[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2008/dsa-1502.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2008/dsa-1502.wml	2017-11-01 10:11:09.839812657 +0500
+++ russian/security/2008/dsa-1502.wml	2018-02-11 15:30:33.542857908 +0500
@@ -1,47 +1,48 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.5" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
 
- -<p>Several remote vulnerabilities have been discovered in wordpress, a weblog
- -manager. The Common Vulnerabilities and Exposures project identifies the following
- -problems:</p>
+<p>Ð? wordpress, менеджеÑ?е веб-блога, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ?
+Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ?
+Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-3238";>CVE-2007-3238</a>
 
- -    <p>Cross-site scripting (XSS) vulnerability in functions.php in the default 
- -    theme in WordPress allows remote authenticated administrators to inject 
- -    arbitrary web script or HTML via the PATH_INFO (REQUEST_URI) to 
+    <p>Ð?ежÑ?айÑ?овÑ?й Ñ?кÑ?ипÑ?инг (XSS) в functions.php в Ñ?еме по Ñ?молÑ?аниÑ?
+    в WordPress позволÑ?еÑ? Ñ?далÑ?ннÑ?м аÑ?Ñ?енÑ?иÑ?иÑ?иÑ?ованнÑ?м админиÑ?Ñ?Ñ?аÑ?оÑ?ам вводиÑ?Ñ?
+    пÑ?оизволÑ?нÑ?й веб-Ñ?Ñ?енаÑ?ий или код HTML Ñ? помоÑ?Ñ?Ñ? PATH_INFO (REQUEST_URI) в
     wp-admin/themes.php.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-2821";>CVE-2007-2821</a>
 
- -    <p>SQL injection vulnerability in wp-admin/admin-ajax.php in WordPress 
- -    before 2.2 allows remote attackers to execute arbitrary SQL commands via 
- -    the cookie parameter.</p></li>
+    <p>SQL-инÑ?екÑ?иÑ? в wp-admin/admin-ajax.php в WordPress до веÑ?Ñ?ии
+    2.2 позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?е командÑ? SQL Ñ? помоÑ?Ñ?Ñ?
+    паÑ?амеÑ?Ñ?а кÑ?ки.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-0193";>CVE-2008-0193</a>
 
- -    <p>Cross-site scripting (XSS) vulnerability in wp-db-backup.php in 
- -    WordPress 2.0.11 and earlier allows remote attackers to inject 
- -    arbitrary web script or HTML via the backup parameter in a 
- -    wp-db-backup.php action to wp-admin/edit.php.</p></li>
+    <p>Ð?ежÑ?айÑ?овÑ?й Ñ?кÑ?ипÑ?инг (XSS) в wp-db-backup.php в WordPress веÑ?Ñ?ии 2.0.11
+    и более Ñ?анниÑ? позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вводиÑ?Ñ?
+    пÑ?оизволÑ?нÑ?й веб-Ñ?Ñ?енаÑ?ий или код HTML Ñ? помоÑ?Ñ?Ñ? паÑ?амеÑ?Ñ?а Ñ?езеÑ?вного копиÑ?ованиÑ? в
+    дейÑ?Ñ?вие wp-db-backup.php в wp-admin/edit.php.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2008-0194";>CVE-2008-0194</a>
 
- -    <p>Directory traversal vulnerability in wp-db-backup.php in WordPress 2.0.3 
- -    and earlier allows remote attackers to read arbitrary files, delete 
- -    arbitrary files, and cause a denial of service via a .. (dot dot) in the 
- -    backup parameter in a wp-db-backup.php action to wp-admin/edit.php.</p></li>
+    <p>Ð?бÑ?од каÑ?алога в wp-db-backup.php в WordPress веÑ?Ñ?ии 2.0.3 и более
+    Ñ?анниÑ? позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам Ñ?иÑ?аÑ?Ñ? и Ñ?далÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?е Ñ?айлÑ?,
+    вÑ?зÑ?ваÑ? оÑ?каз в обÑ?лÑ?живании Ñ? помоÑ?Ñ?Ñ? .. (Ñ?оÑ?ка Ñ?оÑ?ка) в паÑ?амеÑ?Ñ?е Ñ?езеÑ?вного
+    копиÑ?ованиÑ? в дейÑ?Ñ?вии wp-db-backup.php в wp-admin/edit.php.</p></li>
 
 </ul>
 
- -<p>Wordpress is not present in the oldstable distribution (sarge).</p>
+<p>Wordpress оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?еÑ? в пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge).</p>
 
- -<p>For the stable distribution (etch), these problems have been fixed in version
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии
 2.0.10-1etch1.</p>
 
- -<p>We recommend that you upgrade your wordpress package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? wordpress.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEE3mumcdV9mwCc9oZQXudu4gIW0qUFAlqAG08ACgkQXudu4gIW
0qU3sw//Z96N2xIE2w3BC3ac1/7sTYMQj+zcuJUvakBYGwKvoQt+u9vNDbB1pkQc
LDlLfMZgsgqXpNrggnJAdygkqwrj+1KUqBA7Sv7SF6w8SwpY9suozbM509nuPSc3
DlImxCQnwDK6XEeIaKt6r3d9szgyj+B/nwIs/Sq+K69yuq7wMZkvvAA7XBUXTywt
dYgZZcpPJeSXnDTjcQI0tG8UVahdMrbBjSXpSJZ1cjPZfgc97H/1ZIxLRIiehqbV
UrbMYqnLFAYrQs6PLk4yH+b+bC/6xizSV4H/bf30cX9BTnlNRRaAerJAfArjQiGA
cG7hA03Q429KwOIwo+DaPIBrfa7pSK1YWStWqoJFm5mogsag8ivW+X2ygPa5qmWe
cdft48BPXRdzbBmO0lanFk+SUM/+z0c3RTLspdWb52N4rkw28p1jNMCkJkXyFtj3
cHKO5gpaLkrqZniM2RgbXqjT2lZEvuJZvGd0VswY9qavQ0P99DQ9821Lojs/PbLf
P7YKHBBDkKDMoHfdhVjIGeU6q5oPtRv8HIO0R5wjyOMnZPjS/EbszElHXjps30JT
VFA7mB/ikoKmGpufisom1LGVKhvlwk1NH+L5hk7PMpVa1YpdbuQFn3zQLLoU80fB
cIJdTwJ6R3nmy1FLH+HQlVdSJRD+UmNhM0ErtiE1gpKVThCw3Zk=
=10nT
-----END PGP SIGNATURE-----


Reply to: