diff options
author | remko <remko@FreeBSD.org> | 2005-05-22 13:27:44 +0000 |
---|---|---|
committer | remko <remko@FreeBSD.org> | 2005-05-22 13:27:44 +0000 |
commit | 27b91cb94b883b8e2d12fd1c0039d79bb8187748 (patch) | |
tree | 8cf5d8a2dc5a5e5c7f25fb4ad0aa497c0a9d43cf | |
parent | 33a234ac7d1b9d90790e1bf06d7125af5d47dd3a (diff) | |
download | FreeBSD-ports-27b91cb94b883b8e2d12fd1c0039d79bb8187748.zip FreeBSD-ports-27b91cb94b883b8e2d12fd1c0039d79bb8187748.tar.gz |
Remove a forgotten :.
Spotted by: simon
-rw-r--r-- | security/vuxml/vuln.xml | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 1af6ecb..c6cfaaf 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -112,7 +112,7 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. <p>A RST/GHC Advisory reports that there is an format string vulnerability in oops. The vulnerability can be found in the MySQL/PgSQL authentication module. Succesful - exploitation may allow execution of arbitrary code.:</p> + exploitation may allow execution of arbitrary code.</p> </body> </description> <references> |