This is an automated email from the ASF dual-hosted git repository.

git-site-role pushed a commit to branch asf-site
in repository https://gitbox.apache.org/repos/asf/sling-site.git


The following commit(s) were added to refs/heads/asf-site by this push:
     new 5a75163bf Automatic website deployment from 
https://ci-builds.apache.org/job/Sling/job/modules/job/sling-site/job/master/658/
5a75163bf is described below

commit 5a75163bfb9a3739b5427a6fdea7c881a084b501
Author: jenkins <[email protected]>
AuthorDate: Fri Apr 14 10:20:20 2023 +0000

    Automatic website deployment from 
https://ci-builds.apache.org/job/Sling/job/modules/job/sling-site/job/master/658/
---
 news.html   | 3 ++-
 sitemap.xml | 2 +-
 2 files changed, 3 insertions(+), 2 deletions(-)

diff --git a/news.html b/news.html
index a65aa5ff9..44a1af6ef 100644
--- a/news.html
+++ b/news.html
@@ -116,6 +116,7 @@
                         </h1><div class="content is-marginless">
 <div class="row"><div><section><ul>
 <li>Vulnerability report and fix: CVE-2022-45064: Apache Sling Engine: 
Include-based XSS (April 12th, 2023), see <a 
href="https://www.cve.org/CVERecord?id=CVE-2022-45064";>https://www.cve.org/CVERecord?id=CVE-2022-45064</a></li>
+<li>Vulnerability report and fix: CVE-2023-26513: Apache Sling Resource 
Merger: Requests to certain paths managed by the Apache Sling Resource Merger 
can lead to DoS (Mar 20th, 2023), see <a 
href="https://www.cve.org/CVERecord?id=CVE-2023-26513";>https://www.cve.org/CVERecord?id=CVE-2023-26513</a></li>
 <li>Vulnerability report and fix: CVE-2023-25621: Apache Sling does not allow 
to handle i18n content in a secure way (Feb 23rd, 2023), see <a 
href="https://www.cve.org/CVERecord?id=CVE-2023-25621";>https://www.cve.org/CVERecord?id=CVE-2023-25621</a></li>
 <li>Vulnerability report and fix: CVE-2023-25141: Apache Sling JCR Base JNDI 
injection (February 14th, 2023), see <a 
href="https://www.cve.org/CVERecord?id=CVE-2023-25141";>https://www.cve.org/CVERecord?id=CVE-2023-25141</a></li>
 <li>Vulnerability report and fix: CVE-2023-22849: Apache Sling App CMS: XSS in 
CMS Reference / UI Components (Feb 3rd, 2023), see <a 
href="https://www.cve.org/CVERecord?id=CVE-2023-22849";>https://www.cve.org/CVERecord?id=CVE-2023-22849</a></li>
@@ -171,7 +172,7 @@
                             content/news.md
                         </a>
                     </div>                    <div class="revisionInfo">
-                        Last modified by <span class="author">angela</span> on 
<span class="comment">2023-04-12</span>
+                        Last modified by <span class="author">angela</span> on 
<span class="comment">2023-04-14</span>
                     </div><p>
                         Apache Sling, Sling, Apache, the Apache feather logo, 
and the Apache Sling project
     logo are trademarks of The Apache Software Foundation. All other marks 
mentioned 
diff --git a/sitemap.xml b/sitemap.xml
index ee8a911c0..b5a06caa5 100644
--- a/sitemap.xml
+++ b/sitemap.xml
@@ -1,7 +1,7 @@
 <?xml version="1.0"?>
 <urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"; 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"; 
xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 
http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd";>
     <url>
-        
<loc>https://sling.apache.org/news.html</loc><lastmod>2023-04-12</lastmod>
+        
<loc>https://sling.apache.org/news.html</loc><lastmod>2023-04-14</lastmod>
     </url><url>
         
<loc>https://sling.apache.org/documentation/the-sling-engine/servlets.html</loc><lastmod>2023-04-12</lastmod>
     </url><url>

Reply via email to