summaryrefslogtreecommitdiffstats
path: root/data/CVE/2017.list
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2021-11-25 21:23:06 +0100
committerSalvatore Bonaccorso <carnil@debian.org>2021-11-25 21:23:06 +0100
commitbca4737976603148157e6a4faf033cfe2af6c49f (patch)
tree6078b04d485d88345dc112ea8d5281fc21e1df7e /data/CVE/2017.list
parent4da1b2a558121f92e0dc7aa69e05a7a121bb9e43 (diff)
Cleanup some additional whitespaces
Diffstat (limited to 'data/CVE/2017.list')
-rw-r--r--data/CVE/2017.list2
1 files changed, 1 insertions, 1 deletions
diff --git a/data/CVE/2017.list b/data/CVE/2017.list
index 1e11c9b2e6..8257b199ed 100644
--- a/data/CVE/2017.list
+++ b/data/CVE/2017.list
@@ -35731,7 +35731,7 @@ CVE-2017-6542 (The ssh_agent_channel_data function in PuTTY before 0.68 allows r
NOTE: http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-agent-fwd-overflow.html
NOTE: Fixed by: https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8 (0.68)
NOTE: Bug only exploitable if SSH agent forwarding enabled (not the default) and if
- NOTE: the attacker can already be able to connect to the Unix-domain socket
+ NOTE: the attacker can already be able to connect to the Unix-domain socket
NOTE: representing the forwarded agent connection.
CVE-2017-6541 (Multiple Cross-Site Scripting (XSS) issues were discovered in webpaget ...)
NOT-FOR-US: webpagetest

© 2014-2024 Faster IT GmbH | imprint | privacy policy