- Change spaces to tabs in <name> and <range>

- Remove some empty lines
- Respect 2 spaces between <body> and <p>
- Respect empty line between <vuln vid=""> entry.
This commit is contained in:
Marcus Alves Grando 2006-12-14 13:44:03 +00:00
parent 77ec90b79c
commit a49e6fe467
Notes: svn2git 2021-03-31 03:12:20 +00:00
svn path=/head/; revision=179752

View file

@ -312,7 +312,6 @@ Note: Please add new entries to the beginning of this file.
<p>Another vulnerability has been discovered in the CGI library <p>Another vulnerability has been discovered in the CGI library
(cgi.rb) that ships with Ruby which could be used by a malicious (cgi.rb) that ships with Ruby which could be used by a malicious
user to create a denial of service attack (DoS).</p> user to create a denial of service attack (DoS).</p>
<p>A specific HTTP request for any web application using cgi.rb <p>A specific HTTP request for any web application using cgi.rb
causes CPU consumption on the machine on which the web application causes CPU consumption on the machine on which the web application
is running. Many such requests result in a denial of service.</p> is running. Many such requests result in a denial of service.</p>
@ -327,6 +326,7 @@ Note: Please add new entries to the beginning of this file.
<entry>2006-12-04</entry> <entry>2006-12-04</entry>
</dates> </dates>
</vuln> </vuln>
<vuln vid="ed124f8c-82a2-11db-b46b-0012f06707f0"> <vuln vid="ed124f8c-82a2-11db-b46b-0012f06707f0">
<topic>libmusicbrainz -- multiple buffer overflow vulnerabilities</topic> <topic>libmusicbrainz -- multiple buffer overflow vulnerabilities</topic>
<affects> <affects>
@ -343,7 +343,6 @@ Note: Please add new entries to the beginning of this file.
vulnerabilities because the application fails to check the size of vulnerabilities because the application fails to check the size of
the data before copying it into a finite-sized internal memory the data before copying it into a finite-sized internal memory
buffer.</p> buffer.</p>
<p>An attacker can exploit these issues to execute arbitrary code <p>An attacker can exploit these issues to execute arbitrary code
within the context of the application or to cause a within the context of the application or to cause a
denial-of-service condition.</p> denial-of-service condition.</p>
@ -401,7 +400,6 @@ Note: Please add new entries to the beginning of this file.
vulnerability because the application fails to properly vulnerability because the application fails to properly
bounds-check user-supplied input before copying it to an bounds-check user-supplied input before copying it to an
insufficiently sized memory buffer.</p> insufficiently sized memory buffer.</p>
<p>Exploiting this issue allows attackers to execute arbitrary <p>Exploiting this issue allows attackers to execute arbitrary
machine code in the context of applications that use the machine code in the context of applications that use the
ImageMagick library.</p> ImageMagick library.</p>
@ -642,11 +640,9 @@ Note: Please add new entries to the beginning of this file.
<body xmlns="http://www.w3.org/1999/xhtml"> <body xmlns="http://www.w3.org/1999/xhtml">
<p>Secunia reports:</p> <p>Secunia reports:</p>
<blockquote cite="http://secunia.com/advisories/22732/"> <blockquote cite="http://secunia.com/advisories/22732/">
<p>Some vulnerabilities have been reported in imlib2, which can be <p>Some vulnerabilities have been reported in imlib2, which can be
exploited by malicious people to cause a DoS (Denial of Service) or exploited by malicious people to cause a DoS (Denial of Service)
potentially compromise an application using the library.</p> or potentially compromise an application using the library.</p>
<p>The vulnerabilities are caused due to unspecified errors within <p>The vulnerabilities are caused due to unspecified errors within
the processing of JPG, ARGB, PNG, LBM, PNM, TIFF, and TGA images. the processing of JPG, ARGB, PNG, LBM, PNM, TIFF, and TGA images.
This may be exploited to execute arbitrary code by e.g. tricking a This may be exploited to execute arbitrary code by e.g. tricking a