From: Krzysztof Opasiak Date: Thu, 30 May 2019 13:29:12 +0000 (+0200) Subject: Document OJSI-190 vulnerability X-Git-Tag: 3.2.0~307^2 X-Git-Url: https://gerrit.onap.org/r/gitweb?p=portal.git;a=commitdiff_plain;h=8514f4a449cf3b06b4f515b1c6754c82abbfc5b6 Document OJSI-190 vulnerability Issue-ID: OJSI-190 Signed-off-by: Krzysztof Opasiak Change-Id: I1c586793b744a5807e7b1a7a1d416dfd43409ab0 --- diff --git a/docs/release-notes.rst b/docs/release-notes.rst index 0fdbe807..9502569a 100644 --- a/docs/release-notes.rst +++ b/docs/release-notes.rst @@ -43,6 +43,7 @@ We worked on SDK upgrade to integrate with AAF. We partially implemented multi-l * In defult deployment PORTAL (portal-app) exposes HTTP port 30215 outside of cluster. [`OJSI-105 `_] * In defult deployment PORTAL (portal-sdk) exposes HTTP port 30212 outside of cluster. [`OJSI-106 `_] * CVE-2019-12318 - Number of SQL Injections in Portal [`OJSI-174 `_] + * Portal stores users passwords encrypted instead of hashed [`OJSI-190 `_] *Known Vulnerabilities in Used Modules*