Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=d478895972281545052d74d50d34bfaa48a6d011

commit d478895972281545052d74d50d34bfaa48a6d011
Author: Miklos Vajna <vmik...@frugalware.org>
Date:   Sun May 1 16:29:24 2011 +0200

fix typos

diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml
index 83d162a..f8d055b 100644
--- a/frugalware/xml/security.xml
+++ b/frugalware/xml/security.xml
@@ -98,7 +98,7 @@ Successful exploitation of this vulnerability may allow 
execution of arbitrary c
<author>Miklos Vajna</author>
<package>wordpress</package>
<vulnerable>3.0.4-1</vulnerable>
-               <unaffected>3.0.5-1nexon1<unaffected>
+               <unaffected>3.0.5-1nexon1</unaffected>
<bts>http://bugs.frugalware.org/task/4427</bts>
<cve>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0700
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0701</cve>
@@ -115,7 +115,7 @@ Successful exploitation of this vulnerability requires the 
"Author" role.</desc>
<author>Miklos Vajna</author>
<package>phpmyadmin</package>
<vulnerable>3.3.9-1</vulnerable>
-               <unaffected>3.3.9.2-1nexon1<unaffected>
+               <unaffected>3.3.9.2-1nexon1</unaffected>
<bts>http://bugs.frugalware.org/task/4424</bts>
<cve>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0987</cve>
<desc>A security issue has been reported in phpMyAdmin, which can be exploited 
by malicious users to bypass certain security restrictions.
_______________________________________________
Frugalware-git mailing list
Frugalware-git@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-git

Reply via email to