commit | a3d1c5f32752458e36a5b42a2fb67c8b63edd32c | [log] [tgz] |
---|---|---|
author | Damien Neil <dneil@google.com> | Tue Jan 03 14:15:36 2023 -0800 |
committer | Damien Neil <dneil@google.com> | Tue Jan 03 23:05:24 2023 +0000 |
tree | 13297c126f6cdce40a2ff79e7e7fe62c378e9aa1 | |
parent | f2d2dfa3cdc600e43c85d468d652d2fb42a84e64 [diff] |
data/reports: add GO-2022-1213.yaml The symbols really should be set to "Generate", but a confusing history of the github.com/Unknwon/com and github.com/unknwon/com modules (different names, same location) means that vulnreport's symbol checks don't work here. Just marking all symbols as vulnerable. Aliases: CVE-2018-25060 Fixes golang/vulndb#1213 Change-Id: I641a170c162097ddf61683171cc523704dbfc81b Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/460418 Run-TryBot: Damien Neil <dneil@google.com> TryBot-Result: Gopher Robot <gobot@golang.org> Reviewed-by: Zvonimir Pavlinovic <zpavlinovic@google.com>
This repository contains the infrastructure and internal reports to create the Go Vulnerability Database.
If you are interested accessing data from the Go Vulnerability Database, see x/vuln.
Check out https://go.dev/security/vuln for more information about the Go vulnerability management system.
Click here to report a public vulnerability in the Go ecosystem, or give feedback about the project.
The privacy policy for govulncheck
can be found at https://vuln.go.dev/privacy.
Unless otherwise noted, the Go source files are distributed under the BSD-style license found in the LICENSE file.
Database entries are distributed under the terms of the CC-BY-4.0 license. See x/vuln for information on how to access these entries.