]> Pileus Git - ~andy/fetchmail/commitdiff
fix another typo, point one URL to CVE.
authorMatthias Andree <matthias.andree@gmx.de>
Tue, 4 Sep 2012 20:55:55 +0000 (22:55 +0200)
committerMatthias Andree <matthias.andree@gmx.de>
Tue, 4 Sep 2012 20:55:55 +0000 (22:55 +0200)
website/security.html

index 2b8cc1b78fe4a603416b0ffc81932c7a5143b5ef..3db86537eea419799378ac993a61c258efdadfad 100644 (file)
     some of the problems mentioned below, even if they aren't mentioned
     in the security announcements:</p>
     <ul>
+       <!--
        <li><a name="cve-2012-3482"
-           href="http://web.nvd.nist.gov/view/vuln/Detail?vulnId=CVE-2012-3482">CVE-2012-3482:</a>
+           href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3482">CVE-2012-3482:</a>
+       -->
+       <li><a name="cve-2012-3482"
+           href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3482">CVE-2012-3482:</a>
        Fetchmail could <a href="fetchmail-SA-2012-02.txt">crash and
            possibly reveal fragments of confidential data</a> during
        NTLM authentication.</li>
        <li><a name="cve-2011-3389"
-           href="http://web.nvd.nist.gov/view/vuln/Detail?vulnId=CVE-2011-3389">CVE-2011-3389:</a>
+           href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3389">CVE-2011-3389:</a>
            <a href="fetchmail-SA-2012-01.txt">Fetchmail was vulnerable
                to chosen-plaintext attacks against cipher block
                chaining initialization vectors because it disabled an