From 895277dcaa64ff06d47a3ec1b022d0db255489f7 Mon Sep 17 00:00:00 2001 From: Ilia Alshanetsky Date: Fri, 9 Feb 2007 01:10:02 +0000 Subject: [PATCH] Added qualifiers --- index.php | 2 +- releases/5_2_1.php | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/index.php b/index.php index 2ab86a698..050cd2054 100644 --- a/index.php +++ b/index.php @@ -184,7 +184,7 @@ site_header("Hypertext Preprocessor", array('onload' => 'boldEvents();', 'headta

Majority of the security vulnerabilities discovered and resolved can in most cases be only abused by local users and cannot be triggered -remotely. However, some of the above issues can be triggered remotely, or exploited by malicious local users on shares hosting setups +remotely. However, some of the above issues can be triggered remotely in certain situations, or exploited by malicious local users on shares hosting setups utilizing PHP as an Apache module. Therefor, we strongly advise all users of PHP, regardless of the version to upgrade to 5.2.1 release as soon as possible.

diff --git a/releases/5_2_1.php b/releases/5_2_1.php index 8387f4549..8b3405565 100644 --- a/releases/5_2_1.php +++ b/releases/5_2_1.php @@ -39,7 +39,7 @@ users are strongly encouraged to upgrade to it as soon as possible.

Majority of the security vulnerabilities discovered and resolved can in most cases be only abused by local users and cannot be triggered -remotely. However, some of the above issues can be triggered remotely, or exploited by malicious local users on shares hosting setups +remotely. However, some of the above issues can be triggered remotely in certain situations, or exploited by malicious local users on shares hosting setups utilizing PHP as an Apache module. Therefor, we strongly advise all users of PHP, regardless of the version to upgrade to 5.2.1 release as soon as possible.