[DONE] wml://{security/2008/dsa-1502.wml}
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- --- english/security/2008/dsa-1502.wml 2017-11-01 10:11:09.839812657 +0500
+++ russian/security/2008/dsa-1502.wml 2018-02-11 15:30:33.542857908 +0500
@@ -1,47 +1,48 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.5" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
<define-tag moreinfo>
- -<p>Several remote vulnerabilities have been discovered in wordpress, a weblog
- -manager. The Common Vulnerabilities and Exposures project identifies the following
- -problems:</p>
+<p>Ð? wordpress, менеджеÑ?е веб-блога, бÑ?ло обнаÑ?Ñ?жено неÑ?колÑ?ко Ñ?далÑ?ннÑ?Ñ?
+Ñ?Ñ?звимоÑ?Ñ?ей. Ð?Ñ?оекÑ? Common Vulnerabilities and Exposures опÑ?еделÑ?еÑ?
+Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2007-3238">CVE-2007-3238</a>
- - <p>Cross-site scripting (XSS) vulnerability in functions.php in the default
- - theme in WordPress allows remote authenticated administrators to inject
- - arbitrary web script or HTML via the PATH_INFO (REQUEST_URI) to
+ <p>Ð?ежÑ?айÑ?овÑ?й Ñ?кÑ?ипÑ?инг (XSS) в functions.php в Ñ?еме по Ñ?молÑ?аниÑ?
+ в WordPress позволÑ?еÑ? Ñ?далÑ?ннÑ?м аÑ?Ñ?енÑ?иÑ?иÑ?иÑ?ованнÑ?м админиÑ?Ñ?Ñ?аÑ?оÑ?ам вводиÑ?Ñ?
+ пÑ?оизволÑ?нÑ?й веб-Ñ?Ñ?енаÑ?ий или код HTML Ñ? помоÑ?Ñ?Ñ? PATH_INFO (REQUEST_URI) в
wp-admin/themes.php.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2007-2821">CVE-2007-2821</a>
- - <p>SQL injection vulnerability in wp-admin/admin-ajax.php in WordPress
- - before 2.2 allows remote attackers to execute arbitrary SQL commands via
- - the cookie parameter.</p></li>
+ <p>SQL-инÑ?екÑ?иÑ? в wp-admin/admin-ajax.php в WordPress до веÑ?Ñ?ии
+ 2.2 позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вÑ?полнÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?е командÑ? SQL Ñ? помоÑ?Ñ?Ñ?
+ паÑ?амеÑ?Ñ?а кÑ?ки.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2008-0193">CVE-2008-0193</a>
- - <p>Cross-site scripting (XSS) vulnerability in wp-db-backup.php in
- - WordPress 2.0.11 and earlier allows remote attackers to inject
- - arbitrary web script or HTML via the backup parameter in a
- - wp-db-backup.php action to wp-admin/edit.php.</p></li>
+ <p>Ð?ежÑ?айÑ?овÑ?й Ñ?кÑ?ипÑ?инг (XSS) в wp-db-backup.php в WordPress веÑ?Ñ?ии 2.0.11
+ и более Ñ?анниÑ? позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вводиÑ?Ñ?
+ пÑ?оизволÑ?нÑ?й веб-Ñ?Ñ?енаÑ?ий или код HTML Ñ? помоÑ?Ñ?Ñ? паÑ?амеÑ?Ñ?а Ñ?езеÑ?вного копиÑ?ованиÑ? в
+ дейÑ?Ñ?вие wp-db-backup.php в wp-admin/edit.php.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2008-0194">CVE-2008-0194</a>
- - <p>Directory traversal vulnerability in wp-db-backup.php in WordPress 2.0.3
- - and earlier allows remote attackers to read arbitrary files, delete
- - arbitrary files, and cause a denial of service via a .. (dot dot) in the
- - backup parameter in a wp-db-backup.php action to wp-admin/edit.php.</p></li>
+ <p>Ð?бÑ?од каÑ?алога в wp-db-backup.php в WordPress веÑ?Ñ?ии 2.0.3 и более
+ Ñ?анниÑ? позволÑ?еÑ? Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам Ñ?иÑ?аÑ?Ñ? и Ñ?далÑ?Ñ?Ñ? пÑ?оизволÑ?нÑ?е Ñ?айлÑ?,
+ вÑ?зÑ?ваÑ? оÑ?каз в обÑ?лÑ?живании Ñ? помоÑ?Ñ?Ñ? .. (Ñ?оÑ?ка Ñ?оÑ?ка) в паÑ?амеÑ?Ñ?е Ñ?езеÑ?вного
+ копиÑ?ованиÑ? в дейÑ?Ñ?вии wp-db-backup.php в wp-admin/edit.php.</p></li>
</ul>
- -<p>Wordpress is not present in the oldstable distribution (sarge).</p>
+<p>Wordpress оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вÑ?еÑ? в пÑ?едÑ?дÑ?Ñ?ем Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sarge).</p>
- -<p>For the stable distribution (etch), these problems have been fixed in version
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии
2.0.10-1etch1.</p>
- -<p>We recommend that you upgrade your wordpress package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? wordpress.</p>
</define-tag>
# do not modify the following line
-----BEGIN PGP SIGNATURE-----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=10nT
-----END PGP SIGNATURE-----
Reply to: