diff options
author | remko <remko@FreeBSD.org> | 2006-09-14 19:31:27 +0800 |
---|---|---|
committer | remko <remko@FreeBSD.org> | 2006-09-14 19:31:27 +0800 |
commit | 11e4bfaee7f1f241a70ca2429b98ca2ddebe3755 (patch) | |
tree | 3c9b45af43c79c7a98f7206ed5b8583d6407d026 | |
parent | 386629aa5bf463c95a3056217b6c208a4c7803ce (diff) | |
download | freebsd-ports-gnome-11e4bfaee7f1f241a70ca2429b98ca2ddebe3755.tar.gz freebsd-ports-gnome-11e4bfaee7f1f241a70ca2429b98ca2ddebe3755.tar.zst freebsd-ports-gnome-11e4bfaee7f1f241a70ca2429b98ca2ddebe3755.zip |
Try to explain a bit better that users who have the Quicktime plugin
as a browser plugin can be directly affected by the remote code
execution.
Also mention that I changed the entry date in the previous entry
(PHP) which I had forgotten to do yesterday and did not mention
in the previous commit.
-rw-r--r-- | security/vuxml/vuln.xml | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 7a2a93c7f4c8..c7ebee8ebc65 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -51,6 +51,8 @@ Note: Please add new entries to the beginning of this file. movie can possibly execute remote code via the users browser. The vulnerabilities can also lead to a Denial of Service (application crash).</p> + <p>Users who have QuickTime as a browser plugin might be + directly affected by the remote code execution.</p> </body> </description> <references> |