This is an automated email from the ASF dual-hosted git repository. solomax pushed a commit to branch master in repository https://gitbox.apache.org/repos/asf/openmeetings.git
commit 45995b7c4ddd1e75a30185558a5e72cc650eb185 Author: Maxim Solodovnik <[email protected]> AuthorDate: Wed May 10 13:05:36 2023 +0700 no jira: typo is fixed --- openmeetings-server/src/site/xdoc/security.xml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/openmeetings-server/src/site/xdoc/security.xml b/openmeetings-server/src/site/xdoc/security.xml index db681a657..265744708 100644 --- a/openmeetings-server/src/site/xdoc/security.xml +++ b/openmeetings-server/src/site/xdoc/security.xml @@ -72,7 +72,7 @@ <p>Vendor: The Apache Software Foundation</p> <p>Versions Affected: from 2.0.0 before 7.0.0</p> <p>Description: An attacker who has gained access to an admin account can perform RCE via null-byte injection<br/> - <a href="https://www.cve.org/CVERecord?id=2023-29246">2023-29246</a> + <a href="https://www.cve.org/CVERecord?id=CVE-2023-29246">CVE-2023-29246</a> </p> <p>The issue was fixed in 7.1.0<br/> All users are recommended to upgrade to Apache OpenMeetings 7.1.0</p>
