Skip to content

Security Advisories (Proposal)

Don Richards edited this page Oct 12, 2017 · 3 revisions

<----------- Proposal ----------->

Impact key

  • Critical Vulnerability Critical Vulnerability can be used to run attacker code and install software, requiring no elevated user permissions.
  • High Vulnerability High Vulnerability can be used to gather sensitive data or inject data or code into the site, requiring no more than normal browsing actions.
  • Moderate Vulnerabilities Moderate Vulnerabilities that would otherwise be High or Critical except they only work in uncommon non-default configurations or require the user to perform complicated and/or unlikely steps.
  • Low Minor security Low Minor security vulnerabilities such as Denial of Service attacks, minor data leaks, or spoofs.

January 1st, 2017

  • Islandora-123 Islandora-123Islandora-123 Many calls to exec() are not sanitized...

<----------- XXXXX ----------->

This is an EXAMPLE and NOT a real Advisory