Document OJSI-126 vulnerability
Issue-ID: OJSI-126
Signed-off-by: Krzysztof Opasiak <k.opasiak@samsung.com>
Change-Id: I8cab133e7a39342c7d72cec6bc522aa6f5cca797
diff --git a/docs/release-notes.rst b/docs/release-notes.rst
index 3af8f5a..3ce998f 100644
--- a/docs/release-notes.rst
+++ b/docs/release-notes.rst
@@ -111,6 +111,7 @@
- [`OJSI-94 <https://jira.onap.org/browse/OJSI-94>`__\ ] - sdc-wfd-fe allows to impersonate any user by setting USER_ID
- [`OJSI-101 <https://jira.onap.org/browse/OJSI-101>`__\ ] - In default deployment SDC (sdc-be) exposes HTTP port 30205 outside of cluster.
- [`OJSI-102 <https://jira.onap.org/browse/OJSI-102>`__\ ] - In default deployment SDC (sdc-fe) exposes HTTP port 30206 outside of cluster.
+- [`OJSI-126 <https://jira.onap.org/browse/OJSI-126>`__\ ] - In default deployment SDC (sdc-wfd-fe) exposes HTTP port 30256 outside of cluster.
*Known Vulnerabilities in Used Modules*