diff options
author | Salvatore Bonaccorso <carnil@debian.org> | 2020-03-31 05:19:46 +0200 |
---|---|---|
committer | Salvatore Bonaccorso <carnil@debian.org> | 2020-03-31 05:19:46 +0200 |
commit | 80272cd4462259b8b5435d5857341645cf48428d (patch) | |
tree | ea731b325b0e4d6dfcab011dde9abf5af1b61145 /data | |
parent | 2228b107eaff50f422c0d715a2569a3e983a653a (diff) |
Correct source package name: synfony -> symfony
Diffstat (limited to 'data')
-rw-r--r-- | data/CVE/list | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/data/CVE/list b/data/CVE/list index 795ece3390..51f5fb6a51 100644 --- a/data/CVE/list +++ b/data/CVE/list @@ -13434,13 +13434,13 @@ CVE-2020-5277 (PrestaShop module ps_facetedsearch versions before 3.5.0 has a re CVE-2020-5276 RESERVED CVE-2020-5275 [All "access_control" rules are required when a firewall uses the unanimous strategy] - - synfony <unfixed> + - symfony <unfixed> [buster] - symfony <not-affected> (Introduced in 4.4.0) [stretch] - symfony <not-affected> (Introduced in 4.4.0) NOTE: https://symfony.com/blog/cve-2020-5275-all-access-control-rules-are-required-when-a-firewall-uses-the-unanimous-strategy NOTE: https://github.com/symfony/symfony/commit/c935e4a3fba6cc2ab463a6ca382858068d63cebf CVE-2020-5274 [Fix Exception message escaping rendered by ErrorHandler] - - synfony <unfixed> + - symfony <unfixed> [buster] - symfony <not-affected> (Introduced in 4.4.0) [stretch] - symfony <not-affected> (Introduced in 4.4.0) NOTE: https://symfony.com/blog/cve-2020-5274-fix-exception-message-escaping-rendered-by-errorhandler @@ -13496,7 +13496,7 @@ CVE-2020-5257 (In Administrate (rubygem) before version 0.13.0, when sorting by CVE-2020-5256 (BookStack before version 0.25.5 has a vulnerability where a user could ...) NOT-FOR-US: BookStack CVE-2020-5255 [Prevent cache poisoning via a Response Content-Type header] - - synfony <unfixed> + - symfony <unfixed> [buster] - symfony <not-affected> (Introduced in 4.4.0) [stretch] - symfony <not-affected> (Introduced in 4.4.0) NOTE: https://symfony.com/blog/cve-2020-5255-prevent-cache-poisoning-via-a-response-content-type-header |