diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2020-08-31 19:55:20 +0200 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2020-08-31 19:55:46 +0200 |
commit | f767f3cf687ab6101098c8528b212dac7be54c49 (patch) | |
tree | 629b2805223f426abd5074dd254ef5f0429e8e81 /data/CVE/2015.list | |
parent | 5d9f73bf98bc812a0d313a04b146f83316b98115 (diff) |
buster triage
Diffstat (limited to 'data/CVE/2015.list')
-rw-r--r-- | data/CVE/2015.list | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/data/CVE/2015.list b/data/CVE/2015.list index 00a5e2c97f..4e4781d964 100644 --- a/data/CVE/2015.list +++ b/data/CVE/2015.list @@ -560,6 +560,7 @@ CVE-2015-9285 (esoTalk 1.0.0g4 has XSS via the PATH_INFO to the conversations/ U NOT-FOR-US: esoTalk CVE-2015-9284 (The request phase of the OmniAuth Ruby gem (1.9.1 and earlier) is vuln ...) - ruby-omniauth <unfixed> + [buster] - ruby-omniauth <no-dsa> (Minor issue) [stretch] - ruby-omniauth <no-dsa> (Minor issue) [jessie] - ruby-omniauth <no-dsa> (Fix is in additional gem and needs CSRF protection in apps) NOTE: https://github.com/omniauth/omniauth/pull/809 |