aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorwxs <wxs@FreeBSD.org>2013-01-25 10:08:56 +0800
committerwxs <wxs@FreeBSD.org>2013-01-25 10:08:56 +0800
commitdc053554fd9e4a0d4627295024a0f00755f8de88 (patch)
tree2a73a3c65e3279d109de9d27f8b8062f89655ff6 /security
parentf3de0b2f98c92e6c5b3a2dce45d53576b170045d (diff)
downloadfreebsd-ports-gnome-dc053554fd9e4a0d4627295024a0f00755f8de88.tar.gz
freebsd-ports-gnome-dc053554fd9e4a0d4627295024a0f00755f8de88.tar.zst
freebsd-ports-gnome-dc053554fd9e4a0d4627295024a0f00755f8de88.zip
Fix whitespace in previous commit.
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml12
1 files changed, 6 insertions, 6 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 08668d8a5a2b..80fef6965944 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -63,12 +63,12 @@ Note: Please add new entries to the beginning of this file.
<body xmlns="http://www.w3.org/1999/xhtml">
<p>Cross-site scripting (XSS) vulnerability</p>
<blockquote cite="https://www.django-cms.org/en/blog/2012/12/04/2-3-5-security-release/">
- <p>Jonas Obrist reports: The security issue
-allows users with limited admin access to elevate their privileges through XSS
-injection using the page_attribute template tag. Only users with admin access
-and the permission to edit at least one django CMS page object could exploit
-this vulnerability. Websites that do not use the page_attribute template tag are
-not affected.</p>
+ <p>Jonas Obrist reports: The security issue allows users with limited
+ admin access to elevate their privileges through XSS injection
+ using the page_attribute template tag. Only users with admin access
+ and the permission to edit at least one django CMS page object
+ could exploit this vulnerability. Websites that do not use the
+ page_attribute template tag are not affected.</p>
</blockquote>
</body>
</description>