commit | 87d96701df13a9204b62952632472b0752531fe2 | [log] [tgz] |
---|---|---|
author | Tatiana Bradley <tatianabradley@google.com> | Fri Jan 13 16:51:23 2023 -0500 |
committer | Gopher Robot <gobot@golang.org> | Sat Jan 14 00:31:02 2023 +0000 |
tree | 634582e21852022c2eb6079fb83b9b53d46a9684 | |
parent | 3a03dfb4c3c0b2ae22c25164278cf34de084f4e1 [diff] |
data/reports: fix GO-2020-0036.yaml Add vulnerable_at and more affectected symbols Aliases: CVE-2019-11254, GHSA-wxc4-f4m6-wwqv Updates golang/vulndb#36 Change-Id: I13397c294fcfa76e152fc57240fad35e88fe5723 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/462137 Auto-Submit: Tatiana Bradley <tatiana@golang.org> TryBot-Result: Gopher Robot <gobot@golang.org> Run-TryBot: Tatiana Bradley <tatiana@golang.org> Reviewed-by: Tatiana Bradley <tatiana@golang.org> Reviewed-by: Damien Neil <dneil@google.com>
This repository contains the infrastructure and internal reports to create the Go Vulnerability Database.
If you are interested accessing data from the Go Vulnerability Database, see x/vuln.
Check out https://go.dev/security/vuln for more information about the Go vulnerability management system.
Click here to report a public vulnerability in the Go ecosystem, or give feedback about the project.
The privacy policy for govulncheck
can be found at https://vuln.go.dev/privacy.
Unless otherwise noted, the Go source files are distributed under the BSD-style license found in the LICENSE file.
Database entries are distributed under the terms of the CC-BY-4.0 license. See x/vuln for information on how to access these entries.