summaryrefslogtreecommitdiffstats
path: root/data/CVE/2015.list
diff options
context:
space:
mode:
authorMoritz Muehlenhoff <jmm@debian.org>2021-03-15 19:46:02 +0100
committerMoritz Muehlenhoff <jmm@debian.org>2021-03-15 19:46:32 +0100
commit15c183fe3112454e9ab25e9d4c4f39984edb981a (patch)
treeaad5fa1707826dc90d42c6978c864e334d407810 /data/CVE/2015.list
parent105cf7cce01cccc732419ef1529754842d52c6ba (diff)
bullseye triage
Diffstat (limited to 'data/CVE/2015.list')
-rw-r--r--data/CVE/2015.list3
1 files changed, 2 insertions, 1 deletions
diff --git a/data/CVE/2015.list b/data/CVE/2015.list
index 5cf1d7ce53..4bd423c968 100644
--- a/data/CVE/2015.list
+++ b/data/CVE/2015.list
@@ -564,7 +564,8 @@ CVE-2015-9285 (esoTalk 1.0.0g4 has XSS via the PATH_INFO to the conversations/ U
NOT-FOR-US: esoTalk
CVE-2015-9284 (The request phase of the OmniAuth Ruby gem (1.9.1 and earlier) is vuln ...)
- ruby-omniauth <unfixed> (bug #973384)
- [buster] - ruby-omniauth <no-dsa> (Minor issue)
+ [bullseye] - ruby-omniauth <ignored> (Minor issue)
+ [buster] - ruby-omniauth <ignored> (Minor issue)
[stretch] - ruby-omniauth <no-dsa> (Minor issue)
[jessie] - ruby-omniauth <no-dsa> (Fix is in additional gem and needs CSRF protection in apps)
NOTE: https://github.com/omniauth/omniauth/pull/809

© 2014-2024 Faster IT GmbH | imprint | privacy policy