You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@activemq.apache.org by cl...@apache.org on 2019/10/23 13:58:28 UTC
[activemq-website] 01/03: Revert "Changing security.md to reflect
chagnes performed on PR #17"
This is an automated email from the ASF dual-hosted git repository.
clebertsuconic pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/activemq-website.git
commit 2b1b59a7aff4e29a5744a3c22129a74ba0e095e2
Author: Colm O hEigeartaigh <co...@apache.org>
AuthorDate: Wed Oct 23 12:38:05 2019 +0100
Revert "Changing security.md to reflect chagnes performed on PR #17"
This reverts commit 561ecfa16c1145ef0977e5fa432e524d21076dba.
---
src/components/classic/security.md | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/src/components/classic/security.md b/src/components/classic/security.md
index 4f154b0..c6996f1 100644
--- a/src/components/classic/security.md
+++ b/src/components/classic/security.md
@@ -14,10 +14,11 @@ See the main [Security Advisories](../../security-advisories) page for details f
#### 2018
* [CVE-2018-8006](../../security-advisories.data/CVE-2018-8006-announcement.txt) - ActiveMQ Web Console - Cross-Site Scripting
+* [CVE-2017-15709](../../security-advisories.data/CVE-2017-15709-announcement.txt) - Information Leak
* [CVE-2018-11775](../../security-advisories.data/CVE-2018-11775-announcement.txt) - Missing TLS Hostname Verification
#### 2017
-* [CVE-2017-15709](../../security-advisories.data/CVE-2017-15709-announcement.txt) - Information Leak
+* [CVE-2015-7559](../../security-advisories.data/CVE-2015-7559-announcement.txt) - DoS in client via shutdown command
#### 2016
* [CVE-2016-6810](../../security-advisories.data/CVE-2016-6810-announcement.txt) - ActiveMQ Web Console - Cross-Site Scripting
@@ -26,7 +27,6 @@ See the main [Security Advisories](../../security-advisories) page for details f
* [CVE-2016-3088](../../security-advisories.data/CVE-2016-3088-announcement.txt) - ActiveMQ Fileserver web application vulnerabilities
#### 2015
-* [CVE-2015-7559](../../security-advisories.data/CVE-2015-7559-announcement.txt) - DoS in client via shutdown command
* [CVE-2015-5254](../../security-advisories.data/CVE-2015-5254-announcement.txt) - Unsafe deserialization in ActiveMQ
* [CVE-2015-1830](../../security-advisories.data/CVE-2015-1830-announcement.txt) - Path traversal leading to unauthenticated RCE in ActiveMQ