[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://{security/2007/dsa-1285.wml}



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2007/dsa-1285.wml	2017-11-01 10:11:09.707804051 +0500
+++ russian/security/2007/dsa-1285.wml	2018-02-17 17:01:13.889081255 +0500
@@ -1,41 +1,42 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-1622";>CVE-2007-1622</a>
- -    <p>Cross-site scripting (XSS) vulnerability in wp-admin/vars.php in
- -    WordPress before 2.0.10 RC2, and before 2.1.3 RC2 in the 2.1 series,
- -    allows remote authenticated users with theme privileges to inject
- -    arbitrary web script or HTML via the PATH_INFO in the administration
- -    interface, related to loose regular expression processing of PHP_SELF.</p></li>
+    <p>Ð?ежÑ?айÑ?овÑ?й Ñ?кÑ?ипÑ?инг (XSS) в wp-admin/vars.php в
+    WordPress до веÑ?Ñ?ии 2.0.10 RC2, а Ñ?акже до веÑ?Ñ?ии 2.1.3 RC2 в Ñ?еÑ?ии 2.1
+    позволÑ?еÑ? Ñ?далÑ?ннÑ?м аÑ?Ñ?енÑ?иÑ?иÑ?иÑ?ованнÑ?м полÑ?зоваÑ?елÑ?м Ñ? пÑ?авами на изменение Ñ?емÑ? вводиÑ?Ñ?
+    пÑ?оизволÑ?нÑ?й веб-Ñ?Ñ?енаÑ?ий или код HTML Ñ? помоÑ?Ñ?Ñ? PATH_INFO в инÑ?еÑ?Ñ?ейÑ?е
+    админиÑ?Ñ?Ñ?аÑ?оÑ?а, Ñ?Ñ?о Ñ?вÑ?зано Ñ? неÑ?оÑ?ной обÑ?абоÑ?кой Ñ?егÑ?лÑ?Ñ?нÑ?Ñ? вÑ?Ñ?ажений PHP_SELF.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-1893";>CVE-2007-1893</a>
- -    <p>WordPress 2.1.2, and probably earlier, allows remote authenticated
- -    users with the contributor role to bypass intended access restrictions
- -    and invoke the publish_posts functionality, which can be used to
- -    <q>publish a previously saved post.</q></p></li>
+    <p>WordPress 2.1.2, а Ñ?акже, веÑ?оÑ?Ñ?но, более Ñ?анние веÑ?Ñ?ии позволÑ?Ñ?Ñ? Ñ?далÑ?ннÑ?м аÑ?Ñ?енÑ?иÑ?иÑ?иÑ?ованнÑ?м
+    полÑ?зоваÑ?елÑ?м, имеÑ?Ñ?им Ñ?олÑ? Ñ?Ñ?аÑ?Ñ?ника, обÑ?одиÑ?Ñ? Ñ?пеÑ?иалÑ?нÑ?е огÑ?аниÑ?ениÑ? доÑ?Ñ?Ñ?па
+    и иÑ?полÑ?зоваÑ?Ñ? Ñ?Ñ?нкÑ?ионалÑ?ноÑ?Ñ?Ñ? publish_posts, коÑ?оÑ?аÑ? можеÑ? иÑ?полÑ?зоваÑ?Ñ?Ñ?Ñ? длÑ?
+    <q>пÑ?бликаÑ?ии Ñ?анее Ñ?оÑ?Ñ?анÑ?нного Ñ?ообÑ?ениÑ?</q>.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-1894";>CVE-2007-1894</a>
- -    <p>Cross-site scripting (XSS) vulnerability in
- -    wp-includes/general-template.php in WordPress before 20070309 allows
- -    remote attackers to inject arbitrary web script or HTML via the year
- -    parameter in the wp_title function.</p></li>
+    <p>Ð?ежÑ?айÑ?овÑ?й Ñ?кÑ?ипÑ?инг (XSS) в
+    wp-includes/general-template.php в WordPress до веÑ?Ñ?ии 20070309 позволÑ?еÑ?
+    Ñ?далÑ?ннÑ?м злоÑ?мÑ?Ñ?ленникам вводиÑ?Ñ? пÑ?оизволÑ?нÑ?й веб-Ñ?Ñ?енаÑ?ий или код HTML Ñ? помоÑ?Ñ?Ñ? паÑ?амеÑ?Ñ?а
+    длÑ? Ñ?казаниÑ? года в Ñ?Ñ?нкÑ?ии wp_title.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2007-1897";>CVE-2007-1897</a>
- -    <p>SQL injection vulnerability in xmlrpc.php in WordPress 2.1.2, and
- -    probably earlier, allows remote authenticated users to execute
- -    arbitrary SQL commands via a string parameter value in an XML RPC
- -    mt.setPostCategories method call, related to the post_id variable.</p></li>
+    <p>SQL-инÑ?екÑ?иÑ? в xmlrpc.php в WordPress 2.1.2, а Ñ?акже, веÑ?оÑ?Ñ?но, более
+    Ñ?анниÑ? веÑ?Ñ?иÑ?Ñ? позволÑ?еÑ? Ñ?далÑ?ннÑ?м аÑ?Ñ?енÑ?иÑ?иÑ?иÑ?ованнÑ?м полÑ?зоваÑ?елÑ?м вÑ?полнÑ?Ñ?Ñ?
+    пÑ?оизволÑ?нÑ?е SQL-командÑ? Ñ? помоÑ?Ñ?Ñ? знаÑ?ениÑ? Ñ?Ñ?Ñ?окового паÑ?амеÑ?Ñ?а в вÑ?зове меÑ?ода XML RPC
+    mt.setPostCategories, Ñ?вÑ?занного Ñ? пеÑ?еменной post_id.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (etch) these issues have been fixed in
- -version 2.0.10-1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (etch) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.0.10-1.</p>
 
- -<p>For the testing and unstable distributions (lenny and sid,
- -respectively), these issues have been fixed in version 2.1.3-1.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом и неÑ?Ñ?абиилÑ?ном вÑ?пÑ?Ñ?каÑ? (Ñ?ооÑ?веÑ?Ñ?Ñ?венно, lenny и
+sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в веÑ?Ñ?ии 2.1.3-1.</p>
 
- -<p>We recommend that you upgrade your wordpress package.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ? wordpress.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=VCVc
-----END PGP SIGNATURE-----


Reply to: