Fossil SCM
Fix typo in the new vuln-report entry on the security-audit page.
Commit
9d7b31552af7f8713c9dab0aa56deac6d0fc88d8cb52c6c0f0204ecc6ac0224c
Parent
6a0d51ded9d636d…
1 file changed
+1
-1
+1
-1
| --- src/security_audit.c | ||
| +++ src/security_audit.c | ||
| @@ -370,11 +370,11 @@ | ||
| 370 | 370 | if( fossil_strcmp(zVulnReport,"block")!=0 |
| 371 | 371 | && fossil_strcmp(zVulnReport,"fatal")!=0 |
| 372 | 372 | ){ |
| 373 | 373 | @ <li><p><b>WARNING:</b> |
| 374 | 374 | @ The <a href="%R/help?cmd=vuln-report">vuln-report setting</a> |
| 375 | - @ has a value of "%h(zVulnReport)". Thisdisables defenses against | |
| 375 | + @ has a value of "%h(zVulnReport)". This disables defenses against | |
| 376 | 376 | @ XSS or SQL-injection vulnerabilities caused by coding errors in |
| 377 | 377 | @ custom TH1 scripts. For the best security, change |
| 378 | 378 | @ the value of the vuln-report setting to "block" or "fatal". |
| 379 | 379 | } |
| 380 | 380 | |
| 381 | 381 |
| --- src/security_audit.c | |
| +++ src/security_audit.c | |
| @@ -370,11 +370,11 @@ | |
| 370 | if( fossil_strcmp(zVulnReport,"block")!=0 |
| 371 | && fossil_strcmp(zVulnReport,"fatal")!=0 |
| 372 | ){ |
| 373 | @ <li><p><b>WARNING:</b> |
| 374 | @ The <a href="%R/help?cmd=vuln-report">vuln-report setting</a> |
| 375 | @ has a value of "%h(zVulnReport)". Thisdisables defenses against |
| 376 | @ XSS or SQL-injection vulnerabilities caused by coding errors in |
| 377 | @ custom TH1 scripts. For the best security, change |
| 378 | @ the value of the vuln-report setting to "block" or "fatal". |
| 379 | } |
| 380 | |
| 381 |
| --- src/security_audit.c | |
| +++ src/security_audit.c | |
| @@ -370,11 +370,11 @@ | |
| 370 | if( fossil_strcmp(zVulnReport,"block")!=0 |
| 371 | && fossil_strcmp(zVulnReport,"fatal")!=0 |
| 372 | ){ |
| 373 | @ <li><p><b>WARNING:</b> |
| 374 | @ The <a href="%R/help?cmd=vuln-report">vuln-report setting</a> |
| 375 | @ has a value of "%h(zVulnReport)". This disables defenses against |
| 376 | @ XSS or SQL-injection vulnerabilities caused by coding errors in |
| 377 | @ custom TH1 scripts. For the best security, change |
| 378 | @ the value of the vuln-report setting to "block" or "fatal". |
| 379 | } |
| 380 | |
| 381 |