-
Notifications
You must be signed in to change notification settings - Fork 2
Security Advisories (Proposal)
Don Richards edited this page Oct 12, 2017
·
3 revisions
-
Critical Vulnerability
can be used to run attacker code and install software, requiring no elevated user permissions. -
High Vulnerability
can be used to gather sensitive data or inject data or code into the site, requiring no more than normal browsing actions. -
Moderate Vulnerabilities
that would otherwise be High or Critical except they only work in uncommon non-default configurations or require the user to perform complicated and/or unlikely steps. -
Low Minor security
vulnerabilities such as Denial of Service attacks, minor data leaks, or spoofs.
-
Islandora-123
Islandora-123 Many calls to exec() are not sanitized...