diff options
author | Remko Lodder <remko@FreeBSD.org> | 2005-05-22 13:27:44 +0000 |
---|---|---|
committer | Remko Lodder <remko@FreeBSD.org> | 2005-05-22 13:27:44 +0000 |
commit | d926fe33adc1f50dc80fb77dd3edb5f508f44a6b (patch) | |
tree | f5a1fb0fe7488aac79d2419eed715dddf354db9f | |
parent | 855583f4c5b1ef381c68d50452c40b8f6a1b3f9b (diff) | |
download | ports-d926fe33adc1f50dc80fb77dd3edb5f508f44a6b.tar.gz ports-d926fe33adc1f50dc80fb77dd3edb5f508f44a6b.zip |
Notes
-rw-r--r-- | security/vuxml/vuln.xml | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 1af6ecb8cee7..c6cfaaf5f917 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -112,7 +112,7 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. <p>A RST/GHC Advisory reports that there is an format string vulnerability in oops. The vulnerability can be found in the MySQL/PgSQL authentication module. Succesful - exploitation may allow execution of arbitrary code.:</p> + exploitation may allow execution of arbitrary code.</p> </body> </description> <references> |