aboutsummaryrefslogtreecommitdiffstats
path: root/security/vuxml
diff options
context:
space:
mode:
authormiwi <miwi@FreeBSD.org>2009-03-14 16:35:42 +0800
committermiwi <miwi@FreeBSD.org>2009-03-14 16:35:42 +0800
commit210842b1ae47c915568be255a73611b7274396ab (patch)
tree994aeac390021aa1781c0827efb579b2f9f783fb /security/vuxml
parent42ce290190bade633db04bcdcf13ec3b52711145 (diff)
downloadfreebsd-ports-gnome-210842b1ae47c915568be255a73611b7274396ab.tar.gz
freebsd-ports-gnome-210842b1ae47c915568be255a73611b7274396ab.tar.zst
freebsd-ports-gnome-210842b1ae47c915568be255a73611b7274396ab.zip
- Clean up latest curl entry
Diffstat (limited to 'security/vuxml')
-rw-r--r--security/vuxml/vuln.xml8
1 files changed, 4 insertions, 4 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 692cb35ba07b..87cdedb08a64 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -143,10 +143,10 @@ Note: Please add new entries to the beginning of this file.
<p>Secunia reports:</p>
<blockquote cite="http://secunia.com/advisories/34138/">
<p>The security issue is caused due to cURL following HTTP Location:
-redirects to e.g. scp:// or file:// URLs which can be exploited
-by a malicious HTTP server to overwrite or disclose the content of
-arbitrary local files and potentially execute arbitrary commands via
-specially crafted redirect URLs.</p>
+ redirects to e.g. scp:// or file:// URLs which can be exploited
+ by a malicious HTTP server to overwrite or disclose the content of
+ arbitrary local files and potentially execute arbitrary commands via
+ specially crafted redirect URLs.</p>
</blockquote>
</body>
</description>