diff options
author | wxs <wxs@FreeBSD.org> | 2012-03-12 10:23:58 +0800 |
---|---|---|
committer | wxs <wxs@FreeBSD.org> | 2012-03-12 10:23:58 +0800 |
commit | e5361cfa5442e483dd4121605f91117e6aef5ca7 (patch) | |
tree | 12da7896622d2d8660bd24838f72ee61ab1f9d0b /security | |
parent | 589af510733b03637f3aa6ffdf24d63afe782bdc (diff) | |
download | freebsd-ports-gnome-e5361cfa5442e483dd4121605f91117e6aef5ca7.tar.gz freebsd-ports-gnome-e5361cfa5442e483dd4121605f91117e6aef5ca7.tar.zst freebsd-ports-gnome-e5361cfa5442e483dd4121605f91117e6aef5ca7.zip |
Typo fix.
Feature safe: yes
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index e5c4e5e93f78..c87057f31cd2 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -68,7 +68,7 @@ Note: Please add new entries to the beginning of this file. audit file will be able to run commands on the users system, with the privileges of the user running running portaudit (often root).</p> - <p>The attach could e.g. happen through DNS hijacking or a man + <p>The attack could e.g. happen through DNS hijacking or a man in the middle attack.</p> <p>Note that if the user has set up portaudit to run from periodic this attack could happen without direct user |