Skip to content

Security Advisories (Proposal)

Don Richards edited this page Oct 12, 2017 · 3 revisions

Impact key

  • Critical Vulnerability Critical Vulnerability can be used to run attacker code and install software, requiring no elevated user permissions.
  • High Vulnerability High Vulnerability can be used to gather sensitive data or inject data or code into the site, requiring no more than normal browsing actions.
  • Moderate Vulnerabilities Moderate Vulnerabilities that would otherwise be High or Critical except they only work in uncommon non-default configurations or require the user to perform complicated and/or unlikely steps.
  • Low Minor security Low Minor security vulnerabilities such as Denial of Service attacks, minor data leaks, or spoofs.

January 1st, 2017

  • Islandora-123 [Islandora-123](#Islandora-123) Example of a security advisory announce.