www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary all.html malware-microsoft.html...


From: Therese Godefroy
Subject: www/proprietary all.html malware-microsoft.html...
Date: Thu, 15 Jul 2021 03:18:30 -0400 (EDT)

CVSROOT:        /webcvs/www
Module name:    www
Changes by:     Therese Godefroy <th_g> 21/07/15 03:18:30

Modified files:
        proprietary    : all.html malware-microsoft.html 
                         proprietary-insecurity.html 
        proprietary/workshop: mal.rec 

Log message:
        Wrap long lines.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/all.html?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.html?cvsroot=www&r1=1.147&r2=1.148
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.html?cvsroot=www&r1=1.168&r2=1.169
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/mal.rec?cvsroot=www&r1=1.354&r2=1.355

Patches:
Index: all.html
===================================================================
RCS file: /webcvs/www/www/proprietary/all.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- all.html    15 Jul 2021 07:14:41 -0000      1.31
+++ all.html    15 Jul 2021 07:18:30 -0000      1.32
@@ -43,7 +43,11 @@
 
 <ul class="blurbs">
 <!--#set var='ADD' value='2021-07-15' --><!--#set var='PUB' value='2021-07-09' 
--><li><small class='date-tag'>Added: <span class="gnun-split"></span><!--#echo 
encoding='none' var='ADD' --><span class="gnun-split"></span> &mdash; Latest 
reference: <span class="gnun-split"></span><!--#echo encoding='none' var='PUB' 
--></small>
-    <p>A newly found Microsoft Windows vulnerability <a 
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/";>can
 allow crackers to remotely gain access to the operating system</a> and install 
programs, view and delete data, or even create new user accounts with full user 
rights.</p>
+    <p>A newly found Microsoft Windows vulnerability <a
+    
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/";>
+    can allow crackers to remotely gain access to the operating system</a>
+    and install programs, view and delete data, or even create new user
+    accounts with full user rights.</p>
 
     <p>The security research firm accidentally leaked instructions on
     how the flaw could be exploited but Windows users should still wait
@@ -2311,7 +2315,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/07/15 07:14:41 $
+$Date: 2021/07/15 07:18:30 $
 <!-- timestamp end -->
 </p>
 </div>

Index: malware-microsoft.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-microsoft.html,v
retrieving revision 1.147
retrieving revision 1.148
diff -u -b -r1.147 -r1.148
--- malware-microsoft.html      15 Jul 2021 06:12:50 -0000      1.147
+++ malware-microsoft.html      15 Jul 2021 07:18:30 -0000      1.148
@@ -203,7 +203,11 @@
   <li id="M202107090">
     <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
     --><!--#echo encoding="none" var="DATE" -->
-    <p>A newly found Microsoft Windows vulnerability <a 
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/";>can
 allow crackers to remotely gain access to the operating system</a> and install 
programs, view and delete data, or even create new user accounts with full user 
rights.</p>
+    <p>A newly found Microsoft Windows vulnerability <a
+    
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/";>
+    can allow crackers to remotely gain access to the operating system</a>
+    and install programs, view and delete data, or even create new user
+    accounts with full user rights.</p>
 
     <p>The security research firm accidentally leaked instructions on
     how the flaw could be exploited but Windows users should still wait
@@ -967,7 +971,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/07/15 06:12:50 $
+$Date: 2021/07/15 07:18:30 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-insecurity.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-insecurity.html,v
retrieving revision 1.168
retrieving revision 1.169
diff -u -b -r1.168 -r1.169
--- proprietary-insecurity.html 15 Jul 2021 06:12:50 -0000      1.168
+++ proprietary-insecurity.html 15 Jul 2021 07:18:30 -0000      1.169
@@ -74,7 +74,11 @@
   <li id="M202107090">
     <!--#set var="DATE" value='<small class="date-tag">2021-07</small>'
     --><!--#echo encoding="none" var="DATE" -->
-    <p>A newly found Microsoft Windows vulnerability <a 
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/";>can
 allow crackers to remotely gain access to the operating system</a> and install 
programs, view and delete data, or even create new user accounts with full user 
rights.</p>
+    <p>A newly found Microsoft Windows vulnerability <a
+    
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/";>
+    can allow crackers to remotely gain access to the operating system</a>
+    and install programs, view and delete data, or even create new user
+    accounts with full user rights.</p>
 
     <p>The security research firm accidentally leaked instructions on
     how the flaw could be exploited but Windows users should still wait
@@ -1154,7 +1158,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/07/15 06:12:50 $
+$Date: 2021/07/15 07:18:30 $
 <!-- timestamp end -->
 </p>
 </div>

Index: workshop/mal.rec
===================================================================
RCS file: /webcvs/www/www/proprietary/workshop/mal.rec,v
retrieving revision 1.354
retrieving revision 1.355
diff -u -b -r1.354 -r1.355
--- workshop/mal.rec    15 Jul 2021 07:13:04 -0000      1.354
+++ workshop/mal.rec    15 Jul 2021 07:18:30 -0000      1.355
@@ -46,7 +46,11 @@
 Target: proprietary-insecurity.html proprietary-insecurity
 Target: malware-microsoft.html insecurity
 Keywords: Insecurity, Microsoft, Windows, Security
-Blurb: <p>A newly found Microsoft Windows vulnerability <a 
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/";>can
 allow crackers to remotely gain access to the operating system</a> and install 
programs, view and delete data, or even create new user accounts with full user 
rights.</p>
+Blurb: <p>A newly found Microsoft Windows vulnerability <a
++   
href="https://edition.cnn.com/2021/07/08/tech/microsoft-windows-10-printnightmare/";>
++   can allow crackers to remotely gain access to the operating system</a>
++   and install programs, view and delete data, or even create new user
++   accounts with full user rights.</p>
 +
 +   <p>The security research firm accidentally leaked instructions on
 +   how the flaw could be exploited but Windows users should still wait



reply via email to

[Prev in Thread] Current Thread [Next in Thread]