This is an automated email from the ASF dual-hosted git repository. acosentino pushed a commit to branch master in repository https://gitbox.apache.org/repos/asf/camel.git
commit 906031afe839e54c55ac052e6eee0be012e03c29 Author: Andrea Cosentino <[email protected]> AuthorDate: Fri May 24 11:15:33 2019 +0200 CVE-2019-0188 - Changed the title in security advisories --- docs/user-manual/en/security-advisories.adoc | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/docs/user-manual/en/security-advisories.adoc b/docs/user-manual/en/security-advisories.adoc index 12fe0b6..dbdc847 100644 --- a/docs/user-manual/en/security-advisories.adoc +++ b/docs/user-manual/en/security-advisories.adoc @@ -2,8 +2,8 @@ ### 2019 -link:security-advisories/CVE-2019-0194.txt.asc[CVE-2019-0188] - Apache -Camel vulnerable to XML external entity injection (XXE) +link:security-advisories/CVE-2019-0194.txt.asc[CVE-2019-0188] - Apache Camel-XMLJson +vulnerable to XML external entity injection (XXE) link:security-advisories/CVE-2019-0194.txt.asc[CVE-2019-0194] - Apache Camel's File is vulnerable to directory traversal
