summaryrefslogtreecommitdiffstats
path: root/data/CVE/2015.list
diff options
context:
space:
mode:
authorMoritz Muehlenhoff <jmm@debian.org>2020-08-31 19:55:20 +0200
committerMoritz Muehlenhoff <jmm@debian.org>2020-08-31 19:55:46 +0200
commitf767f3cf687ab6101098c8528b212dac7be54c49 (patch)
tree629b2805223f426abd5074dd254ef5f0429e8e81 /data/CVE/2015.list
parent5d9f73bf98bc812a0d313a04b146f83316b98115 (diff)
buster triage
Diffstat (limited to 'data/CVE/2015.list')
-rw-r--r--data/CVE/2015.list1
1 files changed, 1 insertions, 0 deletions
diff --git a/data/CVE/2015.list b/data/CVE/2015.list
index 00a5e2c97f..4e4781d964 100644
--- a/data/CVE/2015.list
+++ b/data/CVE/2015.list
@@ -560,6 +560,7 @@ CVE-2015-9285 (esoTalk 1.0.0g4 has XSS via the PATH_INFO to the conversations/ U
NOT-FOR-US: esoTalk
CVE-2015-9284 (The request phase of the OmniAuth Ruby gem (1.9.1 and earlier) is vuln ...)
- ruby-omniauth <unfixed>
+ [buster] - ruby-omniauth <no-dsa> (Minor issue)
[stretch] - ruby-omniauth <no-dsa> (Minor issue)
[jessie] - ruby-omniauth <no-dsa> (Fix is in additional gem and needs CSRF protection in apps)
NOTE: https://github.com/omniauth/omniauth/pull/809

© 2014-2024 Faster IT GmbH | imprint | privacy policy