diff options
author | simon <simon@FreeBSD.org> | 2007-12-01 22:25:28 +0800 |
---|---|---|
committer | simon <simon@FreeBSD.org> | 2007-12-01 22:25:28 +0800 |
commit | 9405bbfb2f810d6a2f68cf26a090cdd5b4c86b15 (patch) | |
tree | 0d14323d7b94c5df537ea074c6287a845c01d7eb /security | |
parent | f39e1d8af23583a183d2fd3bba1759f87249ba91 (diff) | |
download | freebsd-ports-gnome-9405bbfb2f810d6a2f68cf26a090cdd5b4c86b15.tar.gz freebsd-ports-gnome-9405bbfb2f810d6a2f68cf26a090cdd5b4c86b15.tar.zst freebsd-ports-gnome-9405bbfb2f810d6a2f68cf26a090cdd5b4c86b15.zip |
Make the rubygem-rails -- JSON XSS vulnerability entry valid UTF-8 (at
least the special chars doesn't look like UTF-8 as per emacs or
freshports).
Reported by: freshports via dvl
Approved by: portmgr (secteam blanket)
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 72037c39fc5f..bf4fe557e6dd 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -79,7 +79,7 @@ Note: Please add new entries to the beginning of this file. <p>Rails core team reports:</p> <blockquote cite="http://weblog.rubyonrails.org/2007/10/12/rails-1-2-5-maintenance-release"> <p>All users of Rails 1.2.4 or earlier are advised to upgrade - to 1.2.5, though it isn¡¯t strictly necessary if you + to 1.2.5, though it isn't strictly necessary if you aren't working with JSON. For more information the JSON vulnerability, see CVE-2007-3227.</p> </blockquote> @@ -91,7 +91,7 @@ Note: Please add new entries to the beginning of this file. <dates> <discovery>2007-10-12</discovery> <entry>2007-11-28</entry> - <modified>2007-11-28</modified> + <modified>2007-12-01</modified> </dates> </vuln> |