This is an automated email from the ASF dual-hosted git repository.

git-site-role pushed a commit to branch asf-staging
in repository https://gitbox.apache.org/repos/asf/openoffice-org.git


The following commit(s) were added to refs/heads/asf-staging by this push:
     new 4dc13516a8 git-site-role commit from build_staging.sh
4dc13516a8 is described below

commit 4dc13516a8f7fb17ee40957b645ea51a8af98e46
Author: jenkins <[email protected]>
AuthorDate: Thu Jul 24 18:09:22 2025 +0000

    git-site-role commit from build_staging.sh
---
 content/feed.xml                         |   4 +-
 content/security/cves/CVE-2012-5639.html | 106 ++++++++-----------------------
 2 files changed, 30 insertions(+), 80 deletions(-)

diff --git a/content/feed.xml b/content/feed.xml
index 52516b29f2..b4f4205dcf 100644
--- a/content/feed.xml
+++ b/content/feed.xml
@@ -6,8 +6,8 @@
     <atom:link href="http://localhost:8820/feed.xml"; rel="self" 
type="application/rss+xml" />
     <description>OpenOffice.org Feed</description>
     <language>en-us</language>
-    <pubDate>Thu, 24 Jul 2025 15:43:49 +0000</pubDate>
-    <lastBuildDate>Thu, 24 Jul 2025 15:43:49 +0000</lastBuildDate>
+    <pubDate>Thu, 24 Jul 2025 18:07:22 +0000</pubDate>
+    <lastBuildDate>Thu, 24 Jul 2025 18:07:22 +0000</lastBuildDate>
     
 
   </channel> 
diff --git a/content/security/cves/CVE-2012-5639.html 
b/content/security/cves/CVE-2012-5639.html
index cc4f71e9cb..64bad83b39 100644
--- a/content/security/cves/CVE-2012-5639.html
+++ b/content/security/cves/CVE-2012-5639.html
@@ -1,15 +1,13 @@
 
-
 <!--#include virtual="/doctype.html" -->
 <html>
   <head>
     <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
     
+    <title>CVE-2012-5639</title>
     <link href="/css/ooo.css" rel="stylesheet" type="text/css">
     
-    <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
-    <title>CVE-2012-5639</title>
-  
+    
     
     <script src="https://www.apachecon.com/event-images/snippet.js";></script>
   </head>
@@ -22,86 +20,38 @@
     <div id="clear"></div>
       
       
-    <div id="content">
+      <div id="content">
+        <p><a 
href="https://www.cve.org/CVERecord?id=CVE-2012-5639";>CVE-2012-5639</a></p>
+        <p><a 
href="https://www.openoffice.org/security/cves/CVE-2012-5639.html";>Apache 
OpenOffice Advisory</a></p>
+        <p style="text-align:center; font-size:largest">Loading internal / 
external resource without warning.</p>
+        <p style="text-align:center;
+                  font-size:larger">Fixed in Apache OpenOffice 4.1.15</p>
       
+      <p><strong>Description</strong></p>
+<p>In Apache OpenOffice and LibreOffice embedded content will be opened 
automatically without that a warning is shown.</p>
+<p><strong>Severity: Moderate</strong></p>
+<p>There are no known exploits of this vulnerability.<br />
+A proof-of-concept demonstration exists.</p>
+<p>Thanks to the reporter for discovering this issue.</p>
+<p><strong>Vendor: The Apache Software Foundation</strong></p>
+<p><strong>Versions Affected</strong></p>
+<p>All Apache OpenOffice versions 4.1.14 and older are affected.<br />
+OpenOffice.org versions may also be affected.</p>
+<p><strong>Mitigation</strong></p>
+<p>Install Apache OpenOffice 4.1.15 for the latest maintenance and cumulative 
security fixes. Use the Apache OpenOffice <a 
href="https://www.openoffice.org/download/";>download page</a>.</p>
+<p><strong>Acknowledgements</strong></p>
+<p>The Apache OpenOffice Security Team would like to thank Timo Warns and 
Joachim Mammele for discovering and reporting this issue.</p>
+<p><strong>Further Information</strong></p>
+<p>For additional information and assistance, consult the <a 
href="https://forum.openoffice.org/";>Apache OpenOffice Community Forums</a> or 
make requests to the <a 
href="m&#x61;&#x69;l&#116;&#111;&#x3a;&#117;se&#x72;s@&#x6f;&#x70;&#101;&#110;o&#102;&#102;i&#x63;e&#x2e;&#x61;&#112;&#x61;&#x63;&#x68;e&#x2e;&#x6f;&#114;&#x67;">u&#115;&#101;&#114;&#115;&#x40;&#111;&#112;&#x65;&#x6e;&#x6f;f&#x66;&#105;&#99;&#101;&#46;&#x61;&#112;a&#x63;&#x68;e.&#x6f;&#x72;g</a>
 public mailing list.</p>
+<p>The latest information on Apache OpenOffice security bulletins can be found 
at the <a href="https://www.openoffice.org/security/bulletin.html";>Bulletin 
Archive</a> page.</p>
+
       
-    <p>
-      <a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2012-5639";>CVE-2012-5639</a>
-    </p>
-    <p>
-      <a 
href="https://www.openoffice.org/security/cves/CVE-2012-5639.html";>Apache 
OpenOffice Advisory</a>
-    </p>
-    <p style="text-align:center; font-size:largest">
-      <strong>Loading internal / external resources without warning</strong>
-    </p>
-    <p style="text-align:center; font-size:larger">
-      <strong>Fixed in Apache OpenOffice 4.1.15</strong>
-    </p>
-    <p>
-      <strong>Description</strong>
-    </p>
-    <p>
-     In Apache OpenOffice and LibreOffice embedded content will be opened 
automatically without
-     that a warning is shown.
-    </p>
-    <p>
-      <strong>Severity: Moderate</strong>
-    </p>
-    <p>
-      There are no known exploits of this vulnerability.
-      <br />
-      A proof-of-concept demonstration exists.
-    </p>
-    <p>
-      Thanks to the reporter for discovering this issue.
-    </p>
-    <p>
-      <strong>Vendor: The Apache Software Foundation</strong>
-    </p>
-    <p>
-      <strong>Versions Affected</strong>
-    </p>
-    <p>
-      All Apache OpenOffice versions 4.1.14 and older are affected.
-      <br />
-      OpenOffice.org versions may also be affected.
-    </p>
-    <p>
-      <strong>Mitigation</strong>
-    </p>
-    <p>
-      Install Apache OpenOffice 4.1.15 for the latest maintenance and 
cumulative security fixes.
-      Use the Apache OpenOffice <a 
href="https://www.openoffice.org/download/";> download page</a>.
-    </p>
-    <p>
-      <strong>Acknowledgments</strong>
-    </p>
-    <p>
-      The Apache OpenOffice Security Team would like to thank Timo Warns and
-      Joachim Mammele for discovering and reporting this attack vector.
-    </p>
-    <p>
-      <strong>Further Information</strong>
-    </p>
-    <p>
-      For additional information and assistance, consult the
-      <a href="https://forum.openoffice.org/";>Apache OpenOffice Community 
Forums</a>
-      or make requests to the
-      <a 
href="mailto:[email protected]";>[email protected]</a>
-      public mailing list.
-    </p>
-    <p>
-      The latest information on Apache OpenOffice security bulletins can be 
found at the
-      <a href="https://www.openoffice.org/security/bulletin.html";>Bulletin 
Archive page</a>.
-    </p>
-    <hr />
+       <hr />
     <p>
       <a href="https://security.openoffice.org";>Security Home</a>-&gt;
       <a 
href="https://www.openoffice.org/security/bulletin.html";>Bulletin</a>-&gt;
-      <a 
href="https://www.openoffice.org/security/cves/CVE-2022-47502.html";>CVE-2012-5639</a>
+      <a 
href="https://www.openoffice.org/security/cves/CVE-2012-5639.html";>CVE-2012-5639</a>
     </p>
-  
-      
     </div>
     <!--#include virtual="/footer.html" -->
   </body>

Reply via email to