diff options
author | miwi <miwi@FreeBSD.org> | 2009-05-16 08:44:25 +0800 |
---|---|---|
committer | miwi <miwi@FreeBSD.org> | 2009-05-16 08:44:25 +0800 |
commit | ecda0f50e38213d29f6702e9f5c56522e864a92e (patch) | |
tree | 8557345c028b1508901cee507656d63d388d2a72 /security | |
parent | 70511c4fe2848be9ade0ba606d71e436c0099487 (diff) | |
download | freebsd-ports-gnome-ecda0f50e38213d29f6702e9f5c56522e864a92e.tar.gz freebsd-ports-gnome-ecda0f50e38213d29f6702e9f5c56522e864a92e.tar.zst freebsd-ports-gnome-ecda0f50e38213d29f6702e9f5c56522e864a92e.zip |
- Small cleanup
* fix spelling
* fix tabs/whitespaces
* add more references to the latest drual entry
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 10 |
1 files changed, 6 insertions, 4 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 287342033335..4ef346c4ba8f 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -48,7 +48,7 @@ Note: Please add new entries to the beginning of this file. </affects> <description> <body xmlns="http://www.w3.org/1999/xhtml"> - <p>The Drupal Project reports:</p> + <p>The Drupal Security Team reports:</p> <blockquote cite="http://drupal.org/node/461886"> <p>When outputting user-supplied data Drupal strips potentially dangerous HTML attributes and tags or escapes characters which @@ -68,16 +68,18 @@ Note: Please add new entries to the beginning of this file. and script code in these exports.</p> <p>Additionally, the taxonomy module allows users with the 'administer taxonomy' permission to inject arbitrary HTML and - script code in the help text of any vocabulary. </p> + script code in the help text of any vocabulary.</p> </blockquote> </body> </description> <references> <url>http://drupal.org/node/461886</url> + <url>http://secunia.com/advisories/35045</url> </references> <dates> <discovery>2009-05-13</discovery> <entry>2009-05-14</entry> + <modified>2009-05-16</modified> </dates> </vuln> @@ -345,8 +347,8 @@ Note: Please add new entries to the beginning of this file. could be used by an attacker to crash a remote application.</p> <h1>Workaround</h1> <p>No workaround is available, but applications which do not use - the ASN1_STRING_print_ex function (either directly or - indirectly) are not affected.</p> + the ASN1_STRING_print_ex function (either directly or indirectly) + are not affected.</p> </body> </description> <references> |