aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorwxs <wxs@FreeBSD.org>2009-01-13 11:30:52 +0800
committerwxs <wxs@FreeBSD.org>2009-01-13 11:30:52 +0800
commit4f7f3565d8d771fb7a5dc1f2083fc1ef86620775 (patch)
tree60c925490142dae6994dfd1f48ef095fa2227dc2 /security
parent0c87762510a8066020010684ed32896d83f3f368 (diff)
downloadfreebsd-ports-gnome-4f7f3565d8d771fb7a5dc1f2083fc1ef86620775.tar.gz
freebsd-ports-gnome-4f7f3565d8d771fb7a5dc1f2083fc1ef86620775.tar.zst
freebsd-ports-gnome-4f7f3565d8d771fb7a5dc1f2083fc1ef86620775.zip
- Add missing blockquote and linewrap properly
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml5
1 files changed, 3 insertions, 2 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 583a17435102..d700d2656a3d 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -45,7 +45,7 @@ Note: Please add new entries to the beginning of this file.
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
<p>Secunia reports:</p>
- <blockquote cite="">
+ <blockquote cite="http://secunia.com/advisories/30765">
<p>A vulnerability has been reported in CGIWrap, which can be
exploited by malicious people to conduct cross-site scripting
attacks.</p>
@@ -53,7 +53,8 @@ Note: Please add new entries to the beginning of this file.
error messages without specifying a charset. This can be exploited
to execute arbitrary HTML and script code in a user's browser
session in context of an affected site.</p>
- <p>Successful exploitation may require that the victim uses Internet Explorer or a browser based on Internet Explorer components.</p>
+ <p>Successful exploitation may require that the victim uses Internet
+ Explorer or a browser based on Internet Explorer components.</p>
</blockquote>
</body>
</description>