diff options
author | Salvatore Bonaccorso <carnil@debian.org> | 2021-11-25 21:23:06 +0100 |
---|---|---|
committer | Salvatore Bonaccorso <carnil@debian.org> | 2021-11-25 21:23:06 +0100 |
commit | abe46135668c7f78227d3c0ddd862467b56381d5 (patch) | |
tree | e8957a52723512c9361cf21378ed159989a8f0d2 /data/CVE/list.2017 | |
parent | 1df74df1646cf2e359badb95ef9c758bfdbf7e2a (diff) |
Cleanup some additional whitespaces
Diffstat (limited to 'data/CVE/list.2017')
-rw-r--r-- | data/CVE/list.2017 | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/data/CVE/list.2017 b/data/CVE/list.2017 index 1e11c9b2e6..8257b199ed 100644 --- a/data/CVE/list.2017 +++ b/data/CVE/list.2017 @@ -35731,7 +35731,7 @@ CVE-2017-6542 (The ssh_agent_channel_data function in PuTTY before 0.68 allows r NOTE: http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-agent-fwd-overflow.html NOTE: Fixed by: https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8 (0.68) NOTE: Bug only exploitable if SSH agent forwarding enabled (not the default) and if - NOTE: the attacker can already be able to connect to the Unix-domain socket + NOTE: the attacker can already be able to connect to the Unix-domain socket NOTE: representing the forwarded agent connection. CVE-2017-6541 (Multiple Cross-Site Scripting (XSS) issues were discovered in webpaget ...) NOT-FOR-US: webpagetest |