diff options
author | Wesley Shields <wxs@FreeBSD.org> | 2009-01-13 03:30:52 +0000 |
---|---|---|
committer | Wesley Shields <wxs@FreeBSD.org> | 2009-01-13 03:30:52 +0000 |
commit | 3c02ff951ecfeae594dffd4d50e9cee0b2b350c0 (patch) | |
tree | 09ece4c9c706c9d516c167e4cbbef33422fc2a42 /security | |
parent | a8e519b24f39fcf70d47d218548c6976272e48b1 (diff) | |
download | ports-3c02ff951ecfeae594dffd4d50e9cee0b2b350c0.tar.gz ports-3c02ff951ecfeae594dffd4d50e9cee0b2b350c0.zip |
Notes
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 5 |
1 files changed, 3 insertions, 2 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 583a17435102..d700d2656a3d 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -45,7 +45,7 @@ Note: Please add new entries to the beginning of this file. <description> <body xmlns="http://www.w3.org/1999/xhtml"> <p>Secunia reports:</p> - <blockquote cite=""> + <blockquote cite="http://secunia.com/advisories/30765"> <p>A vulnerability has been reported in CGIWrap, which can be exploited by malicious people to conduct cross-site scripting attacks.</p> @@ -53,7 +53,8 @@ Note: Please add new entries to the beginning of this file. error messages without specifying a charset. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.</p> - <p>Successful exploitation may require that the victim uses Internet Explorer or a browser based on Internet Explorer components.</p> + <p>Successful exploitation may require that the victim uses Internet + Explorer or a browser based on Internet Explorer components.</p> </blockquote> </body> </description> |