Author: robweir
Date: Wed May 16 14:37:52 2012
New Revision: 1339188
URL: http://svn.apache.org/viewvc?rev=1339188&view=rev
Log:
correct spelling errors
Modified:
incubator/ooo/ooo-site/trunk/content/security/cves/CVE-2012-2149.html
Modified: incubator/ooo/ooo-site/trunk/content/security/cves/CVE-2012-2149.html
URL:
http://svn.apache.org/viewvc/incubator/ooo/ooo-site/trunk/content/security/cves/CVE-2012-2149.html?rev=1339188&r1=1339187&r2=1339188&view=diff
==============================================================================
--- incubator/ooo/ooo-site/trunk/content/security/cves/CVE-2012-2149.html
(original)
+++ incubator/ooo/ooo-site/trunk/content/security/cves/CVE-2012-2149.html Wed
May 16 14:37:52 2012
@@ -28,14 +28,14 @@
<h4>Description:</h4>
<p>
-Description: Effected versions of OpenOffice.org use a customized libwpd that
has an memory overwrite vulnerability that could be exploited by
+Effected versions of OpenOffice.org use a customized libwpd that has a memory
overwrite vulnerability that could be exploited by
a specially crafted Wordperfect WPD-format document, potentially leading to
arbitrary-code execution at application user privilege level.</p>
<h4>Mitigation</h4>
<p>OpenOffice.org 3.3.0 and 3.4 beta users are advised to <a
href="http://download.openoffice.org">upgrade to Apache OpenOffice 3.4</a>,
where
WPD files are ignored. Users who are unable to upgrade immediately should be
-cautious when oppening untrusted WPD documents.</p>
+cautious when opening untrusted WPD documents.</p>
<h4>Credits</h4>