DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG·
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
http://issues.apache.org/bugzilla/show_bug.cgi?id=42047.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND·
INSERTED IN THE BUG DATABASE.
http://issues.apache.org/bugzilla/show_bug.cgi?id=42047
--- Additional Comments From [EMAIL PROTECTED] 2007-04-04 08:41 ---
Sorry, I found another typo :)
Index: xdocs/security-3.xml
===
--- xdocs/security-3.xml(revision 525537)
+++ xdocs/security-3.xml(working copy)
@@ -165,10 +165,10 @@
section name=Fixed in Apache Tomcat 3.1
pstrongimportant: Information disclosure/strong
a href=http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-1210;
- CVE-2001-0590/abr//p
+ CVE-2000-1210/abr//p
psource.jsp, provided as part of the examples, allows an attacker to read
- arbitary files via a .. (dot dot) in the argument to source.jsp./p
+ arbitrary files via a .. (dot dot) in the argument to source.jsp./p
pAffects: 3.0/p
/section
Index: docs/security-3.html
===
--- docs/security-3.html(revision 525537)
+++ docs/security-3.html(working copy)
@@ -544,12 +544,12 @@
p
strongimportant: Information disclosure/strong
a href=http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-1210;
- CVE-2001-0590/a
+ CVE-2000-1210/a
br/
/p
psource.jsp, provided as part of the examples, allows an attacker to read
- arbitary files via a .. (dot dot) in the argument to source.jsp./p
+ arbitrary files via a .. (dot dot) in the argument to source.jsp./p
pAffects: 3.0/p
/blockquote
--
Configure bugmail: http://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug, or are watching the assignee.
-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]