aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorremko <remko@FreeBSD.org>2006-09-14 19:31:27 +0800
committerremko <remko@FreeBSD.org>2006-09-14 19:31:27 +0800
commit11e4bfaee7f1f241a70ca2429b98ca2ddebe3755 (patch)
tree3c9b45af43c79c7a98f7206ed5b8583d6407d026
parent386629aa5bf463c95a3056217b6c208a4c7803ce (diff)
downloadfreebsd-ports-gnome-11e4bfaee7f1f241a70ca2429b98ca2ddebe3755.tar.gz
freebsd-ports-gnome-11e4bfaee7f1f241a70ca2429b98ca2ddebe3755.tar.zst
freebsd-ports-gnome-11e4bfaee7f1f241a70ca2429b98ca2ddebe3755.zip
Try to explain a bit better that users who have the Quicktime plugin
as a browser plugin can be directly affected by the remote code execution. Also mention that I changed the entry date in the previous entry (PHP) which I had forgotten to do yesterday and did not mention in the previous commit.
-rw-r--r--security/vuxml/vuln.xml2
1 files changed, 2 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 7a2a93c7f4c8..c7ebee8ebc65 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -51,6 +51,8 @@ Note: Please add new entries to the beginning of this file.
movie can possibly execute remote code via the users browser.
The vulnerabilities can also lead to a Denial of Service
(application crash).</p>
+ <p>Users who have QuickTime as a browser plugin might be
+ directly affected by the remote code execution.</p>
</body>
</description>
<references>