diff options
author | miwi <miwi@FreeBSD.org> | 2009-03-14 16:35:42 +0800 |
---|---|---|
committer | miwi <miwi@FreeBSD.org> | 2009-03-14 16:35:42 +0800 |
commit | 210842b1ae47c915568be255a73611b7274396ab (patch) | |
tree | 994aeac390021aa1781c0827efb579b2f9f783fb /security/vuxml | |
parent | 42ce290190bade633db04bcdcf13ec3b52711145 (diff) | |
download | freebsd-ports-gnome-210842b1ae47c915568be255a73611b7274396ab.tar.gz freebsd-ports-gnome-210842b1ae47c915568be255a73611b7274396ab.tar.zst freebsd-ports-gnome-210842b1ae47c915568be255a73611b7274396ab.zip |
- Clean up latest curl entry
Diffstat (limited to 'security/vuxml')
-rw-r--r-- | security/vuxml/vuln.xml | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 692cb35ba07b..87cdedb08a64 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -143,10 +143,10 @@ Note: Please add new entries to the beginning of this file. <p>Secunia reports:</p> <blockquote cite="http://secunia.com/advisories/34138/"> <p>The security issue is caused due to cURL following HTTP Location: -redirects to e.g. scp:// or file:// URLs which can be exploited -by a malicious HTTP server to overwrite or disclose the content of -arbitrary local files and potentially execute arbitrary commands via -specially crafted redirect URLs.</p> + redirects to e.g. scp:// or file:// URLs which can be exploited + by a malicious HTTP server to overwrite or disclose the content of + arbitrary local files and potentially execute arbitrary commands via + specially crafted redirect URLs.</p> </blockquote> </body> </description> |