svn commit: r1799823 - in /ofbiz/branches/ofbiz-new-website: download.html template/page/download.tpl.php

Previous Topic Next Topic
 
classic Classic list List threaded Threaded
1 message Options
Reply | Threaded
Open this post in threaded view
|

svn commit: r1799823 - in /ofbiz/branches/ofbiz-new-website: download.html template/page/download.tpl.php

mbrohl
Author: mbrohl
Date: Sun Jun 25 15:49:53 2017
New Revision: 1799823

URL: http://svn.apache.org/viewvc?rev=1799823&view=rev
Log:
Improved: added OFBiz 16.11 release and removed 14.12. Added missing CVE links and newer entries.

Modified:
    ofbiz/branches/ofbiz-new-website/download.html
    ofbiz/branches/ofbiz-new-website/template/page/download.tpl.php

Modified: ofbiz/branches/ofbiz-new-website/download.html
URL: http://svn.apache.org/viewvc/ofbiz/branches/ofbiz-new-website/download.html?rev=1799823&r1=1799822&r2=1799823&view=diff
==============================================================================
--- ofbiz/branches/ofbiz-new-website/download.html (original)
+++ ofbiz/branches/ofbiz-new-website/download.html Sun Jun 25 15:49:53 2017
@@ -152,8 +152,8 @@
                 <div class="tab-pane active" id="tabs-1">
                   <ul>
                     <li>
-                      <h2>OFBiz 14.12.01</h2>
-                      <p>Download OFBiz 14.12.</p>
+                      <h2>OFBiz 16.11.03</h2>
+                      <p>Download OFBiz 16.11.</p>
                       <a href="#" class="moreLink">&rarr; read more</a> </li>
                     <li>
                       <h2>OFBiz 13.07</h2>
@@ -205,6 +205,9 @@
             <div class="imgWrapper"> <img src="images/img-fullwidth.jpg" alt="image fullwidth"> </div>
             <p> <strong> Use the links below to download Apache OFBiz releases from the "Apache Download Mirrors" page; On that page you'll also find instructions on how to verify the integrity of the release file using the signature and hashes (PGP, MD5, SHA512) available for each release. </strong> </p>
             <p> Despite our best efforts to maintain up to three active release branches, support for older branches can decrease because our project volunteers may be focused on other issues. We recommend using releases from the most recent branch wherever possible. </p>
+            <h2>Apache OFBiz 16.11</h2>
+            <div class="divider"><span></span></div>
+            <p> facilisis porttitor nisl. Nulla scelerisque lectus id ipsum sollicitudin euismod. Mauris fermentum erat a ante tincidunt id condimentum lorem sodales. Nam lacus justo, porttitor sit amet egestas sit amet, scelerisque non nibh. Ut ultricies orci vitae nisl viverra quis tempus nulla ultricies. Etiam lorem tellus, porttitor nec fermentum sed, scelerisque eget sapien. Fusce quam turpis, bibendum eu pretium ut, vehicula eget mi. Aliquam erat volutpat. </p>
             <h2>Apache OFBiz 14.12</h2>
             <div class="divider"><span></span></div>
             <p> facilisis porttitor nisl. Nulla scelerisque lectus id ipsum sollicitudin euismod. Mauris fermentum erat a ante tincidunt id condimentum lorem sodales. Nam lacus justo, porttitor sit amet egestas sit amet, scelerisque non nibh. Ut ultricies orci vitae nisl viverra quis tempus nulla ultricies. Etiam lorem tellus, porttitor nec fermentum sed, scelerisque eget sapien. Fusce quam turpis, bibendum eu pretium ut, vehicula eget mi. Aliquam erat volutpat. </p>
@@ -220,20 +223,24 @@
     <p> Nightly snapshots can be found here</p>
             <h2>Security Vulnerabilities</h2>
             <div class="divider"><span></span></div>
-            <p> <strong> We strongly encourage OfBiz users to report security problems affecting OFBiz to the private security mailing list of the ASF Security Team, before disclosing them in a public forum. </strong></p>
+            <p> <strong> We strongly encourage OFBiz users to report security problems affecting OFBiz to the private security mailing list of the ASF Security Team, before disclosing them in a public forum. </strong></p>
             <p> Please see the ASF Security Team page for further details and their contact information. </p>
-            <h3>List of Knows Vulnerabilities</h3>
+            <h3>List of Known Vulnerabilities</h3>
             <ul class="iconsList">
-               <li><i class="icon-pin"></i> CVE-2014-0232; affected releases: 12.04.03 and earlier versions (12.04.*), 11.04.04 and earlier versions (11.04.*); fixed in 12.04.04 and 11.04.05</li>
-                <li><i class="icon-pin"></i> CVE-2013-2250; affected releases: 12.04.01, 11.04.02 and earlier versions (11.04.*), 10.04.05 and earlier versions (10.04.*); fixed in 12.04.02, 11.04.03 and 10.04.06</li>
- <li><i class="icon-pin"></i> CVE-2013-2137; affected releases: 12.04.01, 11.04.02 and earlier versions (11.04.*), 10.04.05 and earlier versions (10.04.*); fixed in 12.04.02, 11.04.03 and 10.04.06</li>
- <li><i class="icon-pin"></i> CVE-2013-0177; affected releases: 11.04.01, 10.04.04 and earlier versions (10.04.*); fixed in 11.04.02 and 10.04.05</li>
- <li><i class="icon-pin"></i> CVE-2012-3506; affected releases: 10.04.02, 10.04 (10.04.01); fixed in 10.04.03</li>
- <li><i class="icon-pin"></i> CVE-2012-1622; affected releases: 10.04 (10.04.01); fixed in 10.04.02</li>
- <li><i class="icon-pin"></i> CVE-2012-1621; affected releases: 10.04 (10.04.01); fixed in 10.04.02</li>
- <li><i class="icon-pin"></i> CVE-2010-0432; affected releases: 09.04; fixed in 09.04.01</li>
-             </ul>
- </div>
+ <li><i class="icon-pin"></i> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6800" target="external">CVE-2016-6800</a>; affected releases: 13.07.*, 12.04.*, 11.04.*; fixed in 16.11.01</li>
+ <li><i class="icon-pin"></i> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4462" target="external">CVE-2016-4462</a>; affected releases: 13.07.*, 12.04.*, 11.04.*; fixed in 16.11.01</li>
+ <li><i class="icon-pin"></i> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2170" target="external">CVE-2016-2170</a>; affected releases: 13.07.02 and earlier versions (13.07.*), 12.04.05 and earlier versions (12.04.*); fixed in 13.07.03 and 12.04.06</li>
+ <li><i class="icon-pin"></i> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3268" target="external">CVE-2015-3268</a>; affected releases: 13.07.02 and earlier versions (13.07.*), 12.04.05 and earlier versions (12.04.*); fixed in 13.07.03 and 12.04.06</li>
+ <li><i class="icon-pin"></i> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0232" target="external">CVE-2014-0232</a>; affected releases: 12.04.03 and earlier versions (12.04.*), 11.04.04 and earlier versions (11.04.*); fixed in 12.04.04 and 11.04.05</li>
+ <li><i class="icon-pin"></i> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2250" target="external">CVE-2013-2250</a>; affected releases: 12.04.01, 11.04.02 and earlier versions (11.04.*), 10.04.05 and earlier versions (10.04.*); fixed in 12.04.02, 11.04.03 and 10.04.06</li>
+ <li><i class="icon-pin"></i> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2137" target="external">CVE-2013-2137</a>; affected releases: 12.04.01, 11.04.02 and earlier versions (11.04.*), 10.04.05 and earlier versions (10.04.*); fixed in 12.04.02, 11.04.03 and 10.04.06</li>
+ <li><i class="icon-pin"></i> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0177" target="external">CVE-2013-0177</a>; affected releases: 11.04.01, 10.04.04 and earlier versions (10.04.*); fixed in 11.04.02 and 10.04.05</li>
+ <li><i class="icon-pin"></i> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3506" target="external">CVE-2012-3506</a>; affected releases: 10.04.02, 10.04 (10.04.01); fixed in 10.04.03</li>
+ <li><i class="icon-pin"></i> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1622" target="external">CVE-2012-1622</a>; affected releases: 10.04 (10.04.01); fixed in 10.04.02</li>
+ <li><i class="icon-pin"></i> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1621" target="external">CVE-2012-1621</a>; affected releases: 10.04 (10.04.01); fixed in 10.04.02</li>
+ <li><i class="icon-pin"></i> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0432" target="external">CVE-2010-0432</a>; affected releases: 09.04; fixed in 09.04.01</li>
+            </ul>
+      </div>
         </div>
       </div>
     </div>

Modified: ofbiz/branches/ofbiz-new-website/template/page/download.tpl.php
URL: http://svn.apache.org/viewvc/ofbiz/branches/ofbiz-new-website/template/page/download.tpl.php?rev=1799823&r1=1799822&r2=1799823&view=diff
==============================================================================
--- ofbiz/branches/ofbiz-new-website/template/page/download.tpl.php (original)
+++ ofbiz/branches/ofbiz-new-website/template/page/download.tpl.php Sun Jun 25 15:49:53 2017
@@ -40,8 +40,8 @@
                 <div class="tab-pane active" id="tabs-1">
                   <ul>
                     <li>
-                      <h2>OFBiz 14.12.01</h2>
-                      <p>Download OFBiz 14.12.</p>
+                      <h2>OFBiz 16.11.03</h2>
+                      <p>Download OFBiz 16.11.</p>
                       <a href="#" class="moreLink">&rarr; read more</a> </li>
                     <li>
                       <h2>OFBiz 13.07</h2>
@@ -93,6 +93,9 @@
             <div class="imgWrapper"> <img src="images/img-fullwidth.jpg" alt="image fullwidth"> </div>
             <p> <strong> Use the links below to download Apache OFBiz releases from the "Apache Download Mirrors" page; On that page you'll also find instructions on how to verify the integrity of the release file using the signature and hashes (PGP, MD5, SHA512) available for each release. </strong> </p>
             <p> Despite our best efforts to maintain up to three active release branches, support for older branches can decrease because our project volunteers may be focused on other issues. We recommend using releases from the most recent branch wherever possible. </p>
+            <h2>Apache OFBiz 16.11</h2>
+            <div class="divider"><span></span></div>
+            <p> facilisis porttitor nisl. Nulla scelerisque lectus id ipsum sollicitudin euismod. Mauris fermentum erat a ante tincidunt id condimentum lorem sodales. Nam lacus justo, porttitor sit amet egestas sit amet, scelerisque non nibh. Ut ultricies orci vitae nisl viverra quis tempus nulla ultricies. Etiam lorem tellus, porttitor nec fermentum sed, scelerisque eget sapien. Fusce quam turpis, bibendum eu pretium ut, vehicula eget mi. Aliquam erat volutpat. </p>
             <h2>Apache OFBiz 14.12</h2>
             <div class="divider"><span></span></div>
             <p> facilisis porttitor nisl. Nulla scelerisque lectus id ipsum sollicitudin euismod. Mauris fermentum erat a ante tincidunt id condimentum lorem sodales. Nam lacus justo, porttitor sit amet egestas sit amet, scelerisque non nibh. Ut ultricies orci vitae nisl viverra quis tempus nulla ultricies. Etiam lorem tellus, porttitor nec fermentum sed, scelerisque eget sapien. Fusce quam turpis, bibendum eu pretium ut, vehicula eget mi. Aliquam erat volutpat. </p>
@@ -108,20 +111,24 @@
     <p> Nightly snapshots can be found here</p>
             <h2>Security Vulnerabilities</h2>
             <div class="divider"><span></span></div>
-            <p> <strong> We strongly encourage OfBiz users to report security problems affecting OFBiz to the private security mailing list of the ASF Security Team, before disclosing them in a public forum. </strong></p>
+            <p> <strong> We strongly encourage OFBiz users to report security problems affecting OFBiz to the private security mailing list of the ASF Security Team, before disclosing them in a public forum. </strong></p>
             <p> Please see the ASF Security Team page for further details and their contact information. </p>
-            <h3>List of Knows Vulnerabilities</h3>
+            <h3>List of Known Vulnerabilities</h3>
             <ul class="iconsList">
-               <li><i class="icon-pin"></i> CVE-2014-0232; affected releases: 12.04.03 and earlier versions (12.04.*), 11.04.04 and earlier versions (11.04.*); fixed in 12.04.04 and 11.04.05</li>
-                <li><i class="icon-pin"></i> CVE-2013-2250; affected releases: 12.04.01, 11.04.02 and earlier versions (11.04.*), 10.04.05 and earlier versions (10.04.*); fixed in 12.04.02, 11.04.03 and 10.04.06</li>
- <li><i class="icon-pin"></i> CVE-2013-2137; affected releases: 12.04.01, 11.04.02 and earlier versions (11.04.*), 10.04.05 and earlier versions (10.04.*); fixed in 12.04.02, 11.04.03 and 10.04.06</li>
- <li><i class="icon-pin"></i> CVE-2013-0177; affected releases: 11.04.01, 10.04.04 and earlier versions (10.04.*); fixed in 11.04.02 and 10.04.05</li>
- <li><i class="icon-pin"></i> CVE-2012-3506; affected releases: 10.04.02, 10.04 (10.04.01); fixed in 10.04.03</li>
- <li><i class="icon-pin"></i> CVE-2012-1622; affected releases: 10.04 (10.04.01); fixed in 10.04.02</li>
- <li><i class="icon-pin"></i> CVE-2012-1621; affected releases: 10.04 (10.04.01); fixed in 10.04.02</li>
- <li><i class="icon-pin"></i> CVE-2010-0432; affected releases: 09.04; fixed in 09.04.01</li>
-             </ul>
- </div>
+ <li><i class="icon-pin"></i> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6800" target="external">CVE-2016-6800</a>; affected releases: 13.07.*, 12.04.*, 11.04.*; fixed in 16.11.01</li>
+ <li><i class="icon-pin"></i> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4462" target="external">CVE-2016-4462</a>; affected releases: 13.07.*, 12.04.*, 11.04.*; fixed in 16.11.01</li>
+ <li><i class="icon-pin"></i> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2170" target="external">CVE-2016-2170</a>; affected releases: 13.07.02 and earlier versions (13.07.*), 12.04.05 and earlier versions (12.04.*); fixed in 13.07.03 and 12.04.06</li>
+ <li><i class="icon-pin"></i> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3268" target="external">CVE-2015-3268</a>; affected releases: 13.07.02 and earlier versions (13.07.*), 12.04.05 and earlier versions (12.04.*); fixed in 13.07.03 and 12.04.06</li>
+ <li><i class="icon-pin"></i> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0232" target="external">CVE-2014-0232</a>; affected releases: 12.04.03 and earlier versions (12.04.*), 11.04.04 and earlier versions (11.04.*); fixed in 12.04.04 and 11.04.05</li>
+ <li><i class="icon-pin"></i> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2250" target="external">CVE-2013-2250</a>; affected releases: 12.04.01, 11.04.02 and earlier versions (11.04.*), 10.04.05 and earlier versions (10.04.*); fixed in 12.04.02, 11.04.03 and 10.04.06</li>
+ <li><i class="icon-pin"></i> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2137" target="external">CVE-2013-2137</a>; affected releases: 12.04.01, 11.04.02 and earlier versions (11.04.*), 10.04.05 and earlier versions (10.04.*); fixed in 12.04.02, 11.04.03 and 10.04.06</li>
+ <li><i class="icon-pin"></i> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0177" target="external">CVE-2013-0177</a>; affected releases: 11.04.01, 10.04.04 and earlier versions (10.04.*); fixed in 11.04.02 and 10.04.05</li>
+ <li><i class="icon-pin"></i> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3506" target="external">CVE-2012-3506</a>; affected releases: 10.04.02, 10.04 (10.04.01); fixed in 10.04.03</li>
+ <li><i class="icon-pin"></i> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1622" target="external">CVE-2012-1622</a>; affected releases: 10.04 (10.04.01); fixed in 10.04.02</li>
+ <li><i class="icon-pin"></i> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1621" target="external">CVE-2012-1621</a>; affected releases: 10.04 (10.04.01); fixed in 10.04.02</li>
+ <li><i class="icon-pin"></i> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0432" target="external">CVE-2010-0432</a>; affected releases: 09.04; fixed in 09.04.01</li>
+            </ul>
+      </div>
         </div>
       </div>
     </div>