Mercurial > hg > nginx-site
view xml/en/security_advisories.xml @ 271:4c6d2c614d2c
Cleaned up XML tag mess:
- all of <parameter> and <code>, and some of <dirname>, <value>,
and <command> were replaced by <literal>;
- the rest of <dirname> were replaced by links;
- <argument> were replaced by <value>;
- <value> is now rendered in HTML in italic;
- <literal> and <path> can now contain <value>.
Cleaned up terminology mess:
- directives take "parameters".
author | Ruslan Ermilov <ru@nginx.com> |
---|---|
date | Fri, 23 Dec 2011 17:29:59 +0000 |
parents | 6f411297069c |
children | 86d441d817dd |
line wrap: on
line source
<!DOCTYPE article SYSTEM "../../dtd/article.dtd"> <article name="nginx security advisories" link="/en/security_advisories.html" lang="en"> <section> <para> <link doc="en/pgp_keys.xml">PGP public keys</link> </para> <security> <item name="Vulnerabilities with invalid UTF-8 sequence on Windows" severity="major" cve="2010-2266" good="0.8.41+, 0.7.67+" vulnerable="nginx/Windows 0.7.52-0.8.40" /> <item name="Vulnerabilities with Windows file default stream" severity="major" cve="2010-2263" good="0.8.40+, 0.7.66+" vulnerable="nginx/Windows 0.7.52-0.8.39" /> <item name="Vulnerabilities with Windows 8.3 filename pseudonyms" severity="major" core="CORE-2010-0121" href="http://www.coresecurity.com/content/filename-pseudonyms-vulnerabilities" good="0.8.33+, 0.7.65+" vulnerable="nginx/Windows 0.7.52-0.8.32" /> <item name="An error log data are not sanitized" severity="none" cve="2009-4487" good="none" vulnerable="all" /> <item name="The renegotiation vulnerability in SSL protocol" severity="major" cert="120541" cve="2009-3555" good="0.8.23+, 0.7.64+" vulnerable="0.1.0-0.8.22" patch="patch.cve-2009-3555.txt" /> <item name="Directory traversal vulnerability" severity="minor" cve="2009-3898" good="0.8.17+, 0.7.63+" vulnerable="0.1.0-0.8.16" /> <item name="Buffer underflow vulnerability" severity="major" cert="180065" cve="2009-2629" good="0.8.15+, 0.7.62+, 0.6.39+, 0.5.38+" vulnerable="0.1.0-0.8.14" patch="patch.180065.txt" /> <item name="Null pointer dereference vulnerability" severity="major" cve="2009-3896" good="0.8.14+, 0.7.62+, 0.6.39+, 0.5.38+" vulnerable="0.1.0-0.8.13" patch="patch.null.pointer.txt" /> </security> </section> </article>