From 8514f4a449cf3b06b4f515b1c6754c82abbfc5b6 Mon Sep 17 00:00:00 2001 From: Krzysztof Opasiak Date: Thu, 30 May 2019 15:29:12 +0200 Subject: [PATCH] Document OJSI-190 vulnerability Issue-ID: OJSI-190 Signed-off-by: Krzysztof Opasiak Change-Id: I1c586793b744a5807e7b1a7a1d416dfd43409ab0 --- docs/release-notes.rst | 1 + 1 file changed, 1 insertion(+) diff --git a/docs/release-notes.rst b/docs/release-notes.rst index 0fdbe807..9502569a 100644 --- a/docs/release-notes.rst +++ b/docs/release-notes.rst @@ -43,6 +43,7 @@ We worked on SDK upgrade to integrate with AAF. We partially implemented multi-l * In defult deployment PORTAL (portal-app) exposes HTTP port 30215 outside of cluster. [`OJSI-105 `_] * In defult deployment PORTAL (portal-sdk) exposes HTTP port 30212 outside of cluster. [`OJSI-106 `_] * CVE-2019-12318 - Number of SQL Injections in Portal [`OJSI-174 `_] + * Portal stores users passwords encrypted instead of hashed [`OJSI-190 `_] *Known Vulnerabilities in Used Modules* -- 2.16.6