My parser would choke on few advisories that contained obviously
broken HTML, like missing and duplicate closing tags.
This commit is contained in:
Christiane Ruetten 2015-07-15 15:41:34 +02:00
Родитель 8faad15eec
Коммит a3bd43fd05
3 изменённых файлов: 2 добавлений и 5 удалений

Просмотреть файл

@ -44,7 +44,4 @@ href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0814"
class="ex-ref">CVE-2015-0814</a>)</li>
</ul>
</ul>

Просмотреть файл

@ -35,7 +35,7 @@ and only Firefox for Android was affected.
(<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0800"
class="ex-ref">CVE-2015-0800</a>)</li>
<li><a href="http://blog.watchfire.com/files/androiddnsweakprng.pdf">
Weak randomness in Androids DNS resolver (CVE-2012-2808)</li>
Weak randomness in Androids DNS resolver (CVE-2012-2808)</a></li>
</ul>

Просмотреть файл

@ -17,7 +17,7 @@ specified in the HTTP/2 response, SSL certificate verification can be bypassed
for the specified alternate server. As a result of this, warnings of invalid SSL
certificates will not be displayed and an attacker could potentially impersonate
another site through a man-in-the-middle (MTIM), replacing the original
certificate with their own.
certificate with their own.</p>
<h3>References</h3>