aboutsummaryrefslogtreecommitdiff
path: root/security/vuxml/vuln.xml
diff options
context:
space:
mode:
authorRemko Lodder <remko@FreeBSD.org>2005-05-19 19:48:14 +0000
committerRemko Lodder <remko@FreeBSD.org>2005-05-19 19:48:14 +0000
commit78d9296cfb4f380d5be53f09439d96f496810ce6 (patch)
treec26bd52d187642ac6e69759a7dcdbf7cb722937d /security/vuxml/vuln.xml
parentd44b3296aa29fc80e3a9cda6cc6f4a7294603833 (diff)
downloadports-78d9296cfb4f380d5be53f09439d96f496810ce6.tar.gz
ports-78d9296cfb4f380d5be53f09439d96f496810ce6.zip
Notes
Diffstat (limited to 'security/vuxml/vuln.xml')
-rw-r--r--security/vuxml/vuln.xml8
1 files changed, 4 insertions, 4 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 43054e79de73..9dede6c66151 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -43,11 +43,11 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
<p>The developers of cdrdao report that there is a potential
- root exploit in the software. In order to be able to
+ root exploit in the software. In order to be able to
succesfully exploit this vulnerability cdrdao must be
- installed setuid root. When succesfully exploited a local
- user might get escalated privileges. Default this port does
- not install setuid root.</p>
+ installed setuid root. When succesfully exploited a local
+ user might get escalated privileges. By default this port is
+ not installed setuid root.</p>
</body>
</description>
<references>