From secunia security advisory at $URL:
Description A vulnerability has been reported in phpPgAdmin, which can be exploited by malicious users to conduct script insertion attacks. Certain unspecified input related to functions is not properly sanitised before being used. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user's browser session in context of an affected site when the malicious data is being viewed. The vulnerability is reported in version 5.0.3. Prior versions may also be affected. Solution Update to version 5.0.4.
*phppgadmin-5.0.4 (08 Jun 2012) 08 Jun 2012; Aaron W. Swenson <titanofold@gentoo.org> +phppgadmin-5.0.4.ebuild: Version bump.
Arch teams, please test and mark stable: =dev-db/phppgadmin-5.0.4 Target KEYWORDS="amd64 hppa ppc x86"
amd64 stable
Stable for HPPA.
x86 stable, thanks
ppc stable, last arch.
@security: please vote
Thanks, folks. Closing noglsa for XSS.