diff options
author | Martin Wilke <miwi@FreeBSD.org> | 2007-03-09 15:52:31 +0000 |
---|---|---|
committer | Martin Wilke <miwi@FreeBSD.org> | 2007-03-09 15:52:31 +0000 |
commit | 74c50829e94354e5786d1e162bfc768ac4d2adcd (patch) | |
tree | e53057f4b7863f47a9df4056439359f3d2539fed /security/vuxml/vuln.xml | |
parent | 31630be19eb7256bf4132a4b9c774a1f3d529e3e (diff) | |
download | ports-74c50829e94354e5786d1e162bfc768ac4d2adcd.tar.gz ports-74c50829e94354e5786d1e162bfc768ac4d2adcd.zip |
Notes
Diffstat (limited to 'security/vuxml/vuln.xml')
-rw-r--r-- | security/vuxml/vuln.xml | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 7e10d9433a3a..11ae997906af 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -49,7 +49,7 @@ Note: Please add new entries to the beginning of this file. </affects> <description> <body xmlns="http://www.w3.org/1999/xhtml"> - <p>"Moritz Jodeit reports::</p> + <p>"Moritz Jodeit reports:</p> <blockquote cite="http://lists.grok.org.uk/pipermail/full-disclosure/2007-March/052738.html"> <p>There's an exploitable buffer overflow in the current version of MPlayer (v1.0rc1) which can be exploited with a maliciously crafted |