aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorsimon <simon@FreeBSD.org>2007-12-01 22:25:28 +0800
committersimon <simon@FreeBSD.org>2007-12-01 22:25:28 +0800
commit9405bbfb2f810d6a2f68cf26a090cdd5b4c86b15 (patch)
tree0d14323d7b94c5df537ea074c6287a845c01d7eb /security
parentf39e1d8af23583a183d2fd3bba1759f87249ba91 (diff)
downloadfreebsd-ports-gnome-9405bbfb2f810d6a2f68cf26a090cdd5b4c86b15.tar.gz
freebsd-ports-gnome-9405bbfb2f810d6a2f68cf26a090cdd5b4c86b15.tar.zst
freebsd-ports-gnome-9405bbfb2f810d6a2f68cf26a090cdd5b4c86b15.zip
Make the rubygem-rails -- JSON XSS vulnerability entry valid UTF-8 (at
least the special chars doesn't look like UTF-8 as per emacs or freshports). Reported by: freshports via dvl Approved by: portmgr (secteam blanket)
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml4
1 files changed, 2 insertions, 2 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 72037c39fc5f..bf4fe557e6dd 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -79,7 +79,7 @@ Note: Please add new entries to the beginning of this file.
<p>Rails core team reports:</p>
<blockquote cite="http://weblog.rubyonrails.org/2007/10/12/rails-1-2-5-maintenance-release">
<p>All users of Rails 1.2.4 or earlier are advised to upgrade
- to 1.2.5, though it isn¡¯t strictly necessary if you
+ to 1.2.5, though it isn't strictly necessary if you
aren't working with JSON. For more information the JSON
vulnerability, see CVE-2007-3227.</p>
</blockquote>
@@ -91,7 +91,7 @@ Note: Please add new entries to the beginning of this file.
<dates>
<discovery>2007-10-12</discovery>
<entry>2007-11-28</entry>
- <modified>2007-11-28</modified>
+ <modified>2007-12-01</modified>
</dates>
</vuln>