diff options
author | stas <stas@FreeBSD.org> | 2008-06-23 05:08:08 +0800 |
---|---|---|
committer | stas <stas@FreeBSD.org> | 2008-06-23 05:08:08 +0800 |
commit | 91bc91357af859cf1880de8074291e5673278899 (patch) | |
tree | 14f648d1f35150e58bc81d4e84117236179f2f4d /security | |
parent | 82346c503405c79547d17f53da95006fda99231f (diff) | |
download | freebsd-ports-gnome-91bc91357af859cf1880de8074291e5673278899.tar.gz freebsd-ports-gnome-91bc91357af859cf1880de8074291e5673278899.tar.zst freebsd-ports-gnome-91bc91357af859cf1880de8074291e5673278899.zip |
- Add missing <code></code> block around safe_mode.
Pointy hat to: me
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 62c128adece5..25afc0577537 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -46,8 +46,8 @@ Note: Please add new entries to the beginning of this file. <body xmlns="http://www.w3.org/1999/xhtml"> <p>According to Maksymilian Arciemowicz research, it is possible to bypass security restrictions - of safe_mode in <code>posix_access()</code> function via - directory traversal vulnerability. The attacker + of <code>safe_mode</code> in <code>posix_access()</code> + function via directory traversal vulnerability. The attacker can use this attack to gain access to sensitive information. Other functions utilizing <code>expand_filepath()</code> may be affected.</p> |