Author: buildbot
Date: Wed Oct 28 18:07:48 2015
New Revision: 970520

Log:
Staging update by buildbot for ooo-site

Modified:
    websites/staging/ooo-site/trunk/cgi-bin/   (props changed)
    websites/staging/ooo-site/trunk/content/   (props changed)
    websites/staging/ooo-site/trunk/content/security/cves/CVE-2015-1774.html

Propchange: websites/staging/ooo-site/trunk/cgi-bin/
------------------------------------------------------------------------------
--- cms:source-revision (original)
+++ cms:source-revision Wed Oct 28 18:07:48 2015
@@ -1 +1 @@
-1711052
+1711087

Propchange: websites/staging/ooo-site/trunk/content/
------------------------------------------------------------------------------
--- cms:source-revision (original)
+++ cms:source-revision Wed Oct 28 18:07:48 2015
@@ -1 +1 @@
-1711052
+1711087

Modified: 
websites/staging/ooo-site/trunk/content/security/cves/CVE-2015-1774.html
==============================================================================
--- websites/staging/ooo-site/trunk/content/security/cves/CVE-2015-1774.html 
(original)
+++ websites/staging/ooo-site/trunk/content/security/cves/CVE-2015-1774.html 
Wed Oct 28 18:07:48 2015
@@ -26,7 +26,7 @@
          wrapping for the site introduces HTML5 headers and formats.
          This version is modified to match the wrapping that is done as part
          of publishing this page and not rely on any particular styling
-         beyond <p> and <h1> through <h3>.
+         beyond <p>.
          -->
         <p>
             <a 
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-1774";>CVE-2015-1774</a>
@@ -45,9 +45,10 @@
         Updated October 28, 2015</p>
 
         <p>
-        A vulnerability in OpenOffice's HWP filter allows attackers to cause a
-        denial of service (memory corruption and application crash) and 
possible
-        execution of arbitrary code.
+        A vulnerability in OpenOffice's HWP filter allows attackers to craft
+        malicious documents that cause denial of service (memory
+        corruption and application crash) and possible execution of arbitrary
+        code.
     </p>
 
         <p>


Reply via email to