summaryrefslogtreecommitdiffstats
path: root/data
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2020-03-31 05:19:46 +0200
committerSalvatore Bonaccorso <carnil@debian.org>2020-03-31 05:19:46 +0200
commit80272cd4462259b8b5435d5857341645cf48428d (patch)
treeea731b325b0e4d6dfcab011dde9abf5af1b61145 /data
parent2228b107eaff50f422c0d715a2569a3e983a653a (diff)
Correct source package name: synfony -> symfony
Diffstat (limited to 'data')
-rw-r--r--data/CVE/list6
1 files changed, 3 insertions, 3 deletions
diff --git a/data/CVE/list b/data/CVE/list
index 795ece3390..51f5fb6a51 100644
--- a/data/CVE/list
+++ b/data/CVE/list
@@ -13434,13 +13434,13 @@ CVE-2020-5277 (PrestaShop module ps_facetedsearch versions before 3.5.0 has a re
CVE-2020-5276
RESERVED
CVE-2020-5275 [All "access_control" rules are required when a firewall uses the unanimous strategy]
- - synfony <unfixed>
+ - symfony <unfixed>
[buster] - symfony <not-affected> (Introduced in 4.4.0)
[stretch] - symfony <not-affected> (Introduced in 4.4.0)
NOTE: https://symfony.com/blog/cve-2020-5275-all-access-control-rules-are-required-when-a-firewall-uses-the-unanimous-strategy
NOTE: https://github.com/symfony/symfony/commit/c935e4a3fba6cc2ab463a6ca382858068d63cebf
CVE-2020-5274 [Fix Exception message escaping rendered by ErrorHandler]
- - synfony <unfixed>
+ - symfony <unfixed>
[buster] - symfony <not-affected> (Introduced in 4.4.0)
[stretch] - symfony <not-affected> (Introduced in 4.4.0)
NOTE: https://symfony.com/blog/cve-2020-5274-fix-exception-message-escaping-rendered-by-errorhandler
@@ -13496,7 +13496,7 @@ CVE-2020-5257 (In Administrate (rubygem) before version 0.13.0, when sorting by
CVE-2020-5256 (BookStack before version 0.25.5 has a vulnerability where a user could ...)
NOT-FOR-US: BookStack
CVE-2020-5255 [Prevent cache poisoning via a Response Content-Type header]
- - synfony <unfixed>
+ - symfony <unfixed>
[buster] - symfony <not-affected> (Introduced in 4.4.0)
[stretch] - symfony <not-affected> (Introduced in 4.4.0)
NOTE: https://symfony.com/blog/cve-2020-5255-prevent-cache-poisoning-via-a-response-content-type-header

© 2014-2024 Faster IT GmbH | imprint | privacy policy