9rieures.</p>","content":"## Description\n\nUne vuln\u00e9rabilit\u00e9 dans phpMyAdmin rend possible l'utilisation de scripts\npr\u00e9sents dans le r\u00e9pertoire de th\u00e8mes de phpMyAdmin afin de conduire une\nattaque de type Cross Site Scripting.\n\n## Solution\n\nLa version 2.8.0.3 de phpMyAdmin corrige le probl\u00e8me :\n\n    http://www.phpmyadmin.net/home_page/downloads.php\n","cves":[],"links":[{"title":"Bulletin de s\u00e9curit\u00e9 FreeBSD :","url":"http://www.vuxml.org/freebsd/pkg-php-MyAdmin.html"},{"title":"Bulletin de s\u00e9curit\u00e9 phpMyAdmin PMASA-2006-1 du 06 avril    2006","url":"http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2006-1"},{"title":"Site de phpMyAdmin :","url":"http://www.phpmyadmin.net"}],"reference":"CERTA-2006-AVI-142","revisions":[{"description":"version initiale.","revision_date":"2006-04-07T00:00:00.000000"},{"description":"ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 FreeBSD.","revision_date":"2006-04-11T00:00:00.000000"}],"risks":[{"description":"Attaque de type cross site scripting"}],"summary":"Une vuln\u00e9rabilit\u00e9 dans phpMyAdmin permet \u00e0 un utilisateur distant mal\nintentionn\u00e9 de conduire une attaque de type Cross Site Scripting.\n","title":"Vuln\u00e9rabilit\u00e9 dans phpMyAdmin","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 PMASA-2006-1 de phpMyAdmin du 06 avril 2006","url":null}]}
