aboutsummaryrefslogtreecommitdiffstats
path: root/security/vuxml
diff options
context:
space:
mode:
authorperky <perky@FreeBSD.org>2005-02-04 12:26:10 +0800
committerperky <perky@FreeBSD.org>2005-02-04 12:26:10 +0800
commit0f943c1f0c3304fe2a71aff1cad5790324d41cba (patch)
treeffbfbc929cc1dcb1488ed2e68e9fe5aa7359cff5 /security/vuxml
parent39d180f09ef6325cf79931bb7e4cc98eb1ffef15 (diff)
downloadfreebsd-ports-gnome-0f943c1f0c3304fe2a71aff1cad5790324d41cba.tar.gz
freebsd-ports-gnome-0f943c1f0c3304fe2a71aff1cad5790324d41cba.tar.zst
freebsd-ports-gnome-0f943c1f0c3304fe2a71aff1cad5790324d41cba.zip
Add missing <code> markups in a citation from PSF-2005-001.
Diffstat (limited to 'security/vuxml')
-rw-r--r--security/vuxml/vuln.xml10
1 files changed, 5 insertions, 5 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 8e2b52e1ad9f..64c4c7082f9b 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -55,17 +55,17 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
can give remote attackers access to internals of the
registered object or its module or possibly other modules.
The flaw only affects Python XML-RPC servers that use the
- register_instance() method to register an object without
- a _dispatch() method. Servers using only register_function()
- are not affected.</p>
+ <code>register_instance()</code> method to register an object
+ without a <code>_dispatch()</code> method. Servers using
+ only <code>register_function()</code> are not affected.</p>
<p>On vulnerable XML-RPC servers, a remote attacker may
be able to view or modify globals of the module(s)
containing the registered instance's class(es), potentially
leading to data loss or arbitrary code execution. If the
registered object is a module, the danger is particularly
serious. For example, if the registered module imports
- the os module, an attacker could invoke the os.system()
- function.</p>
+ the <code>os</code> module, an attacker could invoke the
+ <code>os.system()</code> function.</p>
</blockquote>
<p><strong>Note:</strong> This vulnerability affects your
system only if you're running