Author: orcmid Date: Wed Nov 4 22:28:25 2015 New Revision: 1712675 URL: http://svn.apache.org/viewvc?rev=1712675&view=rev Log: Correct Bulletin links in the footer of recent CVEs
Modified: openoffice/ooo-site/trunk/content/security/cves/CVE-2013-1571.html openoffice/ooo-site/trunk/content/security/cves/CVE-2013-2189.html openoffice/ooo-site/trunk/content/security/cves/CVE-2013-4156.html openoffice/ooo-site/trunk/content/security/cves/CVE-2014-3524.html openoffice/ooo-site/trunk/content/security/cves/CVE-2014-3575.html openoffice/ooo-site/trunk/content/security/cves/CVE-2015-1774.html openoffice/ooo-site/trunk/content/security/cves/CVE-2015-4551.html openoffice/ooo-site/trunk/content/security/cves/CVE-2015-5212.html openoffice/ooo-site/trunk/content/security/cves/CVE-2015-5213.html openoffice/ooo-site/trunk/content/security/cves/CVE-2015-5214.html Modified: openoffice/ooo-site/trunk/content/security/cves/CVE-2013-1571.html URL: http://svn.apache.org/viewvc/openoffice/ooo-site/trunk/content/security/cves/CVE-2013-1571.html?rev=1712675&r1=1712674&r2=1712675&view=diff ============================================================================== --- openoffice/ooo-site/trunk/content/security/cves/CVE-2013-1571.html (original) +++ openoffice/ooo-site/trunk/content/security/cves/CVE-2013-1571.html Wed Nov 4 22:28:25 2015 @@ -13,31 +13,31 @@ Frame Injection Vulnerability in SDK JavaDoc </h3> - <ul> - + <ul> + <h4>Severity: Medium</h4> <h4>Vendor: The Apache Software Foundation</h4> - + <h4>Versions Affected:</h4> <ul> <li>Apache OpenOffice 3.4.1 SDK, on all platforms.</li> <li>Earlier versions may be also affected.</li> </ul> - + <h4>Description:</h4> <p> As reported on June 18th there is a <a href="http://www.kb.cert.org/vuls/id/225657">vulnerability in JavaDoc</a> generated by Java 5, Java 6 and Java 7 before update 22. Generated - JavaDoc files could be suceptible to HTML frame injection attacks. Our investigation indicated that the UDK 3.2.7 Java API Reference in the Apache OpenOffice SDK contains + JavaDoc files could be suceptible to HTML frame injection attacks. Our investigation indicated that the UDK 3.2.7 Java API Reference in the Apache OpenOffice SDK contains a vulnerable HTML file.</p> <p>Note: Ordinary installs of OpenOffice are not impacted by this vulnerability. Only installs of the OpenOffice SDK, typically only installed by software developers writing extensions, are impacted</p> <h4>Mitigation</h4> - <p>SDK users should update their installations by replacing /docs/java/ref/index.html with this - <a href="http://archive.apache.org/dist/incubator/ooo/3.4.1/source/cve-2013-1571.zip">patched version</a>. + <p>SDK users should update their installations by replacing /docs/java/ref/index.html with this + <a href="http://archive.apache.org/dist/incubator/ooo/3.4.1/source/cve-2013-1571.zip">patched version</a>. Download, unzip and follow the instructions in the enclosed README file.</p> <p>Users with earlier versions of the SDK (pre 3.4.1) should <a href="http://www.download.openoffice.org/download/other.html#tested-sdk">upgrade to the current version</a> and then apply the patch. Alternative, they can download and run @@ -48,8 +48,8 @@ As reported on June 18th there is a <a h <h4>Verifying the Integrity of Downloaded Files</h4> <p> -We have provided <a href="http://archive.apache.org/dist/incubator/ooo/3.4.1/source/cve-2013-1571.zip.md5">MD5</a> and <a href="http://archive.apache.org/dist/incubator/ooo/3.4.1/source/cve-2013-1571.zip.sha256">SHA256</a> hashes of these patches, - as well as a <a href="http://archive.apache.org/dist/incubator/ooo/3.4.1/source/cve-2013-1571.zip.asc">GPG/PGP detached digital signature</a>, for those who wish to verify the +We have provided <a href="http://archive.apache.org/dist/incubator/ooo/3.4.1/source/cve-2013-1571.zip.md5">MD5</a> and <a href="http://archive.apache.org/dist/incubator/ooo/3.4.1/source/cve-2013-1571.zip.sha256">SHA256</a> hashes of these patches, + as well as a <a href="http://archive.apache.org/dist/incubator/ooo/3.4.1/source/cve-2013-1571.zip.asc">GPG/PGP detached digital signature</a>, for those who wish to verify the integrity of this file. <p> The MD5 and SHA256 hashes can be verified using Unix tools like md5sum or sha256sum. @@ -77,7 +77,7 @@ The PGP signatures can be verified using <hr /> - <p><a href="http://security.openoffice.org">Security Home</a> -> <a href="http://security.openoffice.org/bulletin.html">Bulletin</a> -> + <p><a href="http://security.openoffice.org">Security Home</a> -> <a href="http://security.openoffice.org/security/bulletin.html">Bulletin</a> -> <a href="http://security.openoffice.org/security/cves/CVE-2013-1571.html">CVE-2013-1571</a></p> </body> </html> Modified: openoffice/ooo-site/trunk/content/security/cves/CVE-2013-2189.html URL: http://svn.apache.org/viewvc/openoffice/ooo-site/trunk/content/security/cves/CVE-2013-2189.html?rev=1712675&r1=1712674&r2=1712675&view=diff ============================================================================== --- openoffice/ooo-site/trunk/content/security/cves/CVE-2013-2189.html (original) +++ openoffice/ooo-site/trunk/content/security/cves/CVE-2013-2189.html Wed Nov 4 22:28:25 2015 @@ -1,41 +1,41 @@ <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head profile="http://www.w3.org/2005/10/profile"> - <title>CVE-2013-2189</title> - <style type="text/css"></style> + <title>CVE-2013-2189</title> + <style type="text/css"></style> </head> <body> - <h2><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-2189">CVE-2013-2189</a></h2> + <h2><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-2189">CVE-2013-2189</a></h2> - <h3>OpenOffice DOC Memory Corruption Vulnerability</h3> + <h3>OpenOffice DOC Memory Corruption Vulnerability</h3> - <ul> - <h4>Severity: Important</h4> - <h4>Vendor: The Apache Software Foundation</h4> - <h4>Versions Affected:</h4> - <ul> - <li>Apache OpenOffice 3.4.0 to 3.4.1, on all platforms.</li> - <li>Earlier versions may be also affected.</li> - </ul> - - <h4>Description:</h4> - <p>The vulnerability is caused by operating on invalid PLCF (Plex of Character Positions in File) data when parsing a malformed DOC document file. - Specially crafted documents can be used for denial-of-service attacks. - Further exploits are possible but have not been verified. - - <h4>Mitigation</h4> - <p>Apache OpenOffice 3.4 users are advised to <a href="http://download.openoffice.org">upgrade to Apache OpenOffice 4.0</a>. - Users who are unable to upgrade immediately should be cautious when opening untrusted documents. - - <h4>Credits</h4> - <p>The Apache OpenOffice security team credits Jeremy Brown of Microsoft Vulnerability Research as the discoverer of this flaw.</p> - - <hr /> - - <p><a href="http://security.openoffice.org">Security Home</a> - -> <a href="http://security.openoffice.org/bulletin.html">Bulletin</a> - -> <a href="http://security.openoffice.org/security/cves/CVE-2013-2189.html">CVE-2013-2189</a></p> + <ul> + <h4>Severity: Important</h4> + <h4>Vendor: The Apache Software Foundation</h4> + <h4>Versions Affected:</h4> + <ul> + <li>Apache OpenOffice 3.4.0 to 3.4.1, on all platforms.</li> + <li>Earlier versions may be also affected.</li> + </ul> + + <h4>Description:</h4> + <p>The vulnerability is caused by operating on invalid PLCF (Plex of Character Positions in File) data when parsing a malformed DOC document file. + Specially crafted documents can be used for denial-of-service attacks. + Further exploits are possible but have not been verified. + + <h4>Mitigation</h4> + <p>Apache OpenOffice 3.4 users are advised to <a href="http://download.openoffice.org">upgrade to Apache OpenOffice 4.0</a>. + Users who are unable to upgrade immediately should be cautious when opening untrusted documents. + + <h4>Credits</h4> + <p>The Apache OpenOffice security team credits Jeremy Brown of Microsoft Vulnerability Research as the discoverer of this flaw.</p> + + <hr /> + + <p><a href="http://security.openoffice.org">Security Home</a> + -> <a href="http://security.openoffice.org/security/bulletin.html">Bulletin</a> + -> <a href="http://security.openoffice.org/security/cves/CVE-2013-2189.html">CVE-2013-2189</a></p> </body> </html> Modified: openoffice/ooo-site/trunk/content/security/cves/CVE-2013-4156.html URL: http://svn.apache.org/viewvc/openoffice/ooo-site/trunk/content/security/cves/CVE-2013-4156.html?rev=1712675&r1=1712674&r2=1712675&view=diff ============================================================================== --- openoffice/ooo-site/trunk/content/security/cves/CVE-2013-4156.html (original) +++ openoffice/ooo-site/trunk/content/security/cves/CVE-2013-4156.html Wed Nov 4 22:28:25 2015 @@ -1,41 +1,41 @@ <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head profile="http://www.w3.org/2005/10/profile"> - <title>CVE-2013-4156</title> - <style type="text/css"></style> + <title>CVE-2013-4156</title> + <style type="text/css"></style> </head> <body> - <h2><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-4156">CVE-2013-4156</a></h2> + <h2><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-4156">CVE-2013-4156</a></h2> - <h3>OpenOffice DOCM Memory Corruption Vulnerability</h3> + <h3>OpenOffice DOCM Memory Corruption Vulnerability</h3> - <ul> - <h4>Severity: Important</h4> - <h4>Vendor: The Apache Software Foundation</h4> - <h4>Versions Affected:</h4> - <ul> - <li>Apache OpenOffice 3.4.0 to 3.4.1, on all platforms.</li> - <li>Earlier versions may be also affected.</li> - </ul> - - <h4>Description:</h4> - <p>The vulnerability is caused by mishandling of unknown XML elements when parsing OOXML document files. - Specially crafted documents can be used for denial-of-service attacks. - Further exploits are possible but have not been verified. - - <h4>Mitigation</h4> - <p>Apache OpenOffice 3.4 users are advised to <a href="http://download.openoffice.org">upgrade to Apache OpenOffice 4.0</a>. - Users who are unable to upgrade immediately should be cautious when opening untrusted documents. - - <h4>Credits</h4> - <p>The Apache OpenOffice security team credits Jeremy Brown of Microsoft Vulnerability Research as the discoverer of this flaw.</p> - - <hr /> - - <p><a href="http://security.openoffice.org">Security Home</a> - -> <a href="http://security.openoffice.org/bulletin.html">Bulletin</a> - -> <a href="http://security.openoffice.org/security/cves/CVE-2013-4156.html">CVE-2013-4156</a></p> + <ul> + <h4>Severity: Important</h4> + <h4>Vendor: The Apache Software Foundation</h4> + <h4>Versions Affected:</h4> + <ul> + <li>Apache OpenOffice 3.4.0 to 3.4.1, on all platforms.</li> + <li>Earlier versions may be also affected.</li> + </ul> + + <h4>Description:</h4> + <p>The vulnerability is caused by mishandling of unknown XML elements when parsing OOXML document files. + Specially crafted documents can be used for denial-of-service attacks. + Further exploits are possible but have not been verified. + + <h4>Mitigation</h4> + <p>Apache OpenOffice 3.4 users are advised to <a href="http://download.openoffice.org">upgrade to Apache OpenOffice 4.0</a>. + Users who are unable to upgrade immediately should be cautious when opening untrusted documents. + + <h4>Credits</h4> + <p>The Apache OpenOffice security team credits Jeremy Brown of Microsoft Vulnerability Research as the discoverer of this flaw.</p> + + <hr /> + + <p><a href="http://security.openoffice.org">Security Home</a> + -> <a href="http://security.openoffice.org/security/bulletin.html">Bulletin</a> + -> <a href="http://security.openoffice.org/security/cves/CVE-2013-4156.html">CVE-2013-4156</a></p> </body> </html> Modified: openoffice/ooo-site/trunk/content/security/cves/CVE-2014-3524.html URL: http://svn.apache.org/viewvc/openoffice/ooo-site/trunk/content/security/cves/CVE-2014-3524.html?rev=1712675&r1=1712674&r2=1712675&view=diff ============================================================================== --- openoffice/ooo-site/trunk/content/security/cves/CVE-2014-3524.html (original) +++ openoffice/ooo-site/trunk/content/security/cves/CVE-2014-3524.html Wed Nov 4 22:28:25 2015 @@ -1,41 +1,41 @@ <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head profile="http://www.w3.org/2005/10/profile"> - <title>CVE-2014-3524</title> - <style type="text/css"></style> + <title>CVE-2014-3524</title> + <style type="text/css"></style> </head> <body> - <h2><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-3524">CVE-2014-3524</a></h2> + <h2><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-3524">CVE-2014-3524</a></h2> - <h3>OpenOffice Calc Command Injection Vulnerability</h3> + <h3>OpenOffice Calc Command Injection Vulnerability</h3> - <ul> - <h4>Severity: Important</h4> - <h4>Vendor: The Apache Software Foundation</h4> - <h4>Versions Affected:</h4> - <ul> - <li>Apache OpenOffice 4.1.0 and older on Windows.</li> - <li>OpenOffice.org versions are also affected.</li> - </ul> - - <h4>Description:</h4> - <p>The vulnerability allows command injection when loading Calc spreadsheets. - Specially crafted documents can be used for command-injection attacks. - Further exploits are possible but have not been verified. - - <h4>Mitigation</h4> - <p>Apache OpenOffice users are advised to <a href="http://download.openoffice.org">upgrade to Apache OpenOffice 4.1.1</a>. - Users who are unable to upgrade immediately should be cautious when opening untrusted documents. - - <h4>Credits</h4> - <p>The Apache OpenOffice security team credits Rohan Durve and James Kettle of Context Information Security as the discoverer of this flaw.</p> - - <hr /> - - <p><a href="http://security.openoffice.org">Security Home</a> - -> <a href="http://security.openoffice.org/bulletin.html">Bulletin</a> - -> <a href="http://security.openoffice.org/security/cves/CVE-2014-3524.html">CVE-2014-3524</a></p> + <ul> + <h4>Severity: Important</h4> + <h4>Vendor: The Apache Software Foundation</h4> + <h4>Versions Affected:</h4> + <ul> + <li>Apache OpenOffice 4.1.0 and older on Windows.</li> + <li>OpenOffice.org versions are also affected.</li> + </ul> + + <h4>Description:</h4> + <p>The vulnerability allows command injection when loading Calc spreadsheets. + Specially crafted documents can be used for command-injection attacks. + Further exploits are possible but have not been verified. + + <h4>Mitigation</h4> + <p>Apache OpenOffice users are advised to <a href="http://download.openoffice.org">upgrade to Apache OpenOffice 4.1.1</a>. + Users who are unable to upgrade immediately should be cautious when opening untrusted documents. + + <h4>Credits</h4> + <p>The Apache OpenOffice security team credits Rohan Durve and James Kettle of Context Information Security as the discoverer of this flaw.</p> + + <hr /> + + <p><a href="http://security.openoffice.org">Security Home</a> + -> <a href="http://security.openoffice.org/security/bulletin.html">Bulletin</a> + -> <a href="http://security.openoffice.org/security/cves/CVE-2014-3524.html">CVE-2014-3524</a></p> </body> </html> Modified: openoffice/ooo-site/trunk/content/security/cves/CVE-2014-3575.html URL: http://svn.apache.org/viewvc/openoffice/ooo-site/trunk/content/security/cves/CVE-2014-3575.html?rev=1712675&r1=1712674&r2=1712675&view=diff ============================================================================== --- openoffice/ooo-site/trunk/content/security/cves/CVE-2014-3575.html (original) +++ openoffice/ooo-site/trunk/content/security/cves/CVE-2014-3575.html Wed Nov 4 22:28:25 2015 @@ -1,41 +1,41 @@ <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head profile="http://www.w3.org/2005/10/profile"> - <title>CVE-2014-3575</title> - <style type="text/css"></style> + <title>CVE-2014-3575</title> + <style type="text/css"></style> </head> <body> - <h2><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-3575">CVE-2014-3575</a></h2> + <h2><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-3575">CVE-2014-3575</a></h2> - <h3>OpenOffice Targeted Data Exposure Using Crafted OLE Objects</h3> + <h3>OpenOffice Targeted Data Exposure Using Crafted OLE Objects</h3> - <ul> - <h4>Severity: Important</h4> - <h4>Vendor: The Apache Software Foundation</h4> - <h4>Versions Affected:</h4> - <ul> - <li>Apache OpenOffice 4.1.0 and older on Windows.</li> - <li>OpenOffice.org versions are also affected.</li> - </ul> - - <h4>Description:</h4> - <p>The exposure exploits the way OLE previews are generated to embed arbitrary - file data into a specially crafted document when it is opened. Data exposure is - possible if the updated document is distributed to other parties. - - <h4>Mitigation</h4> - <p>Apache OpenOffice users are advised to <a href="http://download.openoffice.org">upgrade to Apache OpenOffice 4.1.1</a>. - Users who are unable to upgrade immediately should be cautious when they are asked to "Update Links" for untrusted documents. - - <h4>Credits</h4> - <p>The Apache OpenOffice security team credits Open-Xchange for reporting this flaw.</p> - - <hr /> - - <p><a href="http://security.openoffice.org">Security Home</a> - -> <a href="http://security.openoffice.org/bulletin.html">Bulletin</a> - -> <a href="http://security.openoffice.org/security/cves/CVE-2014-3575.html">CVE-2014-3575</a></p> + <ul> + <h4>Severity: Important</h4> + <h4>Vendor: The Apache Software Foundation</h4> + <h4>Versions Affected:</h4> + <ul> + <li>Apache OpenOffice 4.1.0 and older on Windows.</li> + <li>OpenOffice.org versions are also affected.</li> + </ul> + + <h4>Description:</h4> + <p>The exposure exploits the way OLE previews are generated to embed arbitrary + file data into a specially crafted document when it is opened. Data exposure is + possible if the updated document is distributed to other parties. + + <h4>Mitigation</h4> + <p>Apache OpenOffice users are advised to <a href="http://download.openoffice.org">upgrade to Apache OpenOffice 4.1.1</a>. + Users who are unable to upgrade immediately should be cautious when they are asked to "Update Links" for untrusted documents. + + <h4>Credits</h4> + <p>The Apache OpenOffice security team credits Open-Xchange for reporting this flaw.</p> + + <hr /> + + <p><a href="http://security.openoffice.org">Security Home</a> + -> <a href="http://security.openoffice.org/security/bulletin.html">Bulletin</a> + -> <a href="http://security.openoffice.org/security/cves/CVE-2014-3575.html">CVE-2014-3575</a></p> </body> </html> Modified: openoffice/ooo-site/trunk/content/security/cves/CVE-2015-1774.html URL: http://svn.apache.org/viewvc/openoffice/ooo-site/trunk/content/security/cves/CVE-2015-1774.html?rev=1712675&r1=1712674&r2=1712675&view=diff ============================================================================== --- openoffice/ooo-site/trunk/content/security/cves/CVE-2015-1774.html (original) +++ openoffice/ooo-site/trunk/content/security/cves/CVE-2015-1774.html Wed Nov 4 22:28:25 2015 @@ -96,7 +96,7 @@ <p> <a href="http://security.openoffice.org">Security Home</a> - -> <a href="http://security.openoffice.org/bulletin.html">Bulletin</a> + -> <a href="http://security.openoffice.org/security/bulletin.html">Bulletin</a> -> <a href="http://www.openoffice.org/security/cves/CVE-2015-1774.html">CVE-2015-1774</a> </p> </body> Modified: openoffice/ooo-site/trunk/content/security/cves/CVE-2015-4551.html URL: http://svn.apache.org/viewvc/openoffice/ooo-site/trunk/content/security/cves/CVE-2015-4551.html?rev=1712675&r1=1712674&r2=1712675&view=diff ============================================================================== --- openoffice/ooo-site/trunk/content/security/cves/CVE-2015-4551.html [UTF-8] (original) +++ openoffice/ooo-site/trunk/content/security/cves/CVE-2015-4551.html [UTF-8] Wed Nov 4 22:28:25 2015 @@ -117,7 +117,7 @@ <p> <a href="http://security.openoffice.org">Security Home</a> - -> <a href="http://security.openoffice.org/bulletin.html">Bulletin</a> + -> <a href="http://security.openoffice.org/security/bulletin.html">Bulletin</a> -> <a href="http://www.openoffice.org/security/cves/CVE-2015-4551.html">CVE-2015-4551</a> </p> </body> Modified: openoffice/ooo-site/trunk/content/security/cves/CVE-2015-5212.html URL: http://svn.apache.org/viewvc/openoffice/ooo-site/trunk/content/security/cves/CVE-2015-5212.html?rev=1712675&r1=1712674&r2=1712675&view=diff ============================================================================== --- openoffice/ooo-site/trunk/content/security/cves/CVE-2015-5212.html [UTF-8] (original) +++ openoffice/ooo-site/trunk/content/security/cves/CVE-2015-5212.html [UTF-8] Wed Nov 4 22:28:25 2015 @@ -102,7 +102,7 @@ <p> <a href="http://security.openoffice.org">Security Home</a> - -> <a href="http://security.openoffice.org/bulletin.html">Bulletin</a> + -> <a href="http://security.openoffice.org/security/bulletin.html">Bulletin</a> -> <a href="http://www.openoffice.org/security/cves/CVE-2015-5212.html">CVE-2015-5212</a> </p> </body> Modified: openoffice/ooo-site/trunk/content/security/cves/CVE-2015-5213.html URL: http://svn.apache.org/viewvc/openoffice/ooo-site/trunk/content/security/cves/CVE-2015-5213.html?rev=1712675&r1=1712674&r2=1712675&view=diff ============================================================================== --- openoffice/ooo-site/trunk/content/security/cves/CVE-2015-5213.html [UTF-8] (original) +++ openoffice/ooo-site/trunk/content/security/cves/CVE-2015-5213.html [UTF-8] Wed Nov 4 22:28:25 2015 @@ -97,7 +97,7 @@ <p> <a href="http://security.openoffice.org">Security Home</a> - -> <a href="http://security.openoffice.org/bulletin.html">Bulletin</a> + -> <a href="http://security.openoffice.org/security/bulletin.html">Bulletin</a> -> <a href="http://www.openoffice.org/security/cves/CVE-2015-5213.html">CVE-2015-5213</a> </p> </body> Modified: openoffice/ooo-site/trunk/content/security/cves/CVE-2015-5214.html URL: http://svn.apache.org/viewvc/openoffice/ooo-site/trunk/content/security/cves/CVE-2015-5214.html?rev=1712675&r1=1712674&r2=1712675&view=diff ============================================================================== --- openoffice/ooo-site/trunk/content/security/cves/CVE-2015-5214.html [UTF-8] (original) +++ openoffice/ooo-site/trunk/content/security/cves/CVE-2015-5214.html [UTF-8] Wed Nov 4 22:28:25 2015 @@ -97,7 +97,7 @@ <p> <a href="http://security.openoffice.org">Security Home</a> - -> <a href="http://security.openoffice.org/bulletin.html">Bulletin</a> + -> <a href="http://security.openoffice.org/security/bulletin.html">Bulletin</a> -> <a href="http://www.openoffice.org/security/cves/CVE-2015-5214.html">CVE-2015-5214</a> </p> </body>