www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary all.html malware-microsoft.html...


From: Ali Reza Hayati
Subject: www/proprietary all.html malware-microsoft.html...
Date: Thu, 15 Jul 2021 02:06:03 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     Ali Reza Hayati <arh>   21/07/15 02:06:03

Modified files:
        proprietary    : all.html malware-microsoft.html 
                         proprietary-insecurity.html proprietary.html 
        proprietary/workshop: mal.rec 

Log message:
        Fixed the errors (blurb was incomplete)

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/all.html?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.html?cvsroot=www&r1=1.145&r2=1.146
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.html?cvsroot=www&r1=1.166&r2=1.167
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.html?cvsroot=www&r1=1.349&r2=1.350
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/mal.rec?cvsroot=www&r1=1.350&r2=1.351

Patches:
Index: all.html
===================================================================
RCS file: /web/www/www/proprietary/all.html,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- all.html    15 Jul 2021 05:57:19 -0000      1.27
+++ all.html    15 Jul 2021 06:06:03 -0000      1.28
@@ -43,7 +43,7 @@
 
 <ul class="blurbs">
 <!--#set var='ADD' value='2021-07-15' --><!--#set var='PUB' value='2021-07-09' 
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo 
encoding='none' var='ADD' --><span class="gnun-split"></span> &mdash; Latest 
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB' 
--></small>
-    <p>A newly found Microsoft Windows vulnerability <a rights.</p>
+    <p>A newly found Microsoft Windows vulnerability <a 
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/";>can
 allow crackers to remotely gain access to the operating system</a> and install 
programs, view and delete data, or even create new user accounts with full user 
rights.</p>
 
     <p>The security research firm accidentally leaked instructions on
     how the flaw could be exploited but Windows users should still wait
@@ -2305,7 +2305,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/07/15 05:57:19 $
+$Date: 2021/07/15 06:06:03 $
 <!-- timestamp end -->
 </p>
 </div>

Index: malware-microsoft.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.html,v
retrieving revision 1.145
retrieving revision 1.146
diff -u -b -r1.145 -r1.146
--- malware-microsoft.html      15 Jul 2021 05:49:20 -0000      1.145
+++ malware-microsoft.html      15 Jul 2021 06:06:03 -0000      1.146
@@ -203,7 +203,7 @@
   <li id="M202107090">
     <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
     --><!--#echo encoding="none" var="DATE" -->
-    <p>A newly found Microsoft Windows vulnerability <a rights.</p>
+    <p>A newly found Microsoft Windows vulnerability <a 
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/";>can
 allow crackers to remotely gain access to the operating system</a> and install 
programs, view and delete data, or even create new user accounts with full user 
rights.</p>
 
     <p>The security research firm accidentally leaked instructions on
     how the flaw could be exploited but Windows users should still wait
@@ -967,7 +967,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/07/15 05:49:20 $
+$Date: 2021/07/15 06:06:03 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-insecurity.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.html,v
retrieving revision 1.166
retrieving revision 1.167
diff -u -b -r1.166 -r1.167
--- proprietary-insecurity.html 15 Jul 2021 05:49:20 -0000      1.166
+++ proprietary-insecurity.html 15 Jul 2021 06:06:03 -0000      1.167
@@ -74,7 +74,7 @@
   <li id="M202107090">
     <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
     --><!--#echo encoding="none" var="DATE" -->
-    <p>A newly found Microsoft Windows vulnerability <a rights.</p>
+    <p>A newly found Microsoft Windows vulnerability <a 
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/";>can
 allow crackers to remotely gain access to the operating system</a> and install 
programs, view and delete data, or even create new user accounts with full user 
rights.</p>
 
     <p>The security research firm accidentally leaked instructions on
     how the flaw could be exploited but Windows users should still wait
@@ -1154,7 +1154,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/07/15 05:49:20 $
+$Date: 2021/07/15 06:06:03 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.html,v
retrieving revision 1.349
retrieving revision 1.350
diff -u -b -r1.349 -r1.350
--- proprietary.html    15 Jul 2021 05:57:19 -0000      1.349
+++ proprietary.html    15 Jul 2021 06:06:03 -0000      1.350
@@ -189,7 +189,7 @@
   <li id="M202107090">
     <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
     --><!--#echo encoding="none" var="DATE" -->
-    <p>A newly found Microsoft Windows vulnerability <a rights.</p>
+    <p>A newly found Microsoft Windows vulnerability <a 
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/";>can
 allow crackers to remotely gain access to the operating system</a> and install 
programs, view and delete data, or even create new user accounts with full user 
rights.</p>
 
     <p>The security research firm accidentally leaked instructions on
     how the flaw could be exploited but Windows users should still wait
@@ -312,7 +312,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/07/15 05:57:19 $
+$Date: 2021/07/15 06:06:03 $
 <!-- timestamp end -->
 </p>
 </div>

Index: workshop/mal.rec
===================================================================
RCS file: /web/www/www/proprietary/workshop/mal.rec,v
retrieving revision 1.350
retrieving revision 1.351
diff -u -b -r1.350 -r1.351
--- workshop/mal.rec    15 Jul 2021 05:57:19 -0000      1.350
+++ workshop/mal.rec    15 Jul 2021 06:06:03 -0000      1.351
@@ -40,7 +40,7 @@
 Target: proprietary-insecurity.html proprietary-insecurity
 Target: malware-microsoft.html insecurity
 Keywords: Insecurity, Microsoft, Windows, Security
-Blurb: <p>A newly found Microsoft Windows vulnerability <a rights.</p>
+Blurb: <p>A newly found Microsoft Windows vulnerability <a 
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/";>can
 allow crackers to remotely gain access to the operating system</a> and install 
programs, view and delete data, or even create new user accounts with full user 
rights.</p>
 +
 +   <p>The security research firm accidentally leaked instructions on
 +   how the flaw could be exploited but Windows users should still wait



reply via email to

[Prev in Thread] Current Thread [Next in Thread]