Whoops! Fixed an SQL injection vulnerability in the CLI installer. (Not like it's a huge deal because the vulnerability was only introduced last commit and if you make it to that stage you already know the database password)
</div>
</div>
<div class="straightaway"></div>
<div class="footer">
<!-- We strongly request that you leave the notice below in its place; it helps to attract users to Enano in exchange for providing you
with your CMS. Enano is still new; therefore we are looking to attract users, and we feel that this notice will help. If you refuse
to include even this tiny little notice, support on the Enano forums may be affected. Thanks guys.
-Dan
-->
<b>{COPYRIGHT}</b><br />
Powered by <a href="{URL_ABOUT_ENANO}">Enano</a> | <a href="http://validator.w3.org/check?uri=referer">Valid XHTML 1.1</a> | <a href="http://jigsaw.w3.org/css-validator/validator?uri=referer">Valid CSS</a> | Time: [[GenTime]]s<!-- BEGIN auth_admin --> | <a href="{REPORT_URI}">[[NumQueries]] SQL</a><!-- END auth_admin -->
<!-- Do not remove this line or scheduled tasks will not run. -->
<img alt=" " src="{SCRIPTPATH}/cron.php" width="1" height="1" />
</div>
</div>
</div>
{JS_FOOTER}
</body>
</html>