diff options
author | wxs <wxs@FreeBSD.org> | 2009-01-13 11:30:52 +0800 |
---|---|---|
committer | wxs <wxs@FreeBSD.org> | 2009-01-13 11:30:52 +0800 |
commit | 4f7f3565d8d771fb7a5dc1f2083fc1ef86620775 (patch) | |
tree | 60c925490142dae6994dfd1f48ef095fa2227dc2 /security | |
parent | 0c87762510a8066020010684ed32896d83f3f368 (diff) | |
download | freebsd-ports-gnome-4f7f3565d8d771fb7a5dc1f2083fc1ef86620775.tar.gz freebsd-ports-gnome-4f7f3565d8d771fb7a5dc1f2083fc1ef86620775.tar.zst freebsd-ports-gnome-4f7f3565d8d771fb7a5dc1f2083fc1ef86620775.zip |
- Add missing blockquote and linewrap properly
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 5 |
1 files changed, 3 insertions, 2 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 583a17435102..d700d2656a3d 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -45,7 +45,7 @@ Note: Please add new entries to the beginning of this file. <description> <body xmlns="http://www.w3.org/1999/xhtml"> <p>Secunia reports:</p> - <blockquote cite=""> + <blockquote cite="http://secunia.com/advisories/30765"> <p>A vulnerability has been reported in CGIWrap, which can be exploited by malicious people to conduct cross-site scripting attacks.</p> @@ -53,7 +53,8 @@ Note: Please add new entries to the beginning of this file. error messages without specifying a charset. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.</p> - <p>Successful exploitation may require that the victim uses Internet Explorer or a browser based on Internet Explorer components.</p> + <p>Successful exploitation may require that the victim uses Internet + Explorer or a browser based on Internet Explorer components.</p> </blockquote> </body> </description> |