Author: robweir
Date: Wed May 16 14:37:52 2012
New Revision: 1339188

URL: http://svn.apache.org/viewvc?rev=1339188&view=rev
Log:
correct spelling errors

Modified:
    incubator/ooo/ooo-site/trunk/content/security/cves/CVE-2012-2149.html

Modified: incubator/ooo/ooo-site/trunk/content/security/cves/CVE-2012-2149.html
URL: 
http://svn.apache.org/viewvc/incubator/ooo/ooo-site/trunk/content/security/cves/CVE-2012-2149.html?rev=1339188&r1=1339187&r2=1339188&view=diff
==============================================================================
--- incubator/ooo/ooo-site/trunk/content/security/cves/CVE-2012-2149.html 
(original)
+++ incubator/ooo/ooo-site/trunk/content/security/cves/CVE-2012-2149.html Wed 
May 16 14:37:52 2012
@@ -28,14 +28,14 @@
 
 <h4>Description:</h4>
 <p>
-Description: Effected versions of OpenOffice.org use a customized libwpd that 
has an memory overwrite vulnerability that could be exploited by
+Effected versions of OpenOffice.org use a customized libwpd that has a memory 
overwrite vulnerability that could be exploited by
 a specially crafted Wordperfect WPD-format document, potentially leading to 
arbitrary-code execution at application user privilege level.</p>
 
         <h4>Mitigation</h4>
         <p>OpenOffice.org 3.3.0 and 3.4 beta users are advised to <a 
 href="http://download.openoffice.org";>upgrade to Apache OpenOffice 3.4</a>, 
where 
 WPD files are ignored. Users who are unable to upgrade immediately should be 
-cautious when oppening untrusted WPD documents.</p>
+cautious when opening untrusted WPD documents.</p>
 
 <h4>Credits</h4>
 


Reply via email to