[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary all.html malware-microsoft.html...
From: |
Ali Reza Hayati |
Subject: |
www/proprietary all.html malware-microsoft.html... |
Date: |
Thu, 15 Jul 2021 02:06:03 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: Ali Reza Hayati <arh> 21/07/15 02:06:03
Modified files:
proprietary : all.html malware-microsoft.html
proprietary-insecurity.html proprietary.html
proprietary/workshop: mal.rec
Log message:
Fixed the errors (blurb was incomplete)
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/all.html?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.html?cvsroot=www&r1=1.145&r2=1.146
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.html?cvsroot=www&r1=1.166&r2=1.167
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.html?cvsroot=www&r1=1.349&r2=1.350
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/mal.rec?cvsroot=www&r1=1.350&r2=1.351
Patches:
Index: all.html
===================================================================
RCS file: /web/www/www/proprietary/all.html,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- all.html 15 Jul 2021 05:57:19 -0000 1.27
+++ all.html 15 Jul 2021 06:06:03 -0000 1.28
@@ -43,7 +43,7 @@
<ul class="blurbs">
<!--#set var='ADD' value='2021-07-15' --><!--#set var='PUB' value='2021-07-09'
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo
encoding='none' var='ADD' --><span class="gnun-split"></span> — Latest
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB'
--></small>
- <p>A newly found Microsoft Windows vulnerability <a rights.</p>
+ <p>A newly found Microsoft Windows vulnerability <a
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/">can
allow crackers to remotely gain access to the operating system</a> and install
programs, view and delete data, or even create new user accounts with full user
rights.</p>
<p>The security research firm accidentally leaked instructions on
how the flaw could be exploited but Windows users should still wait
@@ -2305,7 +2305,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/07/15 05:57:19 $
+$Date: 2021/07/15 06:06:03 $
<!-- timestamp end -->
</p>
</div>
Index: malware-microsoft.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.html,v
retrieving revision 1.145
retrieving revision 1.146
diff -u -b -r1.145 -r1.146
--- malware-microsoft.html 15 Jul 2021 05:49:20 -0000 1.145
+++ malware-microsoft.html 15 Jul 2021 06:06:03 -0000 1.146
@@ -203,7 +203,7 @@
<li id="M202107090">
<!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>A newly found Microsoft Windows vulnerability <a rights.</p>
+ <p>A newly found Microsoft Windows vulnerability <a
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/">can
allow crackers to remotely gain access to the operating system</a> and install
programs, view and delete data, or even create new user accounts with full user
rights.</p>
<p>The security research firm accidentally leaked instructions on
how the flaw could be exploited but Windows users should still wait
@@ -967,7 +967,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/07/15 05:49:20 $
+$Date: 2021/07/15 06:06:03 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.html,v
retrieving revision 1.166
retrieving revision 1.167
diff -u -b -r1.166 -r1.167
--- proprietary-insecurity.html 15 Jul 2021 05:49:20 -0000 1.166
+++ proprietary-insecurity.html 15 Jul 2021 06:06:03 -0000 1.167
@@ -74,7 +74,7 @@
<li id="M202107090">
<!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>A newly found Microsoft Windows vulnerability <a rights.</p>
+ <p>A newly found Microsoft Windows vulnerability <a
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/">can
allow crackers to remotely gain access to the operating system</a> and install
programs, view and delete data, or even create new user accounts with full user
rights.</p>
<p>The security research firm accidentally leaked instructions on
how the flaw could be exploited but Windows users should still wait
@@ -1154,7 +1154,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/07/15 05:49:20 $
+$Date: 2021/07/15 06:06:03 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.html,v
retrieving revision 1.349
retrieving revision 1.350
diff -u -b -r1.349 -r1.350
--- proprietary.html 15 Jul 2021 05:57:19 -0000 1.349
+++ proprietary.html 15 Jul 2021 06:06:03 -0000 1.350
@@ -189,7 +189,7 @@
<li id="M202107090">
<!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
--><!--#echo encoding="none" var="DATE" -->
- <p>A newly found Microsoft Windows vulnerability <a rights.</p>
+ <p>A newly found Microsoft Windows vulnerability <a
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/">can
allow crackers to remotely gain access to the operating system</a> and install
programs, view and delete data, or even create new user accounts with full user
rights.</p>
<p>The security research firm accidentally leaked instructions on
how the flaw could be exploited but Windows users should still wait
@@ -312,7 +312,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2021/07/15 05:57:19 $
+$Date: 2021/07/15 06:06:03 $
<!-- timestamp end -->
</p>
</div>
Index: workshop/mal.rec
===================================================================
RCS file: /web/www/www/proprietary/workshop/mal.rec,v
retrieving revision 1.350
retrieving revision 1.351
diff -u -b -r1.350 -r1.351
--- workshop/mal.rec 15 Jul 2021 05:57:19 -0000 1.350
+++ workshop/mal.rec 15 Jul 2021 06:06:03 -0000 1.351
@@ -40,7 +40,7 @@
Target: proprietary-insecurity.html proprietary-insecurity
Target: malware-microsoft.html insecurity
Keywords: Insecurity, Microsoft, Windows, Security
-Blurb: <p>A newly found Microsoft Windows vulnerability <a rights.</p>
+Blurb: <p>A newly found Microsoft Windows vulnerability <a
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/">can
allow crackers to remotely gain access to the operating system</a> and install
programs, view and delete data, or even create new user accounts with full user
rights.</p>
+
+ <p>The security research firm accidentally leaked instructions on
+ how the flaw could be exploited but Windows users should still wait