Repository: cordova-docs
Updated Branches:
  refs/heads/master 04aa49086 -> 0ea960955


CB-10843 Fixing typo.


Project: http://git-wip-us.apache.org/repos/asf/cordova-docs/repo
Commit: http://git-wip-us.apache.org/repos/asf/cordova-docs/commit/0ea96095
Tree: http://git-wip-us.apache.org/repos/asf/cordova-docs/tree/0ea96095
Diff: http://git-wip-us.apache.org/repos/asf/cordova-docs/diff/0ea96095

Branch: refs/heads/master
Commit: 0ea96095569a8ba78e006152438d529be2698809
Parents: 04aa490
Author: Dmitry Blotsky <dmitry.blot...@gmail.com>
Authored: Wed Apr 6 18:59:03 2016 -0700
Committer: Dmitry Blotsky <dmitry.blot...@gmail.com>
Committed: Wed Apr 6 18:59:03 2016 -0700

----------------------------------------------------------------------
 www/_posts/2015-11-20-security.md | 8 ++++----
 1 file changed, 4 insertions(+), 4 deletions(-)
----------------------------------------------------------------------


http://git-wip-us.apache.org/repos/asf/cordova-docs/blob/0ea96095/www/_posts/2015-11-20-security.md
----------------------------------------------------------------------
diff --git a/www/_posts/2015-11-20-security.md 
b/www/_posts/2015-11-20-security.md
index a0813ee..51126c2 100644
--- a/www/_posts/2015-11-20-security.md
+++ b/www/_posts/2015-11-20-security.md
@@ -3,7 +3,7 @@ layout: post
 author:
     name: Joe Bowser
     url: https://twitter.com/infil00p
-title:  "CVE annoucements for Cordova-Android"
+title:  "CVE announcements for Cordova-Android"
 categories: announcements
 tags: news releases security
 ---
@@ -13,7 +13,7 @@ tags: news releases security
 Apache Cordova has re-visited CVE-2015-5256 "Apache Cordova vulnerable to 
improper application of whitelist restrictions on Android”. Upon further 
investigation we found that the vulnerability is more limited than was 
previously understood.
 We are lowering the severity to Low, and updating the description, affected 
versions, and upgrade path.
 
-CVE-2015-5257 continues to be a valid vulnerability present in Cordova 3.6.4 
and this is fixed in later versions of Cordova, and we want to encourage users 
+CVE-2015-5257 continues to be a valid vulnerability present in Cordova 3.6.4 
and this is fixed in later versions of Cordova, and we want to encourage users
 to upgrade to 4.1.1 and for users needing to support Marshmallow (API 23+) we 
recommend to upgrade to Cordova Android 5.1.x.
 
 When using the Cordova CLI, the command to use 4.1.1 or 5.1.0 of Cordova 
Android is:
@@ -44,7 +44,7 @@ Android applications created using Apache Cordova that use a 
remote server conta
 
 Upgrade path:
 
-There is no specific software patch for this vulnerability. Developers that 
are concerned about this should make sure to only whitelist trusted websites, 
and make sure that whitelisted websites don’t redirect to a malicious 
website. 
+There is no specific software patch for this vulnerability. Developers that 
are concerned about this should make sure to only whitelist trusted websites, 
and make sure that whitelisted websites don’t redirect to a malicious website.
 Developers should also use SSL, as well as Content Security Policy(CSP) to 
further mitigate this issue. It’s always recommended for developers to 
upgrade to the latest version of Cordova Android.
 
 Credit: Muneaki Nishimura of Sony Digital Network Applications, Inc
@@ -62,7 +62,7 @@ Cordova Android versions up to 3.6.4
 
 Description:
 
-Cordova uses a bridge that allows the Native Application to communicate with 
the HTML and Javascript that control the user interface.  To protect this 
bridge on Android, the 
+Cordova uses a bridge that allows the Native Application to communicate with 
the HTML and Javascript that control the user interface.  To protect this 
bridge on Android, the
 framework uses a BridgeSecret to protect it from third-party hijacking.  
However, the BridgeSecret is not sufficiently random and can be determined in 
certain scenarios.
 
 Upgreade Path:


---------------------------------------------------------------------
To unsubscribe, e-mail: commits-unsubscr...@cordova.apache.org
For additional commands, e-mail: commits-h...@cordova.apache.org

Reply via email to