aboutsummaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorWesley Shields <wxs@FreeBSD.org>2009-01-13 03:30:52 +0000
committerWesley Shields <wxs@FreeBSD.org>2009-01-13 03:30:52 +0000
commit3c02ff951ecfeae594dffd4d50e9cee0b2b350c0 (patch)
tree09ece4c9c706c9d516c167e4cbbef33422fc2a42 /security
parenta8e519b24f39fcf70d47d218548c6976272e48b1 (diff)
downloadports-3c02ff951ecfeae594dffd4d50e9cee0b2b350c0.tar.gz
ports-3c02ff951ecfeae594dffd4d50e9cee0b2b350c0.zip
Notes
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml5
1 files changed, 3 insertions, 2 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 583a17435102..d700d2656a3d 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -45,7 +45,7 @@ Note: Please add new entries to the beginning of this file.
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
<p>Secunia reports:</p>
- <blockquote cite="">
+ <blockquote cite="http://secunia.com/advisories/30765">
<p>A vulnerability has been reported in CGIWrap, which can be
exploited by malicious people to conduct cross-site scripting
attacks.</p>
@@ -53,7 +53,8 @@ Note: Please add new entries to the beginning of this file.
error messages without specifying a charset. This can be exploited
to execute arbitrary HTML and script code in a user's browser
session in context of an affected site.</p>
- <p>Successful exploitation may require that the victim uses Internet Explorer or a browser based on Internet Explorer components.</p>
+ <p>Successful exploitation may require that the victim uses Internet
+ Explorer or a browser based on Internet Explorer components.</p>
</blockquote>
</body>
</description>