summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorremko <remko@FreeBSD.org>2005-05-22 13:27:44 +0000
committerremko <remko@FreeBSD.org>2005-05-22 13:27:44 +0000
commit27b91cb94b883b8e2d12fd1c0039d79bb8187748 (patch)
tree8cf5d8a2dc5a5e5c7f25fb4ad0aa497c0a9d43cf
parent33a234ac7d1b9d90790e1bf06d7125af5d47dd3a (diff)
downloadFreeBSD-ports-27b91cb94b883b8e2d12fd1c0039d79bb8187748.zip
FreeBSD-ports-27b91cb94b883b8e2d12fd1c0039d79bb8187748.tar.gz
Remove a forgotten :.
Spotted by: simon
-rw-r--r--security/vuxml/vuln.xml2
1 files changed, 1 insertions, 1 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 1af6ecb..c6cfaaf 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -112,7 +112,7 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
<p>A RST/GHC Advisory reports that there is an format string
vulnerability in oops. The vulnerability can be found in
the MySQL/PgSQL authentication module. Succesful
- exploitation may allow execution of arbitrary code.:</p>
+ exploitation may allow execution of arbitrary code.</p>
</body>
</description>
<references>
OpenPOWER on IntegriCloud