summaryrefslogtreecommitdiffstats
path: root/data/CVE/list.2017
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2021-11-25 21:23:06 +0100
committerSalvatore Bonaccorso <carnil@debian.org>2021-11-25 21:23:06 +0100
commitabe46135668c7f78227d3c0ddd862467b56381d5 (patch)
treee8957a52723512c9361cf21378ed159989a8f0d2 /data/CVE/list.2017
parent1df74df1646cf2e359badb95ef9c758bfdbf7e2a (diff)
Cleanup some additional whitespaces
Diffstat (limited to 'data/CVE/list.2017')
-rw-r--r--data/CVE/list.20172
1 files changed, 1 insertions, 1 deletions
diff --git a/data/CVE/list.2017 b/data/CVE/list.2017
index 1e11c9b2e6..8257b199ed 100644
--- a/data/CVE/list.2017
+++ b/data/CVE/list.2017
@@ -35731,7 +35731,7 @@ CVE-2017-6542 (The ssh_agent_channel_data function in PuTTY before 0.68 allows r
NOTE: http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-agent-fwd-overflow.html
NOTE: Fixed by: https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8 (0.68)
NOTE: Bug only exploitable if SSH agent forwarding enabled (not the default) and if
- NOTE: the attacker can already be able to connect to the Unix-domain socket
+ NOTE: the attacker can already be able to connect to the Unix-domain socket
NOTE: representing the forwarded agent connection.
CVE-2017-6541 (Multiple Cross-Site Scripting (XSS) issues were discovered in webpaget ...)
NOT-FOR-US: webpagetest

© 2014-2024 Faster IT GmbH | imprint | privacy policy