aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorstas <stas@FreeBSD.org>2008-06-23 05:08:08 +0800
committerstas <stas@FreeBSD.org>2008-06-23 05:08:08 +0800
commit91bc91357af859cf1880de8074291e5673278899 (patch)
tree14f648d1f35150e58bc81d4e84117236179f2f4d /security
parent82346c503405c79547d17f53da95006fda99231f (diff)
downloadfreebsd-ports-gnome-91bc91357af859cf1880de8074291e5673278899.tar.gz
freebsd-ports-gnome-91bc91357af859cf1880de8074291e5673278899.tar.zst
freebsd-ports-gnome-91bc91357af859cf1880de8074291e5673278899.zip
- Add missing <code></code> block around safe_mode.
Pointy hat to: me
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml4
1 files changed, 2 insertions, 2 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 62c128adece5..25afc0577537 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -46,8 +46,8 @@ Note: Please add new entries to the beginning of this file.
<body xmlns="http://www.w3.org/1999/xhtml">
<p>According to Maksymilian Arciemowicz research,
it is possible to bypass security restrictions
- of safe_mode in <code>posix_access()</code> function via
- directory traversal vulnerability. The attacker
+ of <code>safe_mode</code> in <code>posix_access()</code>
+ function via directory traversal vulnerability. The attacker
can use this attack to gain access to sensitive
information. Other functions utilizing
<code>expand_filepath()</code> may be affected.</p>