commit | dff27a0ebd4921b1a997ddccc949b4d8ad9c7077 | [log] [tgz] |
---|---|---|
author | Damien Neil <dneil@google.com> | Tue May 10 16:15:33 2022 -0700 |
committer | Damien Neil <dneil@google.com> | Wed May 11 15:53:22 2022 +0000 |
tree | a4a772bef2130c66d4493d6259c61ae553a658e7 | |
parent | 77344fd47d2921e8e3b97981649d8e621b26409d [diff] |
cmd/vulnreport: use non-hardcoded year in issue filenames Change hardcoded "GO-2021-" prefix to use the year the GitHub issue was created. Fixes golang/go#52840. Change-Id: Iad694e886e496adc2a783cde5808d640c7af70e7 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/405634 Reviewed-by: Jonathan Amsterdam <jba@google.com> Run-TryBot: Damien Neil <dneil@google.com> TryBot-Result: Gopher Robot <gobot@golang.org>
This repository contains the reports for the Go Vulnerability Database.
If you are interested accessing data from the Go Vulnerability Database, see x/vuln for information. This repository is only used for adding new vulnerabilities.
We are not accepting new vulnerability reports at this time. We will update this README.md once we are ready to receive reports.
Unless otherwise noted, the Go source files are distributed under the BSD-style license found in the LICENSE file.
Database entries are distributed under the terms of the CC-BY 4.0 license. See x/vuln for information on how to access these entries.