Security reports update
diff --git a/content/en_security_reports.php b/content/en_security_reports.php
index c81fb90..cd2de55 100644
--- a/content/en_security_reports.php
+++ b/content/en_security_reports.php
@@ -248,27 +248,22 @@
<!-- <a href="https://bugs.eclipse.org/bugs/show_bug.cgi?id=413684">413684</a></p></td>-->
<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">Constraints bypassed if Unix symlink alias checker used on Windows.</p></td>-->
<!-- </tr>-->
-<!-- <tr>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">2011/12/29</p></td>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock"><a href="http://www.ocert.org/advisories/ocert-2011-003.html">CERT2011-003</a> <a href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4461">CVE-2011-4461</a></p></td>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">high</p></td>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">medium</p></td>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">All versions</p></td>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">7.6.0.RCO-->
-<!-- <a href="https://bugs.eclipse.org/bugs/show_bug.cgi?id=367638">Jetty-367638</a></p></td>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">Added ContextHandler.setMaxFormKeys (intkeys) to limit the number of parameters (default 1000).</p></td>-->
-<!-- </tr>-->
-<!-- <tr>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">2009/11/05</p></td>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock"><a href="http://www.kb.cert.org/vuls/id/120541">CERT2011-003</a> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555">CERT2011-003</a></p></td>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">medium</p></td>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">high</p></td>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">JVM<1.6u19</p></td>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">jetty-7.01.v20091125, jetty-6.1.22</p></td>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">Work-->
-<!-- around by turning off SSL renegotiation in Jetty. If using JVM > 1.6u19-->
-<!-- setAllowRenegotiate(true) may be called on connectors.</p></td>-->
-<!-- </tr>-->
+ <tr>
+ <td class="tableblock halign-left valign-top"><p class="tableblock">2011/12/29</p></td>
+ <td class="tableblock halign-left valign-top"><p class="tableblock"><a href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4461" title="Added ContextHandler.setMaxFormKeys (intkeys) to limit the number of parameters (default 1000).">CVE-2011-4461</a></p></td>
+ <td class="tableblock halign-left valign-top"><p class="tableblock">high</p></td>
+ <td class="tableblock halign-left valign-top"><p class="tableblock">medium</p></td>
+ <td class="tableblock halign-left valign-top"><p class="tableblock">All versions</p></td>
+ <td class="tableblock halign-left valign-top"><p class="tableblock">7.6.0.RCO/p></td>
+ </tr>
+ <tr>
+ <td class="tableblock halign-left valign-top"><p class="tableblock">2009/11/05</p></td>
+ <td class="tableblock halign-left valign-top"><p class="tableblock"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555" title="Work around by turning off SSL renegotiation in Jetty. If using JVM 1.6u19 setAllowRenegotiate(true) may be called on connectors.">CVE-2009-3555</a></p></td>
+ <td class="tableblock halign-left valign-top"><p class="tableblock">medium</p></td>
+ <td class="tableblock halign-left valign-top"><p class="tableblock">high</p></td>
+ <td class="tableblock halign-left valign-top"><p class="tableblock">JVM<1.6u19</p></td>
+ <td class="tableblock halign-left valign-top"><p class="tableblock">jetty-7.01.v20091125, jetty-6.1.22</p></td>
+ </tr>
<!-- <tr>-->
<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">2009/06/18</p></td>-->
<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">Jetty-1042</p></td>-->
@@ -293,71 +288,57 @@
<!-- </div></div></td>-->
<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">View arbitrary disk content in some specific configurations.</p></td>-->
<!-- </tr>-->
-<!-- <tr>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">2007/12/22</p></td>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock"><a href="http://www.kb.cert.org/vuls/id/553235">CERT553235</a> <a href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-6672">CVE-2007-6672</a></p></td>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">high</p></td>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">medium</p></td>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">6.1.rrc0-6.1.6</p></td>-->
-<!-- <td class="tableblock halign-left valign-top"><div class="content"><div class="paragraph">-->
-<!-- <p>6.1.7</p>-->
-<!-- </div>-->
-<!-- <div class="paragraph">-->
-<!-- <p>CERT553235</p>-->
-<!-- </div></div></td>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">Static content visible in WEB-INF and past security constraints.</p></td>-->
-<!-- </tr>-->
-<!-- <tr>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">2007/11/05</p></td>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock"><a href="http://www.kb.cert.org/vuls/id/438616">CERT438616</a> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5614">CVE-2007-5614</a></p></td>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">low</p></td>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">low</p></td>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock"><6.1.6</p></td>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">6.1.6rc1 (patch in CVS for jetty5)</p></td>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">Single quote in-->
-<!-- cookie name.</p></td>-->
-<!-- </tr>-->
-<!-- <tr>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">2007/11/05</p></td>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock"><a href="http://www.kb.cert.org/vuls/id/237888">CERT237888></a> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5613">CVE-2007-5613</a></p></td>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">low</p></td>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">low</p></td>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock"><6.1.6</p></td>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">6.1.6rc0 (patch in CVS for jetty5)</p></td>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">XSS in demo dup-->
-<!-- servlet.</p></td>-->
-<!-- </tr>-->
-<!-- <tr>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">2007/11/03</p></td>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock"><a href="http://www.kb.cert.org/vuls/id/212984">CERT212984-->
-<!-- ></a> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5615">CVE-2007-5615</a></p></td>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">medium</p></td>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">medium</p></td>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock"><6.1.6</p></td>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">6.1.6rc0 (patch in CVS for jetty5)</p></td>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">CRLF-->
-<!-- Response splitting.</p></td>-->
-<!-- </tr>-->
-<!-- <tr>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">2006/11/22</p></td>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6969">CVE-2006-6969</a></p></td>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">low</p></td>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">high</p></td>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock"><6.1.0, <6.0.2, <5.1.12, <4.2.27</p></td>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">6.1.0pre3, 6.0.2, 5.1.12,-->
-<!-- 4.2.27</p></td>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">Session ID predictability.</p></td>-->
-<!-- </tr>-->
-<!-- <tr>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">2006/06/01</p></td>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2759">CVE-2006-2759</a></p></td>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">medium</p></td>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">medium</p></td>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock"><6.0.*, <6.0.0Beta17</p></td>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">6.0.0Beta17</p></td>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">JSP source-->
-<!-- visibility.</p></td>-->
-<!-- </tr>-->
+ <tr>
+ <td class="tableblock halign-left valign-top"><p class="tableblock">2007/12/22</p></td>
+ <td class="tableblock halign-left valign-top"><p class="tableblock"><a href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-6672" title="Static content visible in WEB-INF and past security constraints.">CVE-2007-6672</a></p></td>
+ <td class="tableblock halign-left valign-top"><p class="tableblock">high</p></td>
+ <td class="tableblock halign-left valign-top"><p class="tableblock">medium</p></td>
+ <td class="tableblock halign-left valign-top"><p class="tableblock">6.1.rrc0-6.1.6</p></td>
+ <td class="tableblock halign-left valign-top"><div class="content"><div class="paragraph">
+ <p>6.1.7</p>
+ </div></div></td>
+ </tr>
+ <tr>
+ <td class="tableblock halign-left valign-top"><p class="tableblock">2007/11/05</p></td>
+ <td class="tableblock halign-left valign-top"><p class="tableblock"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5614" title="Single quote in cookie name.">CVE-2007-5614</a></p></td>
+ <td class="tableblock halign-left valign-top"><p class="tableblock">low</p></td>
+ <td class="tableblock halign-left valign-top"><p class="tableblock">low</p></td>
+ <td class="tableblock halign-left valign-top"><p class="tableblock"><6.1.6</p></td>
+ <td class="tableblock halign-left valign-top"><p class="tableblock">6.1.6rc1 (patch in CVS for jetty5)</p></td>
+ </tr>
+ <tr>
+ <td class="tableblock halign-left valign-top"><p class="tableblock">2007/11/05</p></td>
+ <td class="tableblock halign-left valign-top"><p class="tableblock"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5613" title="XSS in demo dup servlet.">CVE-2007-5613</a></p></td>
+ <td class="tableblock halign-left valign-top"><p class="tableblock">low</p></td>
+ <td class="tableblock halign-left valign-top"><p class="tableblock">low</p></td>
+ <td class="tableblock halign-left valign-top"><p class="tableblock">6.1.6</p></td>
+ <td class="tableblock halign-left valign-top"><p class="tableblock">6.1.6rc0 (patch in CVS for jetty5)</p></td>
+ </tr>
+ <tr>
+ <td class="tableblock halign-left valign-top"><p class="tableblock">2007/11/03</p></td>
+ <td class="tableblock halign-left valign-top"><p class="tableblock"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5615" title="CRLF Response splitting.">CVE-2007-5615</a></p></td>
+ <td class="tableblock halign-left valign-top"><p class="tableblock">medium</p></td>
+ <td class="tableblock halign-left valign-top"><p class="tableblock">medium</p></td>
+ <td class="tableblock halign-left valign-top"><p class="tableblock"><6.1.6</p></td>
+ <td class="tableblock halign-left valign-top"><p class="tableblock">6.1.6rc0 (patch in CVS for jetty5)</p></td>
+ </tr>
+ <tr>
+ <td class="tableblock halign-left valign-top"><p class="tableblock">2006/11/22</p></td>
+ <td class="tableblock halign-left valign-top"><p class="tableblock"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6969" title="Session ID predictability.">CVE-2006-6969</a></p></td>
+ <td class="tableblock halign-left valign-top"><p class="tableblock">low</p></td>
+ <td class="tableblock halign-left valign-top"><p class="tableblock">high</p></td>
+ <td class="tableblock halign-left valign-top"><p class="tableblock"><6.1.0, <6.0.2, <5.1.12, <4.2.27</p></td>
+ <td class="tableblock halign-left valign-top"><p class="tableblock">6.1.0pre3, 6.0.2, 5.1.12,
+ 4.2.27</p></td>
+ </tr>
+ <tr>
+ <td class="tableblock halign-left valign-top"><p class="tableblock">2006/06/01</p></td>
+ <td class="tableblock halign-left valign-top"><p class="tableblock"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2759" title="JSP source visibility.">CVE-2006-2759</a></p></td>
+ <td class="tableblock halign-left valign-top"><p class="tableblock">medium</p></td>
+ <td class="tableblock halign-left valign-top"><p class="tableblock">medium</p></td>
+ <td class="tableblock halign-left valign-top"><p class="tableblock"><6.0.*, <6.0.0Beta17</p></td>
+ <td class="tableblock halign-left valign-top"><p class="tableblock">6.0.0Beta17</p></td>
+ </tr>
<!-- <tr>-->
<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">2006/01/05</p></td>-->
<!-- <td class="tableblock halign-left valign-top"></td>-->
@@ -368,15 +349,14 @@
<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">Fixed //security-->
<!-- constraint bypass on Windows.</p></td>-->
<!-- </tr>-->
-<!-- <tr>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">2005/11/18</p></td>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2758">CVE-2006-2758</a></p></td>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">medium</p></td>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">medium</p></td>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock"><5.1.6</p></td>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">5.1.6, 6.0.0Beta4</p></td>-->
-<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">JSP source visibility.</p></td>-->
-<!-- </tr>-->
+ <tr>
+ <td class="tableblock halign-left valign-top"><p class="tableblock">2005/11/18</p></td>
+ <td class="tableblock halign-left valign-top"><p class="tableblock"><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2758" title="JSP source visibility.">CVE-2006-2758</a></p></td>
+ <td class="tableblock halign-left valign-top"><p class="tableblock">medium</p></td>
+ <td class="tableblock halign-left valign-top"><p class="tableblock">medium</p></td>
+ <td class="tableblock halign-left valign-top"><p class="tableblock"><5.1.6</p></td>
+ <td class="tableblock halign-left valign-top"><p class="tableblock">5.1.6, 6.0.0Beta4</p></td>
+ </tr>
<!-- <tr>-->
<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">2004/02/04</p></td>-->
<!-- <td class="tableblock halign-left valign-top"><p class="tableblock">JSSE 1.0.3_01</p></td>-->