diff options
author | sem <sem@FreeBSD.org> | 2005-11-07 01:28:04 +0800 |
---|---|---|
committer | sem <sem@FreeBSD.org> | 2005-11-07 01:28:04 +0800 |
commit | c3a38a1b44a0d435ef8794490327630ca61ee07a (patch) | |
tree | 38570862271764c00b35bfaf8705fff38cffe18e /security | |
parent | 6d22e74d04150cd2a7cd8d8b323d9e8597856089 (diff) | |
download | freebsd-ports-gnome-c3a38a1b44a0d435ef8794490327630ca61ee07a.tar.gz freebsd-ports-gnome-c3a38a1b44a0d435ef8794490327630ca61ee07a.tar.zst freebsd-ports-gnome-c3a38a1b44a0d435ef8794490327630ca61ee07a.zip |
- Add missed </p> tag [1]
- Modify 594eb447-e398-11d9-a8bd-000cf18bbe54 entry:
ruby 1.6.x is not affected this vulnerability,
it have no XMLRPC support.
Pointy hat to: simon [1]
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 5 |
1 files changed, 3 insertions, 2 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 28e92235f62d..f85d1e4242e6 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -53,7 +53,7 @@ Note: Please add new entries to the beginning of this file. <p>To be vulnerable, a user must explicitly install a publicly released malicious package using the PEAR installer, or explicitly install a package that depends on - a malicious package. + a malicious package.</p> </blockquote> </body> </description> @@ -4494,7 +4494,7 @@ Note: Please add new entries to the beginning of this file. <package> <name>ruby</name> <name>ruby_static</name> - <range><le>1.8.2_3</le></range> + <range><gt>1.8.*</gt><lt>1.8.2_3</lt></range> </package> </affects> <description> @@ -4518,6 +4518,7 @@ Note: Please add new entries to the beginning of this file. <dates> <discovery>2005-06-22</discovery> <entry>2005-06-23</entry> + <modified>2005-11-06</modified> </dates> </vuln> |