You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@openoffice.apache.org by or...@apache.org on 2015/11/04 23:28:26 UTC

svn commit: r1712675 - /openoffice/ooo-site/trunk/content/security/cves/

Author: orcmid
Date: Wed Nov  4 22:28:25 2015
New Revision: 1712675

URL: http://svn.apache.org/viewvc?rev=1712675&view=rev
Log:
Correct Bulletin links in the footer of recent CVEs

Modified:
    openoffice/ooo-site/trunk/content/security/cves/CVE-2013-1571.html
    openoffice/ooo-site/trunk/content/security/cves/CVE-2013-2189.html
    openoffice/ooo-site/trunk/content/security/cves/CVE-2013-4156.html
    openoffice/ooo-site/trunk/content/security/cves/CVE-2014-3524.html
    openoffice/ooo-site/trunk/content/security/cves/CVE-2014-3575.html
    openoffice/ooo-site/trunk/content/security/cves/CVE-2015-1774.html
    openoffice/ooo-site/trunk/content/security/cves/CVE-2015-4551.html
    openoffice/ooo-site/trunk/content/security/cves/CVE-2015-5212.html
    openoffice/ooo-site/trunk/content/security/cves/CVE-2015-5213.html
    openoffice/ooo-site/trunk/content/security/cves/CVE-2015-5214.html

Modified: openoffice/ooo-site/trunk/content/security/cves/CVE-2013-1571.html
URL: http://svn.apache.org/viewvc/openoffice/ooo-site/trunk/content/security/cves/CVE-2013-1571.html?rev=1712675&r1=1712674&r2=1712675&view=diff
==============================================================================
--- openoffice/ooo-site/trunk/content/security/cves/CVE-2013-1571.html (original)
+++ openoffice/ooo-site/trunk/content/security/cves/CVE-2013-1571.html Wed Nov  4 22:28:25 2015
@@ -13,31 +13,31 @@
   Frame Injection Vulnerability in SDK JavaDoc
   </h3>
 
-    <ul>   
-    
+    <ul>
+
         <h4>Severity: Medium</h4>
 
         <h4>Vendor: The Apache Software Foundation</h4>
-        
+
         <h4>Versions Affected:</h4>
                                  <ul>
                                      <li>Apache OpenOffice 3.4.1 SDK, on all platforms.</li>
                                      <li>Earlier versions may be also affected.</li>
                                  </ul>
-            
+
 
 <h4>Description:</h4>
 <p>
 As reported on June 18th there is a <a href="http://www.kb.cert.org/vuls/id/225657">vulnerability in JavaDoc</a> generated by Java 5, Java 6 and Java 7 before update 22.  Generated
-        JavaDoc files could be suceptible to HTML frame injection attacks. Our investigation indicated that the UDK 3.2.7 Java API Reference in the Apache OpenOffice SDK contains 
+        JavaDoc files could be suceptible to HTML frame injection attacks. Our investigation indicated that the UDK 3.2.7 Java API Reference in the Apache OpenOffice SDK contains
         a vulnerable HTML file.</p>
 
 <p>Note:  Ordinary installs of OpenOffice are not impacted by this vulnerability.  Only installs of the OpenOffice SDK, typically only installed by software developers writing
         extensions, are impacted</p>
 
         <h4>Mitigation</h4>
-        <p>SDK users should update their installations by replacing /docs/java/ref/index.html with this 
-        <a href="http://archive.apache.org/dist/incubator/ooo/3.4.1/source/cve-2013-1571.zip">patched version</a>.  
+        <p>SDK users should update their installations by replacing /docs/java/ref/index.html with this
+        <a href="http://archive.apache.org/dist/incubator/ooo/3.4.1/source/cve-2013-1571.zip">patched version</a>.
         Download, unzip and follow the  instructions in the enclosed README file.</p>
 
         <p>Users with earlier versions of the SDK (pre 3.4.1) should <a href="http://www.download.openoffice.org/download/other.html#tested-sdk">upgrade to the current version</a> and then apply the patch.  Alternative, they can download and run
@@ -48,8 +48,8 @@ As reported on June 18th there is a <a h
 <h4>Verifying the Integrity of Downloaded Files</h4>
 
 <p>
-We have provided <a href="http://archive.apache.org/dist/incubator/ooo/3.4.1/source/cve-2013-1571.zip.md5">MD5</a> and <a href="http://archive.apache.org/dist/incubator/ooo/3.4.1/source/cve-2013-1571.zip.sha256">SHA256</a> hashes of these patches, 
-        as well as a <a href="http://archive.apache.org/dist/incubator/ooo/3.4.1/source/cve-2013-1571.zip.asc">GPG/PGP detached digital signature</a>, for those who wish to verify the 
+We have provided <a href="http://archive.apache.org/dist/incubator/ooo/3.4.1/source/cve-2013-1571.zip.md5">MD5</a> and <a href="http://archive.apache.org/dist/incubator/ooo/3.4.1/source/cve-2013-1571.zip.sha256">SHA256</a> hashes of these patches,
+        as well as a <a href="http://archive.apache.org/dist/incubator/ooo/3.4.1/source/cve-2013-1571.zip.asc">GPG/PGP detached digital signature</a>, for those who wish to verify the
         integrity of this file.
 <p>
 The MD5 and SHA256 hashes can be verified using Unix tools like md5sum or sha256sum.
@@ -77,7 +77,7 @@ The PGP signatures can be verified using
 
   <hr />
 
-  <p><a href="http://security.openoffice.org">Security Home</a> -&gt; <a href="http://security.openoffice.org/bulletin.html">Bulletin</a> -&gt; 
+  <p><a href="http://security.openoffice.org">Security Home</a> -&gt; <a href="http://security.openoffice.org/security/bulletin.html">Bulletin</a> -&gt;
   <a href="http://security.openoffice.org/security/cves/CVE-2013-1571.html">CVE-2013-1571</a></p>
 </body>
 </html>

Modified: openoffice/ooo-site/trunk/content/security/cves/CVE-2013-2189.html
URL: http://svn.apache.org/viewvc/openoffice/ooo-site/trunk/content/security/cves/CVE-2013-2189.html?rev=1712675&r1=1712674&r2=1712675&view=diff
==============================================================================
--- openoffice/ooo-site/trunk/content/security/cves/CVE-2013-2189.html (original)
+++ openoffice/ooo-site/trunk/content/security/cves/CVE-2013-2189.html Wed Nov  4 22:28:25 2015
@@ -1,41 +1,41 @@
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
 <html xmlns="http://www.w3.org/1999/xhtml">
 <head profile="http://www.w3.org/2005/10/profile">
-	<title>CVE-2013-2189</title>
-	<style type="text/css"></style>
+    <title>CVE-2013-2189</title>
+    <style type="text/css"></style>
 </head>
 
 <body>
-	<h2><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-2189">CVE-2013-2189</a></h2>
+    <h2><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-2189">CVE-2013-2189</a></h2>
 
-	<h3>OpenOffice DOC Memory Corruption Vulnerability</h3>
+    <h3>OpenOffice DOC Memory Corruption Vulnerability</h3>
 
-	<ul>   
-	<h4>Severity: Important</h4>
-	<h4>Vendor: The Apache Software Foundation</h4>
-	<h4>Versions Affected:</h4>
-		<ul>
-		<li>Apache OpenOffice 3.4.0 to 3.4.1, on all platforms.</li>
-		<li>Earlier versions may be also affected.</li>
-	</ul>
-
-	<h4>Description:</h4>
-	<p>The vulnerability is caused by operating on invalid PLCF (Plex of Character Positions in File) data when parsing a malformed DOC document file.
-	Specially crafted documents can be used for denial-of-service attacks.
-	Further exploits are possible but have not been verified.
-
-	<h4>Mitigation</h4>
-	<p>Apache OpenOffice 3.4 users are advised to <a href="http://download.openoffice.org">upgrade to Apache OpenOffice 4.0</a>.
-	Users who are unable to upgrade immediately should be cautious when opening untrusted documents.
-
-	<h4>Credits</h4>
-	<p>The Apache OpenOffice security team credits Jeremy Brown of Microsoft Vulnerability Research as the discoverer of this flaw.</p>
-
-	<hr />
-
-	<p><a href="http://security.openoffice.org">Security Home</a>
-	-&gt; <a href="http://security.openoffice.org/bulletin.html">Bulletin</a>
-	-&gt; <a href="http://security.openoffice.org/security/cves/CVE-2013-2189.html">CVE-2013-2189</a></p>
+    <ul>
+    <h4>Severity: Important</h4>
+    <h4>Vendor: The Apache Software Foundation</h4>
+    <h4>Versions Affected:</h4>
+        <ul>
+        <li>Apache OpenOffice 3.4.0 to 3.4.1, on all platforms.</li>
+        <li>Earlier versions may be also affected.</li>
+    </ul>
+
+    <h4>Description:</h4>
+    <p>The vulnerability is caused by operating on invalid PLCF (Plex of Character Positions in File) data when parsing a malformed DOC document file.
+    Specially crafted documents can be used for denial-of-service attacks.
+    Further exploits are possible but have not been verified.
+
+    <h4>Mitigation</h4>
+    <p>Apache OpenOffice 3.4 users are advised to <a href="http://download.openoffice.org">upgrade to Apache OpenOffice 4.0</a>.
+    Users who are unable to upgrade immediately should be cautious when opening untrusted documents.
+
+    <h4>Credits</h4>
+    <p>The Apache OpenOffice security team credits Jeremy Brown of Microsoft Vulnerability Research as the discoverer of this flaw.</p>
+
+    <hr />
+
+    <p><a href="http://security.openoffice.org">Security Home</a>
+    -&gt; <a href="http://security.openoffice.org/security/bulletin.html">Bulletin</a>
+    -&gt; <a href="http://security.openoffice.org/security/cves/CVE-2013-2189.html">CVE-2013-2189</a></p>
 </body>
 </html>
 

Modified: openoffice/ooo-site/trunk/content/security/cves/CVE-2013-4156.html
URL: http://svn.apache.org/viewvc/openoffice/ooo-site/trunk/content/security/cves/CVE-2013-4156.html?rev=1712675&r1=1712674&r2=1712675&view=diff
==============================================================================
--- openoffice/ooo-site/trunk/content/security/cves/CVE-2013-4156.html (original)
+++ openoffice/ooo-site/trunk/content/security/cves/CVE-2013-4156.html Wed Nov  4 22:28:25 2015
@@ -1,41 +1,41 @@
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
 <html xmlns="http://www.w3.org/1999/xhtml">
 <head profile="http://www.w3.org/2005/10/profile">
-	<title>CVE-2013-4156</title>
-	<style type="text/css"></style>
+    <title>CVE-2013-4156</title>
+    <style type="text/css"></style>
 </head>
 
 <body>
-	<h2><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-4156">CVE-2013-4156</a></h2>
+    <h2><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-4156">CVE-2013-4156</a></h2>
 
-	<h3>OpenOffice DOCM Memory Corruption Vulnerability</h3>
+    <h3>OpenOffice DOCM Memory Corruption Vulnerability</h3>
 
-	<ul>   
-	<h4>Severity: Important</h4>
-	<h4>Vendor: The Apache Software Foundation</h4>
-	<h4>Versions Affected:</h4>
-		<ul>
-		<li>Apache OpenOffice 3.4.0 to 3.4.1, on all platforms.</li>
-		<li>Earlier versions may be also affected.</li>
-	</ul>
-
-	<h4>Description:</h4>
-	<p>The vulnerability is caused by mishandling of unknown XML elements when parsing OOXML document files.
-	Specially crafted documents can be used for denial-of-service attacks.
-	Further exploits are possible but have not been verified.
-
-	<h4>Mitigation</h4>
-	<p>Apache OpenOffice 3.4 users are advised to <a href="http://download.openoffice.org">upgrade to Apache OpenOffice 4.0</a>.
-	Users who are unable to upgrade immediately should be cautious when opening untrusted documents.
-
-	<h4>Credits</h4>
-	<p>The Apache OpenOffice security team credits Jeremy Brown of Microsoft Vulnerability Research as the discoverer of this flaw.</p>
-
-	<hr />
-
-	<p><a href="http://security.openoffice.org">Security Home</a>
-	-&gt; <a href="http://security.openoffice.org/bulletin.html">Bulletin</a>
-	-&gt; <a href="http://security.openoffice.org/security/cves/CVE-2013-4156.html">CVE-2013-4156</a></p>
+    <ul>
+    <h4>Severity: Important</h4>
+    <h4>Vendor: The Apache Software Foundation</h4>
+    <h4>Versions Affected:</h4>
+        <ul>
+        <li>Apache OpenOffice 3.4.0 to 3.4.1, on all platforms.</li>
+        <li>Earlier versions may be also affected.</li>
+    </ul>
+
+    <h4>Description:</h4>
+    <p>The vulnerability is caused by mishandling of unknown XML elements when parsing OOXML document files.
+    Specially crafted documents can be used for denial-of-service attacks.
+    Further exploits are possible but have not been verified.
+
+    <h4>Mitigation</h4>
+    <p>Apache OpenOffice 3.4 users are advised to <a href="http://download.openoffice.org">upgrade to Apache OpenOffice 4.0</a>.
+    Users who are unable to upgrade immediately should be cautious when opening untrusted documents.
+
+    <h4>Credits</h4>
+    <p>The Apache OpenOffice security team credits Jeremy Brown of Microsoft Vulnerability Research as the discoverer of this flaw.</p>
+
+    <hr />
+
+    <p><a href="http://security.openoffice.org">Security Home</a>
+    -&gt; <a href="http://security.openoffice.org/security/bulletin.html">Bulletin</a>
+    -&gt; <a href="http://security.openoffice.org/security/cves/CVE-2013-4156.html">CVE-2013-4156</a></p>
 </body>
 </html>
 

Modified: openoffice/ooo-site/trunk/content/security/cves/CVE-2014-3524.html
URL: http://svn.apache.org/viewvc/openoffice/ooo-site/trunk/content/security/cves/CVE-2014-3524.html?rev=1712675&r1=1712674&r2=1712675&view=diff
==============================================================================
--- openoffice/ooo-site/trunk/content/security/cves/CVE-2014-3524.html (original)
+++ openoffice/ooo-site/trunk/content/security/cves/CVE-2014-3524.html Wed Nov  4 22:28:25 2015
@@ -1,41 +1,41 @@
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
 <html xmlns="http://www.w3.org/1999/xhtml">
 <head profile="http://www.w3.org/2005/10/profile">
-	<title>CVE-2014-3524</title>
-	<style type="text/css"></style>
+    <title>CVE-2014-3524</title>
+    <style type="text/css"></style>
 </head>
 
 <body>
-	<h2><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-3524">CVE-2014-3524</a></h2>
+    <h2><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-3524">CVE-2014-3524</a></h2>
 
-	<h3>OpenOffice Calc Command Injection Vulnerability</h3>
+    <h3>OpenOffice Calc Command Injection Vulnerability</h3>
 
-	<ul>   
-	<h4>Severity: Important</h4>
-	<h4>Vendor: The Apache Software Foundation</h4>
-	<h4>Versions Affected:</h4>
-		<ul>
-		<li>Apache OpenOffice 4.1.0 and older on Windows.</li>
-		<li>OpenOffice.org versions are also affected.</li>
-	</ul>
-
-	<h4>Description:</h4>
-	<p>The vulnerability allows command injection when loading Calc spreadsheets.
-	Specially crafted documents can be used for command-injection attacks.
-	Further exploits are possible but have not been verified.
-
-	<h4>Mitigation</h4>
-	<p>Apache OpenOffice users are advised to <a href="http://download.openoffice.org">upgrade to Apache OpenOffice 4.1.1</a>.
-	Users who are unable to upgrade immediately should be cautious when opening untrusted documents.
-
-	<h4>Credits</h4>
-	<p>The Apache OpenOffice security team credits Rohan Durve and James Kettle of Context Information Security as the discoverer of this flaw.</p>
-
-	<hr />
-
-	<p><a href="http://security.openoffice.org">Security Home</a>
-	-&gt; <a href="http://security.openoffice.org/bulletin.html">Bulletin</a>
-	-&gt; <a href="http://security.openoffice.org/security/cves/CVE-2014-3524.html">CVE-2014-3524</a></p>
+    <ul>
+    <h4>Severity: Important</h4>
+    <h4>Vendor: The Apache Software Foundation</h4>
+    <h4>Versions Affected:</h4>
+        <ul>
+        <li>Apache OpenOffice 4.1.0 and older on Windows.</li>
+        <li>OpenOffice.org versions are also affected.</li>
+    </ul>
+
+    <h4>Description:</h4>
+    <p>The vulnerability allows command injection when loading Calc spreadsheets.
+    Specially crafted documents can be used for command-injection attacks.
+    Further exploits are possible but have not been verified.
+
+    <h4>Mitigation</h4>
+    <p>Apache OpenOffice users are advised to <a href="http://download.openoffice.org">upgrade to Apache OpenOffice 4.1.1</a>.
+    Users who are unable to upgrade immediately should be cautious when opening untrusted documents.
+
+    <h4>Credits</h4>
+    <p>The Apache OpenOffice security team credits Rohan Durve and James Kettle of Context Information Security as the discoverer of this flaw.</p>
+
+    <hr />
+
+    <p><a href="http://security.openoffice.org">Security Home</a>
+    -&gt; <a href="http://security.openoffice.org/security/bulletin.html">Bulletin</a>
+    -&gt; <a href="http://security.openoffice.org/security/cves/CVE-2014-3524.html">CVE-2014-3524</a></p>
 </body>
 </html>
 

Modified: openoffice/ooo-site/trunk/content/security/cves/CVE-2014-3575.html
URL: http://svn.apache.org/viewvc/openoffice/ooo-site/trunk/content/security/cves/CVE-2014-3575.html?rev=1712675&r1=1712674&r2=1712675&view=diff
==============================================================================
--- openoffice/ooo-site/trunk/content/security/cves/CVE-2014-3575.html (original)
+++ openoffice/ooo-site/trunk/content/security/cves/CVE-2014-3575.html Wed Nov  4 22:28:25 2015
@@ -1,41 +1,41 @@
 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
 <html xmlns="http://www.w3.org/1999/xhtml">
 <head profile="http://www.w3.org/2005/10/profile">
-	<title>CVE-2014-3575</title>
-	<style type="text/css"></style>
+    <title>CVE-2014-3575</title>
+    <style type="text/css"></style>
 </head>
 
 <body>
-	<h2><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-3575">CVE-2014-3575</a></h2>
+    <h2><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-3575">CVE-2014-3575</a></h2>
 
-	<h3>OpenOffice Targeted Data Exposure Using Crafted OLE Objects</h3>
+    <h3>OpenOffice Targeted Data Exposure Using Crafted OLE Objects</h3>
 
-	<ul>   
-	<h4>Severity: Important</h4>
-	<h4>Vendor: The Apache Software Foundation</h4>
-	<h4>Versions Affected:</h4>
-		<ul>
-		<li>Apache OpenOffice 4.1.0 and older on Windows.</li>
-		<li>OpenOffice.org versions are also affected.</li>
-	</ul>
-
-	<h4>Description:</h4>
-	<p>The exposure exploits the way OLE previews are generated to embed arbitrary
-	file data into a specially crafted document when it is opened. Data exposure is
-	possible if the updated document is distributed to other parties.
-
-	<h4>Mitigation</h4>
-	<p>Apache OpenOffice users are advised to <a href="http://download.openoffice.org">upgrade to Apache OpenOffice 4.1.1</a>.
-	Users who are unable to upgrade immediately should be cautious when they are asked to "Update Links" for untrusted documents.
-
-	<h4>Credits</h4>
-	<p>The Apache OpenOffice security team credits Open-Xchange for reporting this flaw.</p>
-
-	<hr />
-
-	<p><a href="http://security.openoffice.org">Security Home</a>
-	-&gt; <a href="http://security.openoffice.org/bulletin.html">Bulletin</a>
-	-&gt; <a href="http://security.openoffice.org/security/cves/CVE-2014-3575.html">CVE-2014-3575</a></p>
+    <ul>
+    <h4>Severity: Important</h4>
+    <h4>Vendor: The Apache Software Foundation</h4>
+    <h4>Versions Affected:</h4>
+        <ul>
+        <li>Apache OpenOffice 4.1.0 and older on Windows.</li>
+        <li>OpenOffice.org versions are also affected.</li>
+    </ul>
+
+    <h4>Description:</h4>
+    <p>The exposure exploits the way OLE previews are generated to embed arbitrary
+    file data into a specially crafted document when it is opened. Data exposure is
+    possible if the updated document is distributed to other parties.
+
+    <h4>Mitigation</h4>
+    <p>Apache OpenOffice users are advised to <a href="http://download.openoffice.org">upgrade to Apache OpenOffice 4.1.1</a>.
+    Users who are unable to upgrade immediately should be cautious when they are asked to "Update Links" for untrusted documents.
+
+    <h4>Credits</h4>
+    <p>The Apache OpenOffice security team credits Open-Xchange for reporting this flaw.</p>
+
+    <hr />
+
+    <p><a href="http://security.openoffice.org">Security Home</a>
+    -&gt; <a href="http://security.openoffice.org/security/bulletin.html">Bulletin</a>
+    -&gt; <a href="http://security.openoffice.org/security/cves/CVE-2014-3575.html">CVE-2014-3575</a></p>
 </body>
 </html>
 

Modified: openoffice/ooo-site/trunk/content/security/cves/CVE-2015-1774.html
URL: http://svn.apache.org/viewvc/openoffice/ooo-site/trunk/content/security/cves/CVE-2015-1774.html?rev=1712675&r1=1712674&r2=1712675&view=diff
==============================================================================
--- openoffice/ooo-site/trunk/content/security/cves/CVE-2015-1774.html (original)
+++ openoffice/ooo-site/trunk/content/security/cves/CVE-2015-1774.html Wed Nov  4 22:28:25 2015
@@ -96,7 +96,7 @@
 
         <p>
             <a href="http://security.openoffice.org">Security Home</a>
-    -&gt; <a href="http://security.openoffice.org/bulletin.html">Bulletin</a>
+    -&gt; <a href="http://security.openoffice.org/security/bulletin.html">Bulletin</a>
     -&gt; <a href="http://www.openoffice.org/security/cves/CVE-2015-1774.html">CVE-2015-1774</a>
         </p>
     </body>

Modified: openoffice/ooo-site/trunk/content/security/cves/CVE-2015-4551.html
URL: http://svn.apache.org/viewvc/openoffice/ooo-site/trunk/content/security/cves/CVE-2015-4551.html?rev=1712675&r1=1712674&r2=1712675&view=diff
==============================================================================
--- openoffice/ooo-site/trunk/content/security/cves/CVE-2015-4551.html [UTF-8] (original)
+++ openoffice/ooo-site/trunk/content/security/cves/CVE-2015-4551.html [UTF-8] Wed Nov  4 22:28:25 2015
@@ -117,7 +117,7 @@
 
         <p>
             <a href="http://security.openoffice.org">Security Home</a>
-    -&gt; <a href="http://security.openoffice.org/bulletin.html">Bulletin</a>
+    -&gt; <a href="http://security.openoffice.org/security/bulletin.html">Bulletin</a>
     -&gt; <a href="http://www.openoffice.org/security/cves/CVE-2015-4551.html">CVE-2015-4551</a>
         </p>
     </body>

Modified: openoffice/ooo-site/trunk/content/security/cves/CVE-2015-5212.html
URL: http://svn.apache.org/viewvc/openoffice/ooo-site/trunk/content/security/cves/CVE-2015-5212.html?rev=1712675&r1=1712674&r2=1712675&view=diff
==============================================================================
--- openoffice/ooo-site/trunk/content/security/cves/CVE-2015-5212.html [UTF-8] (original)
+++ openoffice/ooo-site/trunk/content/security/cves/CVE-2015-5212.html [UTF-8] Wed Nov  4 22:28:25 2015
@@ -102,7 +102,7 @@
 
         <p>
             <a href="http://security.openoffice.org">Security Home</a>
-    -&gt; <a href="http://security.openoffice.org/bulletin.html">Bulletin</a>
+    -&gt; <a href="http://security.openoffice.org/security/bulletin.html">Bulletin</a>
     -&gt; <a href="http://www.openoffice.org/security/cves/CVE-2015-5212.html">CVE-2015-5212</a>
         </p>
     </body>

Modified: openoffice/ooo-site/trunk/content/security/cves/CVE-2015-5213.html
URL: http://svn.apache.org/viewvc/openoffice/ooo-site/trunk/content/security/cves/CVE-2015-5213.html?rev=1712675&r1=1712674&r2=1712675&view=diff
==============================================================================
--- openoffice/ooo-site/trunk/content/security/cves/CVE-2015-5213.html [UTF-8] (original)
+++ openoffice/ooo-site/trunk/content/security/cves/CVE-2015-5213.html [UTF-8] Wed Nov  4 22:28:25 2015
@@ -97,7 +97,7 @@
 
         <p>
             <a href="http://security.openoffice.org">Security Home</a>
-    -&gt; <a href="http://security.openoffice.org/bulletin.html">Bulletin</a>
+    -&gt; <a href="http://security.openoffice.org/security/bulletin.html">Bulletin</a>
     -&gt; <a href="http://www.openoffice.org/security/cves/CVE-2015-5213.html">CVE-2015-5213</a>
         </p>
     </body>

Modified: openoffice/ooo-site/trunk/content/security/cves/CVE-2015-5214.html
URL: http://svn.apache.org/viewvc/openoffice/ooo-site/trunk/content/security/cves/CVE-2015-5214.html?rev=1712675&r1=1712674&r2=1712675&view=diff
==============================================================================
--- openoffice/ooo-site/trunk/content/security/cves/CVE-2015-5214.html [UTF-8] (original)
+++ openoffice/ooo-site/trunk/content/security/cves/CVE-2015-5214.html [UTF-8] Wed Nov  4 22:28:25 2015
@@ -97,7 +97,7 @@
 
         <p>
             <a href="http://security.openoffice.org">Security Home</a>
-    -&gt; <a href="http://security.openoffice.org/bulletin.html">Bulletin</a>
+    -&gt; <a href="http://security.openoffice.org/security/bulletin.html">Bulletin</a>
     -&gt; <a href="http://www.openoffice.org/security/cves/CVE-2015-5214.html">CVE-2015-5214</a>
         </p>
     </body>