aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorRemko Lodder <remko@FreeBSD.org>2005-05-22 13:27:44 +0000
committerRemko Lodder <remko@FreeBSD.org>2005-05-22 13:27:44 +0000
commitd926fe33adc1f50dc80fb77dd3edb5f508f44a6b (patch)
treef5a1fb0fe7488aac79d2419eed715dddf354db9f
parent855583f4c5b1ef381c68d50452c40b8f6a1b3f9b (diff)
downloadports-d926fe33adc1f50dc80fb77dd3edb5f508f44a6b.tar.gz
ports-d926fe33adc1f50dc80fb77dd3edb5f508f44a6b.zip
Notes
-rw-r--r--security/vuxml/vuln.xml2
1 files changed, 1 insertions, 1 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 1af6ecb8cee7..c6cfaaf5f917 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -112,7 +112,7 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
<p>A RST/GHC Advisory reports that there is an format string
vulnerability in oops. The vulnerability can be found in
the MySQL/PgSQL authentication module. Succesful
- exploitation may allow execution of arbitrary code.:</p>
+ exploitation may allow execution of arbitrary code.</p>
</body>
</description>
<references>