Author: orcmid
Date: Wed Nov  4 22:28:25 2015
New Revision: 1712675

URL: http://svn.apache.org/viewvc?rev=1712675&view=rev
Log:
Correct Bulletin links in the footer of recent CVEs

Modified:
    openoffice/ooo-site/trunk/content/security/cves/CVE-2013-1571.html
    openoffice/ooo-site/trunk/content/security/cves/CVE-2013-2189.html
    openoffice/ooo-site/trunk/content/security/cves/CVE-2013-4156.html
    openoffice/ooo-site/trunk/content/security/cves/CVE-2014-3524.html
    openoffice/ooo-site/trunk/content/security/cves/CVE-2014-3575.html
    openoffice/ooo-site/trunk/content/security/cves/CVE-2015-1774.html
    openoffice/ooo-site/trunk/content/security/cves/CVE-2015-4551.html
    openoffice/ooo-site/trunk/content/security/cves/CVE-2015-5212.html
    openoffice/ooo-site/trunk/content/security/cves/CVE-2015-5213.html
    openoffice/ooo-site/trunk/content/security/cves/CVE-2015-5214.html

Modified: openoffice/ooo-site/trunk/content/security/cves/CVE-2013-1571.html
URL: 
http://svn.apache.org/viewvc/openoffice/ooo-site/trunk/content/security/cves/CVE-2013-1571.html?rev=1712675&r1=1712674&r2=1712675&view=diff
==============================================================================
--- openoffice/ooo-site/trunk/content/security/cves/CVE-2013-1571.html 
(original)
+++ openoffice/ooo-site/trunk/content/security/cves/CVE-2013-1571.html Wed Nov  
4 22:28:25 2015
@@ -13,31 +13,31 @@
   Frame Injection Vulnerability in SDK JavaDoc
   </h3>
 
-    <ul>   
-    
+    <ul>
+
         <h4>Severity: Medium</h4>
 
         <h4>Vendor: The Apache Software Foundation</h4>
-        
+
         <h4>Versions Affected:</h4>
                                  <ul>
                                      <li>Apache OpenOffice 3.4.1 SDK, on all 
platforms.</li>
                                      <li>Earlier versions may be also 
affected.</li>
                                  </ul>
-            
+
 
 <h4>Description:</h4>
 <p>
 As reported on June 18th there is a <a 
href="http://www.kb.cert.org/vuls/id/225657";>vulnerability in JavaDoc</a> 
generated by Java 5, Java 6 and Java 7 before update 22.  Generated
-        JavaDoc files could be suceptible to HTML frame injection attacks. Our 
investigation indicated that the UDK 3.2.7 Java API Reference in the Apache 
OpenOffice SDK contains 
+        JavaDoc files could be suceptible to HTML frame injection attacks. Our 
investigation indicated that the UDK 3.2.7 Java API Reference in the Apache 
OpenOffice SDK contains
         a vulnerable HTML file.</p>
 
 <p>Note:  Ordinary installs of OpenOffice are not impacted by this 
vulnerability.  Only installs of the OpenOffice SDK, typically only installed 
by software developers writing
         extensions, are impacted</p>
 
         <h4>Mitigation</h4>
-        <p>SDK users should update their installations by replacing 
/docs/java/ref/index.html with this 
-        <a 
href="http://archive.apache.org/dist/incubator/ooo/3.4.1/source/cve-2013-1571.zip";>patched
 version</a>.  
+        <p>SDK users should update their installations by replacing 
/docs/java/ref/index.html with this
+        <a 
href="http://archive.apache.org/dist/incubator/ooo/3.4.1/source/cve-2013-1571.zip";>patched
 version</a>.
         Download, unzip and follow the  instructions in the enclosed README 
file.</p>
 
         <p>Users with earlier versions of the SDK (pre 3.4.1) should <a 
href="http://www.download.openoffice.org/download/other.html#tested-sdk";>upgrade
 to the current version</a> and then apply the patch.  Alternative, they can 
download and run
@@ -48,8 +48,8 @@ As reported on June 18th there is a <a h
 <h4>Verifying the Integrity of Downloaded Files</h4>
 
 <p>
-We have provided <a 
href="http://archive.apache.org/dist/incubator/ooo/3.4.1/source/cve-2013-1571.zip.md5";>MD5</a>
 and <a 
href="http://archive.apache.org/dist/incubator/ooo/3.4.1/source/cve-2013-1571.zip.sha256";>SHA256</a>
 hashes of these patches, 
-        as well as a <a 
href="http://archive.apache.org/dist/incubator/ooo/3.4.1/source/cve-2013-1571.zip.asc";>GPG/PGP
 detached digital signature</a>, for those who wish to verify the 
+We have provided <a 
href="http://archive.apache.org/dist/incubator/ooo/3.4.1/source/cve-2013-1571.zip.md5";>MD5</a>
 and <a 
href="http://archive.apache.org/dist/incubator/ooo/3.4.1/source/cve-2013-1571.zip.sha256";>SHA256</a>
 hashes of these patches,
+        as well as a <a 
href="http://archive.apache.org/dist/incubator/ooo/3.4.1/source/cve-2013-1571.zip.asc";>GPG/PGP
 detached digital signature</a>, for those who wish to verify the
         integrity of this file.
 <p>
 The MD5 and SHA256 hashes can be verified using Unix tools like md5sum or 
sha256sum.
@@ -77,7 +77,7 @@ The PGP signatures can be verified using
 
   <hr />
 
-  <p><a href="http://security.openoffice.org";>Security Home</a> -&gt; <a 
href="http://security.openoffice.org/bulletin.html";>Bulletin</a> -&gt; 
+  <p><a href="http://security.openoffice.org";>Security Home</a> -&gt; <a 
href="http://security.openoffice.org/security/bulletin.html";>Bulletin</a> -&gt;
   <a 
href="http://security.openoffice.org/security/cves/CVE-2013-1571.html";>CVE-2013-1571</a></p>
 </body>
 </html>

Modified: openoffice/ooo-site/trunk/content/security/cves/CVE-2013-2189.html
URL: 
http://svn.apache.org/viewvc/openoffice/ooo-site/trunk/content/security/cves/CVE-2013-2189.html?rev=1712675&r1=1712674&r2=1712675&view=diff
==============================================================================
--- openoffice/ooo-site/trunk/content/security/cves/CVE-2013-2189.html 
(original)
+++ openoffice/ooo-site/trunk/content/security/cves/CVE-2013-2189.html Wed Nov  
4 22:28:25 2015
@@ -1,41 +1,41 @@
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" 
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
 <html xmlns="http://www.w3.org/1999/xhtml";>
 <head profile="http://www.w3.org/2005/10/profile";>
-       <title>CVE-2013-2189</title>
-       <style type="text/css"></style>
+    <title>CVE-2013-2189</title>
+    <style type="text/css"></style>
 </head>
 
 <body>
-       <h2><a 
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-2189";>CVE-2013-2189</a></h2>
+    <h2><a 
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-2189";>CVE-2013-2189</a></h2>
 
-       <h3>OpenOffice DOC Memory Corruption Vulnerability</h3>
+    <h3>OpenOffice DOC Memory Corruption Vulnerability</h3>
 
-       <ul>   
-       <h4>Severity: Important</h4>
-       <h4>Vendor: The Apache Software Foundation</h4>
-       <h4>Versions Affected:</h4>
-               <ul>
-               <li>Apache OpenOffice 3.4.0 to 3.4.1, on all platforms.</li>
-               <li>Earlier versions may be also affected.</li>
-       </ul>
-
-       <h4>Description:</h4>
-       <p>The vulnerability is caused by operating on invalid PLCF (Plex of 
Character Positions in File) data when parsing a malformed DOC document file.
-       Specially crafted documents can be used for denial-of-service attacks.
-       Further exploits are possible but have not been verified.
-
-       <h4>Mitigation</h4>
-       <p>Apache OpenOffice 3.4 users are advised to <a 
href="http://download.openoffice.org";>upgrade to Apache OpenOffice 4.0</a>.
-       Users who are unable to upgrade immediately should be cautious when 
opening untrusted documents.
-
-       <h4>Credits</h4>
-       <p>The Apache OpenOffice security team credits Jeremy Brown of 
Microsoft Vulnerability Research as the discoverer of this flaw.</p>
-
-       <hr />
-
-       <p><a href="http://security.openoffice.org";>Security Home</a>
-       -&gt; <a 
href="http://security.openoffice.org/bulletin.html";>Bulletin</a>
-       -&gt; <a 
href="http://security.openoffice.org/security/cves/CVE-2013-2189.html";>CVE-2013-2189</a></p>
+    <ul>
+    <h4>Severity: Important</h4>
+    <h4>Vendor: The Apache Software Foundation</h4>
+    <h4>Versions Affected:</h4>
+        <ul>
+        <li>Apache OpenOffice 3.4.0 to 3.4.1, on all platforms.</li>
+        <li>Earlier versions may be also affected.</li>
+    </ul>
+
+    <h4>Description:</h4>
+    <p>The vulnerability is caused by operating on invalid PLCF (Plex of 
Character Positions in File) data when parsing a malformed DOC document file.
+    Specially crafted documents can be used for denial-of-service attacks.
+    Further exploits are possible but have not been verified.
+
+    <h4>Mitigation</h4>
+    <p>Apache OpenOffice 3.4 users are advised to <a 
href="http://download.openoffice.org";>upgrade to Apache OpenOffice 4.0</a>.
+    Users who are unable to upgrade immediately should be cautious when 
opening untrusted documents.
+
+    <h4>Credits</h4>
+    <p>The Apache OpenOffice security team credits Jeremy Brown of Microsoft 
Vulnerability Research as the discoverer of this flaw.</p>
+
+    <hr />
+
+    <p><a href="http://security.openoffice.org";>Security Home</a>
+    -&gt; <a 
href="http://security.openoffice.org/security/bulletin.html";>Bulletin</a>
+    -&gt; <a 
href="http://security.openoffice.org/security/cves/CVE-2013-2189.html";>CVE-2013-2189</a></p>
 </body>
 </html>
 

Modified: openoffice/ooo-site/trunk/content/security/cves/CVE-2013-4156.html
URL: 
http://svn.apache.org/viewvc/openoffice/ooo-site/trunk/content/security/cves/CVE-2013-4156.html?rev=1712675&r1=1712674&r2=1712675&view=diff
==============================================================================
--- openoffice/ooo-site/trunk/content/security/cves/CVE-2013-4156.html 
(original)
+++ openoffice/ooo-site/trunk/content/security/cves/CVE-2013-4156.html Wed Nov  
4 22:28:25 2015
@@ -1,41 +1,41 @@
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" 
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
 <html xmlns="http://www.w3.org/1999/xhtml";>
 <head profile="http://www.w3.org/2005/10/profile";>
-       <title>CVE-2013-4156</title>
-       <style type="text/css"></style>
+    <title>CVE-2013-4156</title>
+    <style type="text/css"></style>
 </head>
 
 <body>
-       <h2><a 
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-4156";>CVE-2013-4156</a></h2>
+    <h2><a 
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-4156";>CVE-2013-4156</a></h2>
 
-       <h3>OpenOffice DOCM Memory Corruption Vulnerability</h3>
+    <h3>OpenOffice DOCM Memory Corruption Vulnerability</h3>
 
-       <ul>   
-       <h4>Severity: Important</h4>
-       <h4>Vendor: The Apache Software Foundation</h4>
-       <h4>Versions Affected:</h4>
-               <ul>
-               <li>Apache OpenOffice 3.4.0 to 3.4.1, on all platforms.</li>
-               <li>Earlier versions may be also affected.</li>
-       </ul>
-
-       <h4>Description:</h4>
-       <p>The vulnerability is caused by mishandling of unknown XML elements 
when parsing OOXML document files.
-       Specially crafted documents can be used for denial-of-service attacks.
-       Further exploits are possible but have not been verified.
-
-       <h4>Mitigation</h4>
-       <p>Apache OpenOffice 3.4 users are advised to <a 
href="http://download.openoffice.org";>upgrade to Apache OpenOffice 4.0</a>.
-       Users who are unable to upgrade immediately should be cautious when 
opening untrusted documents.
-
-       <h4>Credits</h4>
-       <p>The Apache OpenOffice security team credits Jeremy Brown of 
Microsoft Vulnerability Research as the discoverer of this flaw.</p>
-
-       <hr />
-
-       <p><a href="http://security.openoffice.org";>Security Home</a>
-       -&gt; <a 
href="http://security.openoffice.org/bulletin.html";>Bulletin</a>
-       -&gt; <a 
href="http://security.openoffice.org/security/cves/CVE-2013-4156.html";>CVE-2013-4156</a></p>
+    <ul>
+    <h4>Severity: Important</h4>
+    <h4>Vendor: The Apache Software Foundation</h4>
+    <h4>Versions Affected:</h4>
+        <ul>
+        <li>Apache OpenOffice 3.4.0 to 3.4.1, on all platforms.</li>
+        <li>Earlier versions may be also affected.</li>
+    </ul>
+
+    <h4>Description:</h4>
+    <p>The vulnerability is caused by mishandling of unknown XML elements when 
parsing OOXML document files.
+    Specially crafted documents can be used for denial-of-service attacks.
+    Further exploits are possible but have not been verified.
+
+    <h4>Mitigation</h4>
+    <p>Apache OpenOffice 3.4 users are advised to <a 
href="http://download.openoffice.org";>upgrade to Apache OpenOffice 4.0</a>.
+    Users who are unable to upgrade immediately should be cautious when 
opening untrusted documents.
+
+    <h4>Credits</h4>
+    <p>The Apache OpenOffice security team credits Jeremy Brown of Microsoft 
Vulnerability Research as the discoverer of this flaw.</p>
+
+    <hr />
+
+    <p><a href="http://security.openoffice.org";>Security Home</a>
+    -&gt; <a 
href="http://security.openoffice.org/security/bulletin.html";>Bulletin</a>
+    -&gt; <a 
href="http://security.openoffice.org/security/cves/CVE-2013-4156.html";>CVE-2013-4156</a></p>
 </body>
 </html>
 

Modified: openoffice/ooo-site/trunk/content/security/cves/CVE-2014-3524.html
URL: 
http://svn.apache.org/viewvc/openoffice/ooo-site/trunk/content/security/cves/CVE-2014-3524.html?rev=1712675&r1=1712674&r2=1712675&view=diff
==============================================================================
--- openoffice/ooo-site/trunk/content/security/cves/CVE-2014-3524.html 
(original)
+++ openoffice/ooo-site/trunk/content/security/cves/CVE-2014-3524.html Wed Nov  
4 22:28:25 2015
@@ -1,41 +1,41 @@
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" 
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
 <html xmlns="http://www.w3.org/1999/xhtml";>
 <head profile="http://www.w3.org/2005/10/profile";>
-       <title>CVE-2014-3524</title>
-       <style type="text/css"></style>
+    <title>CVE-2014-3524</title>
+    <style type="text/css"></style>
 </head>
 
 <body>
-       <h2><a 
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-3524";>CVE-2014-3524</a></h2>
+    <h2><a 
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-3524";>CVE-2014-3524</a></h2>
 
-       <h3>OpenOffice Calc Command Injection Vulnerability</h3>
+    <h3>OpenOffice Calc Command Injection Vulnerability</h3>
 
-       <ul>   
-       <h4>Severity: Important</h4>
-       <h4>Vendor: The Apache Software Foundation</h4>
-       <h4>Versions Affected:</h4>
-               <ul>
-               <li>Apache OpenOffice 4.1.0 and older on Windows.</li>
-               <li>OpenOffice.org versions are also affected.</li>
-       </ul>
-
-       <h4>Description:</h4>
-       <p>The vulnerability allows command injection when loading Calc 
spreadsheets.
-       Specially crafted documents can be used for command-injection attacks.
-       Further exploits are possible but have not been verified.
-
-       <h4>Mitigation</h4>
-       <p>Apache OpenOffice users are advised to <a 
href="http://download.openoffice.org";>upgrade to Apache OpenOffice 4.1.1</a>.
-       Users who are unable to upgrade immediately should be cautious when 
opening untrusted documents.
-
-       <h4>Credits</h4>
-       <p>The Apache OpenOffice security team credits Rohan Durve and James 
Kettle of Context Information Security as the discoverer of this flaw.</p>
-
-       <hr />
-
-       <p><a href="http://security.openoffice.org";>Security Home</a>
-       -&gt; <a 
href="http://security.openoffice.org/bulletin.html";>Bulletin</a>
-       -&gt; <a 
href="http://security.openoffice.org/security/cves/CVE-2014-3524.html";>CVE-2014-3524</a></p>
+    <ul>
+    <h4>Severity: Important</h4>
+    <h4>Vendor: The Apache Software Foundation</h4>
+    <h4>Versions Affected:</h4>
+        <ul>
+        <li>Apache OpenOffice 4.1.0 and older on Windows.</li>
+        <li>OpenOffice.org versions are also affected.</li>
+    </ul>
+
+    <h4>Description:</h4>
+    <p>The vulnerability allows command injection when loading Calc 
spreadsheets.
+    Specially crafted documents can be used for command-injection attacks.
+    Further exploits are possible but have not been verified.
+
+    <h4>Mitigation</h4>
+    <p>Apache OpenOffice users are advised to <a 
href="http://download.openoffice.org";>upgrade to Apache OpenOffice 4.1.1</a>.
+    Users who are unable to upgrade immediately should be cautious when 
opening untrusted documents.
+
+    <h4>Credits</h4>
+    <p>The Apache OpenOffice security team credits Rohan Durve and James 
Kettle of Context Information Security as the discoverer of this flaw.</p>
+
+    <hr />
+
+    <p><a href="http://security.openoffice.org";>Security Home</a>
+    -&gt; <a 
href="http://security.openoffice.org/security/bulletin.html";>Bulletin</a>
+    -&gt; <a 
href="http://security.openoffice.org/security/cves/CVE-2014-3524.html";>CVE-2014-3524</a></p>
 </body>
 </html>
 

Modified: openoffice/ooo-site/trunk/content/security/cves/CVE-2014-3575.html
URL: 
http://svn.apache.org/viewvc/openoffice/ooo-site/trunk/content/security/cves/CVE-2014-3575.html?rev=1712675&r1=1712674&r2=1712675&view=diff
==============================================================================
--- openoffice/ooo-site/trunk/content/security/cves/CVE-2014-3575.html 
(original)
+++ openoffice/ooo-site/trunk/content/security/cves/CVE-2014-3575.html Wed Nov  
4 22:28:25 2015
@@ -1,41 +1,41 @@
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" 
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
 <html xmlns="http://www.w3.org/1999/xhtml";>
 <head profile="http://www.w3.org/2005/10/profile";>
-       <title>CVE-2014-3575</title>
-       <style type="text/css"></style>
+    <title>CVE-2014-3575</title>
+    <style type="text/css"></style>
 </head>
 
 <body>
-       <h2><a 
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-3575";>CVE-2014-3575</a></h2>
+    <h2><a 
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-3575";>CVE-2014-3575</a></h2>
 
-       <h3>OpenOffice Targeted Data Exposure Using Crafted OLE Objects</h3>
+    <h3>OpenOffice Targeted Data Exposure Using Crafted OLE Objects</h3>
 
-       <ul>   
-       <h4>Severity: Important</h4>
-       <h4>Vendor: The Apache Software Foundation</h4>
-       <h4>Versions Affected:</h4>
-               <ul>
-               <li>Apache OpenOffice 4.1.0 and older on Windows.</li>
-               <li>OpenOffice.org versions are also affected.</li>
-       </ul>
-
-       <h4>Description:</h4>
-       <p>The exposure exploits the way OLE previews are generated to embed 
arbitrary
-       file data into a specially crafted document when it is opened. Data 
exposure is
-       possible if the updated document is distributed to other parties.
-
-       <h4>Mitigation</h4>
-       <p>Apache OpenOffice users are advised to <a 
href="http://download.openoffice.org";>upgrade to Apache OpenOffice 4.1.1</a>.
-       Users who are unable to upgrade immediately should be cautious when 
they are asked to "Update Links" for untrusted documents.
-
-       <h4>Credits</h4>
-       <p>The Apache OpenOffice security team credits Open-Xchange for 
reporting this flaw.</p>
-
-       <hr />
-
-       <p><a href="http://security.openoffice.org";>Security Home</a>
-       -&gt; <a 
href="http://security.openoffice.org/bulletin.html";>Bulletin</a>
-       -&gt; <a 
href="http://security.openoffice.org/security/cves/CVE-2014-3575.html";>CVE-2014-3575</a></p>
+    <ul>
+    <h4>Severity: Important</h4>
+    <h4>Vendor: The Apache Software Foundation</h4>
+    <h4>Versions Affected:</h4>
+        <ul>
+        <li>Apache OpenOffice 4.1.0 and older on Windows.</li>
+        <li>OpenOffice.org versions are also affected.</li>
+    </ul>
+
+    <h4>Description:</h4>
+    <p>The exposure exploits the way OLE previews are generated to embed 
arbitrary
+    file data into a specially crafted document when it is opened. Data 
exposure is
+    possible if the updated document is distributed to other parties.
+
+    <h4>Mitigation</h4>
+    <p>Apache OpenOffice users are advised to <a 
href="http://download.openoffice.org";>upgrade to Apache OpenOffice 4.1.1</a>.
+    Users who are unable to upgrade immediately should be cautious when they 
are asked to "Update Links" for untrusted documents.
+
+    <h4>Credits</h4>
+    <p>The Apache OpenOffice security team credits Open-Xchange for reporting 
this flaw.</p>
+
+    <hr />
+
+    <p><a href="http://security.openoffice.org";>Security Home</a>
+    -&gt; <a 
href="http://security.openoffice.org/security/bulletin.html";>Bulletin</a>
+    -&gt; <a 
href="http://security.openoffice.org/security/cves/CVE-2014-3575.html";>CVE-2014-3575</a></p>
 </body>
 </html>
 

Modified: openoffice/ooo-site/trunk/content/security/cves/CVE-2015-1774.html
URL: 
http://svn.apache.org/viewvc/openoffice/ooo-site/trunk/content/security/cves/CVE-2015-1774.html?rev=1712675&r1=1712674&r2=1712675&view=diff
==============================================================================
--- openoffice/ooo-site/trunk/content/security/cves/CVE-2015-1774.html 
(original)
+++ openoffice/ooo-site/trunk/content/security/cves/CVE-2015-1774.html Wed Nov  
4 22:28:25 2015
@@ -96,7 +96,7 @@
 
         <p>
             <a href="http://security.openoffice.org";>Security Home</a>
-    -&gt; <a href="http://security.openoffice.org/bulletin.html";>Bulletin</a>
+    -&gt; <a 
href="http://security.openoffice.org/security/bulletin.html";>Bulletin</a>
     -&gt; <a 
href="http://www.openoffice.org/security/cves/CVE-2015-1774.html";>CVE-2015-1774</a>
         </p>
     </body>

Modified: openoffice/ooo-site/trunk/content/security/cves/CVE-2015-4551.html
URL: 
http://svn.apache.org/viewvc/openoffice/ooo-site/trunk/content/security/cves/CVE-2015-4551.html?rev=1712675&r1=1712674&r2=1712675&view=diff
==============================================================================
--- openoffice/ooo-site/trunk/content/security/cves/CVE-2015-4551.html [UTF-8] 
(original)
+++ openoffice/ooo-site/trunk/content/security/cves/CVE-2015-4551.html [UTF-8] 
Wed Nov  4 22:28:25 2015
@@ -117,7 +117,7 @@
 
         <p>
             <a href="http://security.openoffice.org";>Security Home</a>
-    -&gt; <a href="http://security.openoffice.org/bulletin.html";>Bulletin</a>
+    -&gt; <a 
href="http://security.openoffice.org/security/bulletin.html";>Bulletin</a>
     -&gt; <a 
href="http://www.openoffice.org/security/cves/CVE-2015-4551.html";>CVE-2015-4551</a>
         </p>
     </body>

Modified: openoffice/ooo-site/trunk/content/security/cves/CVE-2015-5212.html
URL: 
http://svn.apache.org/viewvc/openoffice/ooo-site/trunk/content/security/cves/CVE-2015-5212.html?rev=1712675&r1=1712674&r2=1712675&view=diff
==============================================================================
--- openoffice/ooo-site/trunk/content/security/cves/CVE-2015-5212.html [UTF-8] 
(original)
+++ openoffice/ooo-site/trunk/content/security/cves/CVE-2015-5212.html [UTF-8] 
Wed Nov  4 22:28:25 2015
@@ -102,7 +102,7 @@
 
         <p>
             <a href="http://security.openoffice.org";>Security Home</a>
-    -&gt; <a href="http://security.openoffice.org/bulletin.html";>Bulletin</a>
+    -&gt; <a 
href="http://security.openoffice.org/security/bulletin.html";>Bulletin</a>
     -&gt; <a 
href="http://www.openoffice.org/security/cves/CVE-2015-5212.html";>CVE-2015-5212</a>
         </p>
     </body>

Modified: openoffice/ooo-site/trunk/content/security/cves/CVE-2015-5213.html
URL: 
http://svn.apache.org/viewvc/openoffice/ooo-site/trunk/content/security/cves/CVE-2015-5213.html?rev=1712675&r1=1712674&r2=1712675&view=diff
==============================================================================
--- openoffice/ooo-site/trunk/content/security/cves/CVE-2015-5213.html [UTF-8] 
(original)
+++ openoffice/ooo-site/trunk/content/security/cves/CVE-2015-5213.html [UTF-8] 
Wed Nov  4 22:28:25 2015
@@ -97,7 +97,7 @@
 
         <p>
             <a href="http://security.openoffice.org";>Security Home</a>
-    -&gt; <a href="http://security.openoffice.org/bulletin.html";>Bulletin</a>
+    -&gt; <a 
href="http://security.openoffice.org/security/bulletin.html";>Bulletin</a>
     -&gt; <a 
href="http://www.openoffice.org/security/cves/CVE-2015-5213.html";>CVE-2015-5213</a>
         </p>
     </body>

Modified: openoffice/ooo-site/trunk/content/security/cves/CVE-2015-5214.html
URL: 
http://svn.apache.org/viewvc/openoffice/ooo-site/trunk/content/security/cves/CVE-2015-5214.html?rev=1712675&r1=1712674&r2=1712675&view=diff
==============================================================================
--- openoffice/ooo-site/trunk/content/security/cves/CVE-2015-5214.html [UTF-8] 
(original)
+++ openoffice/ooo-site/trunk/content/security/cves/CVE-2015-5214.html [UTF-8] 
Wed Nov  4 22:28:25 2015
@@ -97,7 +97,7 @@
 
         <p>
             <a href="http://security.openoffice.org";>Security Home</a>
-    -&gt; <a href="http://security.openoffice.org/bulletin.html";>Bulletin</a>
+    -&gt; <a 
href="http://security.openoffice.org/security/bulletin.html";>Bulletin</a>
     -&gt; <a 
href="http://www.openoffice.org/security/cves/CVE-2015-5214.html";>CVE-2015-5214</a>
         </p>
     </body>


Reply via email to