Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=d478895972281545052d74d50d34bfaa48a6d011
commit d478895972281545052d74d50d34bfaa48a6d011 Author: Miklos Vajna <vmik...@frugalware.org> Date: Sun May 1 16:29:24 2011 +0200 fix typos diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml index 83d162a..f8d055b 100644 --- a/frugalware/xml/security.xml +++ b/frugalware/xml/security.xml @@ -98,7 +98,7 @@ Successful exploitation of this vulnerability may allow execution of arbitrary c <author>Miklos Vajna</author> <package>wordpress</package> <vulnerable>3.0.4-1</vulnerable> - <unaffected>3.0.5-1nexon1<unaffected> + <unaffected>3.0.5-1nexon1</unaffected> <bts>http://bugs.frugalware.org/task/4427</bts> <cve>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0700 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0701</cve> @@ -115,7 +115,7 @@ Successful exploitation of this vulnerability requires the "Author" role.</desc> <author>Miklos Vajna</author> <package>phpmyadmin</package> <vulnerable>3.3.9-1</vulnerable> - <unaffected>3.3.9.2-1nexon1<unaffected> + <unaffected>3.3.9.2-1nexon1</unaffected> <bts>http://bugs.frugalware.org/task/4424</bts> <cve>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0987</cve> <desc>A security issue has been reported in phpMyAdmin, which can be exploited by malicious users to bypass certain security restrictions. _______________________________________________ Frugalware-git mailing list Frugalware-git@frugalware.org http://frugalware.org/mailman/listinfo/frugalware-git