www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www proprietary/malware-in-online-conferencing....


From: GNUN
Subject: www proprietary/malware-in-online-conferencing....
Date: Fri, 16 Apr 2021 14:01:08 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     21/04/16 14:01:08

Modified files:
        proprietary    : malware-in-online-conferencing.ru.html 
                         proprietary-insecurity.ru.html 
                         proprietary.ru.html 
        proprietary/po : malware-in-online-conferencing.ru-en.html 
                         malware-in-online-conferencing.ru.po 
                         proprietary-insecurity.ru-en.html 
                         proprietary-insecurity.ru.po 
                         proprietary.ru-en.html proprietary.ru.po 
        server         : sitemap.ru.html 
        server/po      : sitemap.ru-en.html sitemap.ru.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-in-online-conferencing.ru.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.ru.html?cvsroot=www&r1=1.109&r2=1.110
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.ru.html?cvsroot=www&r1=1.210&r2=1.211
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-in-online-conferencing.ru-en.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-in-online-conferencing.ru.po?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru-en.html?cvsroot=www&r1=1.108&r2=1.109
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.285&r2=1.286
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru-en.html?cvsroot=www&r1=1.207&r2=1.208
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.495&r2=1.496
http://web.cvs.savannah.gnu.org/viewcvs/www/server/sitemap.ru.html?cvsroot=www&r1=1.479&r2=1.480
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/sitemap.ru-en.html?cvsroot=www&r1=1.281&r2=1.282
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/sitemap.ru.po?cvsroot=www&r1=1.634&r2=1.635

Patches:
Index: proprietary/malware-in-online-conferencing.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-in-online-conferencing.ru.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary/malware-in-online-conferencing.ru.html  15 Mar 2021 13:39:17 
-0000      1.4
+++ proprietary/malware-in-online-conferencing.ru.html  16 Apr 2021 18:01:02 
-0000      1.5
@@ -71,6 +71,20 @@
 <div class="column-limit" id="malware-in-online-conferencing"></div>
 
 <ul class="blurbs">
+  <li id="M202104090">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Исследователи раскрыли уязвимость 
нулевого дня в Zoom, которую <a
+href="https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-code-execution-without-user-input/";>можно
+применять для запуска атак исполнения 
кода на расстоянии</a>. Исследователи
+продемонстрировали цепь атаки из трех 
ошибок, которая привела к исполнению
+кода на подопытной машине&nbsp;&mdash; без 
какого-либо взаимодействия с
+пользователем.</p>
+  </li>
+
   <li id="M202012190">
     
     <!--#set var="DATE" value='<small class="date-tag">
@@ -243,7 +257,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2021/03/15 13:39:17 $
+$Date: 2021/04/16 18:01:02 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-insecurity.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.ru.html,v
retrieving revision 1.109
retrieving revision 1.110
diff -u -b -r1.109 -r1.110
--- proprietary/proprietary-insecurity.ru.html  16 Mar 2021 19:32:39 -0000      
1.109
+++ proprietary/proprietary-insecurity.ru.html  16 Apr 2021 18:01:02 -0000      
1.110
@@ -83,6 +83,20 @@
 <div class="column-limit" id="proprietary-insecurity"></div>
 
 <ul class="blurbs">
+  <li id="M202104090">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Исследователи раскрыли уязвимость 
нулевого дня в Zoom, которую <a
+href="https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-code-execution-without-user-input/";>можно
+применять для запуска атак исполнения 
кода на расстоянии</a>. Исследователи
+продемонстрировали цепь атаки из трех 
ошибок, которая привела к исполнению
+кода на подопытной машине&nbsp;&mdash; без 
какого-либо взаимодействия с
+пользователем.</p>
+  </li>
+
   <li id="M202103090">
     
     <!--#set var="DATE" value='<small class="date-tag">
@@ -1346,7 +1360,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2021/03/16 19:32:39 $
+$Date: 2021/04/16 18:01:02 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.ru.html,v
retrieving revision 1.210
retrieving revision 1.211
diff -u -b -r1.210 -r1.211
--- proprietary/proprietary.ru.html     12 Apr 2021 08:04:24 -0000      1.210
+++ proprietary/proprietary.ru.html     16 Apr 2021 18:01:02 -0000      1.211
@@ -201,6 +201,20 @@
 <h3 id="latest">Последние добавления</h3>
 
 <ul class="blurbs">
+  <li id="M202104090">
+    
+    <!--#set var="DATE" value='<small class="date-tag">
+2021-04</small>'
+    -->
+<!--#echo encoding="none" var="DATE" -->
+<p>Исследователи раскрыли уязвимость 
нулевого дня в Zoom, которую <a
+href="https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-code-execution-without-user-input/";>можно
+применять для запуска атак исполнения 
кода на расстоянии</a>. Исследователи
+продемонстрировали цепь атаки из трех 
ошибок, которая привела к исполнению
+кода на подопытной машине&nbsp;&mdash; без 
какого-либо взаимодействия с
+пользователем.</p>
+  </li>
+
   <li id="M202102160">
     
     <!--#set var="DATE" value='<small class="date-tag">
@@ -272,22 +286,6 @@
 href="/philosophy/words-to-avoid.html#Hacker">&ldquo;хакеры&rdquo;</a>
 неверно используется для обозначения 
взломщиков.</small></p>
   </li>
-
-  <li id="M202010282">
-    
-    <!--#set var="DATE" value='<small class="date-tag">
-2020-10</small>'
-    -->
-<!--#echo encoding="none" var="DATE" -->
-<p>Производители телевизоров движутся к 
производству только &ldquo;умных&rdquo;
-телевизоров (а в их состав входят 
программы-шпионы), так что <a
-href="https://frame.work/blog/in-defense-of-dumb-tvs";>теперь очень 
трудно
-найти телевизор, который бы не шпионил за 
вами</a>.</p>
-
-    <p>Выходит, схема предприятия этих 
производителей&nbsp;&mdash; не выпускать
-телевизоры и продавать их за деньги, а 
собирать ваши личные данные и
-(возможно) с выгодой передавать их 
другим.</p>
-  </li>
 </ul>
 
 </div>
@@ -369,7 +367,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2021/04/12 08:04:24 $
+$Date: 2021/04/16 18:01:02 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/po/malware-in-online-conferencing.ru-en.html
===================================================================
RCS file: 
/web/www/www/proprietary/po/malware-in-online-conferencing.ru-en.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary/po/malware-in-online-conferencing.ru-en.html    15 Mar 2021 
13:39:23 -0000      1.4
+++ proprietary/po/malware-in-online-conferencing.ru-en.html    16 Apr 2021 
18:01:03 -0000      1.5
@@ -65,6 +65,17 @@
 <div class="column-limit" id="malware-in-online-conferencing"></div>
 
 <ul class="blurbs">
+  <li id="M202104090">
+    <!--#set var="DATE" value='<small class="date-tag">2021-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>A zero-day vulnerability in Zoom which <a
+    
href="https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-code-execution-without-user-input/";>can
+    be used to launch remote code execution (RCE) attacks</a> has been
+    disclosed by researchers. The researchers demonstrated a three-bug
+    attack chain that caused an RCE on a target machine, and all without
+    any form of user interaction.</p>
+  </li>
+
   <li id="M202012190">
     <!--#set var="DATE" value='<small class="date-tag">2020-12</small>'
     --><!--#echo encoding="none" var="DATE" -->
@@ -202,7 +213,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/03/15 13:39:23 $
+$Date: 2021/04/16 18:01:03 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/malware-in-online-conferencing.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-in-online-conferencing.ru.po,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary/po/malware-in-online-conferencing.ru.po 16 Apr 2021 17:31:23 
-0000      1.6
+++ proprietary/po/malware-in-online-conferencing.ru.po 16 Apr 2021 18:01:03 
-0000      1.7
@@ -16,7 +16,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2021-04-16 17:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Online Conferencing - GNU Project - Free Software Foundation"
@@ -101,6 +100,12 @@
 "attack chain that caused an RCE on a target machine, and all without any "
 "form of user interaction."
 msgstr ""
+"Исследователи раскрыли уязвимость 
нулевого дня в Zoom, которую <a href="
+"\"https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-";
+"code-execution-without-user-input/\">можно применять для 
запуска атак "
+"исполнения кода на расстоянии</a>. 
Исследователи продемонстрировали цепь "
+"атаки из трех ошибок, которая привела к 
исполнению кода на подопытной "
+"машине&nbsp;&mdash; без какого-либо 
взаимодействия с пользователем."
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""

Index: proprietary/po/proprietary-insecurity.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru-en.html,v
retrieving revision 1.108
retrieving revision 1.109
diff -u -b -r1.108 -r1.109
--- proprietary/po/proprietary-insecurity.ru-en.html    16 Mar 2021 19:32:41 
-0000      1.108
+++ proprietary/po/proprietary-insecurity.ru-en.html    16 Apr 2021 18:01:03 
-0000      1.109
@@ -76,6 +76,17 @@
 <div class="column-limit" id="proprietary-insecurity"></div>
 
 <ul class="blurbs">
+  <li id="M202104090">
+    <!--#set var="DATE" value='<small class="date-tag">2021-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>A zero-day vulnerability in Zoom which <a
+    
href="https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-code-execution-without-user-input/";>can
+    be used to launch remote code execution (RCE) attacks</a> has been
+    disclosed by researchers. The researchers demonstrated a three-bug
+    attack chain that caused an RCE on a target machine, and all without
+    any form of user interaction.</p>
+  </li>
+
   <li id="M202103090">
     <!--#set var="DATE" value='<small class="date-tag">2021-03</small>'
     --><!--#echo encoding="none" var="DATE" -->
@@ -1076,7 +1087,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/03/16 19:32:41 $
+$Date: 2021/04/16 18:01:03 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.285
retrieving revision 1.286
diff -u -b -r1.285 -r1.286
--- proprietary/po/proprietary-insecurity.ru.po 16 Apr 2021 17:31:23 -0000      
1.285
+++ proprietary/po/proprietary-insecurity.ru.po 16 Apr 2021 18:01:03 -0000      
1.286
@@ -16,7 +16,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2021-04-16 17:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -129,6 +128,12 @@
 "attack chain that caused an RCE on a target machine, and all without any "
 "form of user interaction."
 msgstr ""
+"Исследователи раскрыли уязвимость 
нулевого дня в Zoom, которую <a href="
+"\"https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-";
+"code-execution-without-user-input/\">можно применять для 
запуска атак "
+"исполнения кода на расстоянии</a>. 
Исследователи продемонстрировали цепь "
+"атаки из трех ошибок, которая привела к 
исполнению кода на подопытной "
+"машине&nbsp;&mdash; без какого-либо 
взаимодействия с пользователем."
 
 #. type: Content of: <div><div><ul><li><p>
 msgid ""

Index: proprietary/po/proprietary.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru-en.html,v
retrieving revision 1.207
retrieving revision 1.208
diff -u -b -r1.207 -r1.208
--- proprietary/po/proprietary.ru-en.html       16 Apr 2021 05:31:06 -0000      
1.207
+++ proprietary/po/proprietary.ru-en.html       16 Apr 2021 18:01:03 -0000      
1.208
@@ -186,6 +186,17 @@
 <h3 id="latest">Latest additions</h3>
 
 <ul class="blurbs">
+  <li id="M202104090">
+    <!--#set var="DATE" value='<small class="date-tag">2021-04</small>'
+    --><!--#echo encoding="none" var="DATE" -->
+    <p>A zero-day vulnerability in Zoom which <a
+    
href="https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-code-execution-without-user-input/";>can
+    be used to launch remote code execution (RCE) attacks</a> has been
+    disclosed by researchers. The researchers demonstrated a three-bug
+    attack chain that caused an RCE on a target machine, and all without
+    any form of user interaction.</p>
+  </li>
+
   <li id="M202102160">
     <!--#set var="DATE" value='<small class="date-tag">2021-02</small>'
     --><!--#echo encoding="none" var="DATE" -->
@@ -242,19 +253,6 @@
     wrongly refers to crackers as &ldquo;<a
     
href="/philosophy/words-to-avoid.html#Hacker">hackers</a>&rdquo;.</small></p>
   </li>
-
-  <li id="M202010282">
-    <!--#set var="DATE" value='<small class="date-tag">2020-10</small>'
-    --><!--#echo encoding="none" var="DATE" -->
-    <p>TV manufacturers are turning to produce only
-    &ldquo;Smart&rdquo; TV sets (which include spyware) that <a
-    href="https://frame.work/blog/in-defense-of-dumb-tvs";>it's now very
-    hard to find a TV that doesn't spy on you</a>.</p>
-
-    <p>It appears that those manufacturers business model is not to produce
-    TV and sell them for money, but to collect your personal data and
-    (possibly) hand over them to others for benefit.</p>
-  </li>
 </ul>
 
 </div>
@@ -317,7 +315,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/04/16 05:31:06 $
+$Date: 2021/04/16 18:01:03 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.495
retrieving revision 1.496
diff -u -b -r1.495 -r1.496
--- proprietary/po/proprietary.ru.po    16 Apr 2021 17:31:27 -0000      1.495
+++ proprietary/po/proprietary.ru.po    16 Apr 2021 18:01:03 -0000      1.496
@@ -16,7 +16,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2021-04-16 17:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -348,6 +347,12 @@
 "attack chain that caused an RCE on a target machine, and all without any "
 "form of user interaction."
 msgstr ""
+"Исследователи раскрыли уязвимость 
нулевого дня в Zoom, которую <a href="
+"\"https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-";
+"code-execution-without-user-input/\">можно применять для 
запуска атак "
+"исполнения кода на расстоянии</a>. 
Исследователи продемонстрировали цепь "
+"атаки из трех ошибок, которая привела к 
исполнению кода на подопытной "
+"машине&nbsp;&mdash; без какого-либо 
взаимодействия с пользователем."
 
 #. type: Content of: <div><ul><li><p>
 msgid ""

Index: server/sitemap.ru.html
===================================================================
RCS file: /web/www/www/server/sitemap.ru.html,v
retrieving revision 1.479
retrieving revision 1.480
diff -u -b -r1.479 -r1.480
--- server/sitemap.ru.html      16 Apr 2021 17:01:05 -0000      1.479
+++ server/sitemap.ru.html      16 Apr 2021 18:01:04 -0000      1.480
@@ -1867,7 +1867,7 @@
 </span>
 <dl>
   <dt><a href="/proprietary/all.html">all.html</a></dt>
-  <dd>All Items in the Malware Section</dd>
+  <dd>Все статьи раздела вредоносных 
программ</dd>
   <dt><a href="/proprietary/malware-adobe.html">malware-adobe.html</a></dt>
   <dd>Программы Adobe вредоносны</dd>
   <dt><a href="/proprietary/malware-amazon.html">malware-amazon.html</a></dt>
@@ -2266,7 +2266,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2021/04/16 17:01:05 $
+$Date: 2021/04/16 18:01:04 $
 
 <!-- timestamp end -->
 </p>

Index: server/po/sitemap.ru-en.html
===================================================================
RCS file: /web/www/www/server/po/sitemap.ru-en.html,v
retrieving revision 1.281
retrieving revision 1.282
diff -u -b -r1.281 -r1.282
--- server/po/sitemap.ru-en.html        8 Apr 2021 17:03:14 -0000       1.281
+++ server/po/sitemap.ru-en.html        16 Apr 2021 18:01:04 -0000      1.282
@@ -1727,6 +1727,8 @@
 Proprietary Software Is Often Malware<span class="gnun-split"></span>
 </span>
 <dl>
+  <dt><a href="/proprietary/all.html">all.html</a></dt>
+  <dd>All Items in the Malware Section</dd>
   <dt><a href="/proprietary/malware-adobe.html">malware-adobe.html</a></dt>
   <dd>Adobe's Software is Malware</dd>
   <dt><a href="/proprietary/malware-amazon.html">malware-amazon.html</a></dt>
@@ -2088,7 +2090,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2021/04/08 17:03:14 $
+$Date: 2021/04/16 18:01:04 $
 <!-- timestamp end -->
 </p>
 </div>

Index: server/po/sitemap.ru.po
===================================================================
RCS file: /web/www/www/server/po/sitemap.ru.po,v
retrieving revision 1.634
retrieving revision 1.635
diff -u -b -r1.634 -r1.635
--- server/po/sitemap.ru.po     16 Apr 2021 17:49:54 -0000      1.634
+++ server/po/sitemap.ru.po     16 Apr 2021 18:01:07 -0000      1.635
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2021-04-16 16:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Site map of www.gnu.org - GNU Project - Free Software Foundation"



reply via email to

[Prev in Thread] Current Thread [Next in Thread]