This is an automated email from the ASF dual-hosted git repository.

solomax pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/openmeetings.git

commit 45995b7c4ddd1e75a30185558a5e72cc650eb185
Author: Maxim Solodovnik <[email protected]>
AuthorDate: Wed May 10 13:05:36 2023 +0700

    no jira: typo is fixed
---
 openmeetings-server/src/site/xdoc/security.xml | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/openmeetings-server/src/site/xdoc/security.xml 
b/openmeetings-server/src/site/xdoc/security.xml
index db681a657..265744708 100644
--- a/openmeetings-server/src/site/xdoc/security.xml
+++ b/openmeetings-server/src/site/xdoc/security.xml
@@ -72,7 +72,7 @@
                        <p>Vendor: The Apache Software Foundation</p>
                        <p>Versions Affected: from 2.0.0 before 7.0.0</p>
                        <p>Description: An attacker who has gained access to an 
admin account can perform RCE via null-byte injection<br/>
-                               <a 
href="https://www.cve.org/CVERecord?id=2023-29246";>2023-29246</a>
+                               <a 
href="https://www.cve.org/CVERecord?id=CVE-2023-29246";>CVE-2023-29246</a>
                        </p>
                        <p>The issue was fixed in 7.1.0<br/>
                                All users are recommended to upgrade to Apache 
OpenMeetings 7.1.0</p>

Reply via email to