summaryrefslogtreecommitdiff
path: root/security/vuxml
diff options
context:
space:
mode:
authorMartin Wilke <miwi@FreeBSD.org>2007-03-09 15:52:31 +0000
committerMartin Wilke <miwi@FreeBSD.org>2007-03-09 15:52:31 +0000
commit74c50829e94354e5786d1e162bfc768ac4d2adcd (patch)
treee53057f4b7863f47a9df4056439359f3d2539fed /security/vuxml
parent- Add entry for mplayer -- DMO File Parsing Buffer Overflow Vulnerability (diff)
- fix typo
Notes
Notes: svn path=/head/; revision=187025
Diffstat (limited to 'security/vuxml')
-rw-r--r--security/vuxml/vuln.xml2
1 files changed, 1 insertions, 1 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 7e10d9433a3a..11ae997906af 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -49,7 +49,7 @@ Note: Please add new entries to the beginning of this file.
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
- <p>"Moritz Jodeit reports::</p>
+ <p>"Moritz Jodeit reports:</p>
<blockquote cite="http://lists.grok.org.uk/pipermail/full-disclosure/2007-March/052738.html">
<p>There's an exploitable buffer overflow in the current version of
MPlayer (v1.0rc1) which can be exploited with a maliciously crafted