Author: markt
Date: Fri May 13 16:11:55 2022
New Revision: 1900860

URL: http://svn.apache.org/viewvc?rev=1900860&view=rev
Log:
High got used for recent announcement so use Important/High

Modified:
    tomcat/site/trunk/docs/security-impact.html
    tomcat/site/trunk/xdocs/security-impact.xml

Modified: tomcat/site/trunk/docs/security-impact.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-impact.html?rev=1900860&r1=1900859&r2=1900860&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-impact.html (original)
+++ tomcat/site/trunk/docs/security-impact.html Fri May 13 16:11:55 2022
@@ -20,13 +20,14 @@
        arbitrary code (either as the user the server is running as, or root).
        These are the sorts of vulnerabilities that could be exploited
        automatically by worms.</p>
-  </div><h3 id="Important">Important</h3><div class="text">
-    <p>A vulnerability rated as Important impact is one which could result in
-       the compromise of data or availability of the server. For Tomcat this
-       includes issues that allow an easy remote denial of service (something
-       that is out of proportion to the attack or with a lasting consequence),
-       access to arbitrary files outside of the context root, or access to 
files
-       that should be otherwise prevented by limits or authentication.</p>
+  </div><h3 id="Important_/_High">Important / High</h3><div class="text">
+    <p>A vulnerability rated as Important )or High) impact is one which could
+       result in the compromise of data or availability of the server. For
+       Tomcat this includes issues that allow an easy remote denial of service
+       (something that is out of proportion to the attack or with a lasting
+       consequence), access to arbitrary files outside of the context root, or
+       access to files that should be otherwise prevented by limits or
+       authentication.</p>
   </div><h3 id="Moderate">Moderate</h3><div class="text">
     <p>A vulnerability is likely to be rated as Moderate if there is 
significant
        mitigation to make the issue less of an impact. This might be because 
the

Modified: tomcat/site/trunk/xdocs/security-impact.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-impact.xml?rev=1900860&r1=1900859&r2=1900860&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-impact.xml (original)
+++ tomcat/site/trunk/xdocs/security-impact.xml Fri May 13 16:11:55 2022
@@ -32,13 +32,14 @@
        automatically by worms.</p>
   </section>
 
-  <section name="Important">
-    <p>A vulnerability rated as Important impact is one which could result in
-       the compromise of data or availability of the server. For Tomcat this
-       includes issues that allow an easy remote denial of service (something
-       that is out of proportion to the attack or with a lasting consequence),
-       access to arbitrary files outside of the context root, or access to 
files
-       that should be otherwise prevented by limits or authentication.</p>
+  <section name="Important / High">
+    <p>A vulnerability rated as Important )or High) impact is one which could
+       result in the compromise of data or availability of the server. For
+       Tomcat this includes issues that allow an easy remote denial of service
+       (something that is out of proportion to the attack or with a lasting
+       consequence), access to arbitrary files outside of the context root, or
+       access to files that should be otherwise prevented by limits or
+       authentication.</p>
   </section>
 
   <section name="Moderate">



---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to