From f767f3cf687ab6101098c8528b212dac7be54c49 Mon Sep 17 00:00:00 2001 From: Moritz Muehlenhoff Date: Mon, 31 Aug 2020 19:55:20 +0200 Subject: buster triage --- data/CVE/2015.list | 1 + 1 file changed, 1 insertion(+) (limited to 'data/CVE/2015.list') diff --git a/data/CVE/2015.list b/data/CVE/2015.list index 00a5e2c97f..4e4781d964 100644 --- a/data/CVE/2015.list +++ b/data/CVE/2015.list @@ -560,6 +560,7 @@ CVE-2015-9285 (esoTalk 1.0.0g4 has XSS via the PATH_INFO to the conversations/ U NOT-FOR-US: esoTalk CVE-2015-9284 (The request phase of the OmniAuth Ruby gem (1.9.1 and earlier) is vuln ...) - ruby-omniauth + [buster] - ruby-omniauth (Minor issue) [stretch] - ruby-omniauth (Minor issue) [jessie] - ruby-omniauth (Fix is in additional gem and needs CSRF protection in apps) NOTE: https://github.com/omniauth/omniauth/pull/809 -- cgit v1.2.3