diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2021-03-15 19:46:02 +0100 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2021-03-15 19:46:32 +0100 |
commit | 15c183fe3112454e9ab25e9d4c4f39984edb981a (patch) | |
tree | aad5fa1707826dc90d42c6978c864e334d407810 /data/CVE/2015.list | |
parent | 105cf7cce01cccc732419ef1529754842d52c6ba (diff) |
bullseye triage
Diffstat (limited to 'data/CVE/2015.list')
-rw-r--r-- | data/CVE/2015.list | 3 |
1 files changed, 2 insertions, 1 deletions
diff --git a/data/CVE/2015.list b/data/CVE/2015.list index 5cf1d7ce53..4bd423c968 100644 --- a/data/CVE/2015.list +++ b/data/CVE/2015.list @@ -564,7 +564,8 @@ CVE-2015-9285 (esoTalk 1.0.0g4 has XSS via the PATH_INFO to the conversations/ U NOT-FOR-US: esoTalk CVE-2015-9284 (The request phase of the OmniAuth Ruby gem (1.9.1 and earlier) is vuln ...) - ruby-omniauth <unfixed> (bug #973384) - [buster] - ruby-omniauth <no-dsa> (Minor issue) + [bullseye] - ruby-omniauth <ignored> (Minor issue) + [buster] - ruby-omniauth <ignored> (Minor issue) [stretch] - ruby-omniauth <no-dsa> (Minor issue) [jessie] - ruby-omniauth <no-dsa> (Fix is in additional gem and needs CSRF protection in apps) NOTE: https://github.com/omniauth/omniauth/pull/809 |