github.com/jfrog/frogbot@v1.1.1-0.20231221090046-821a26f50338/testdata/messages/reviewcomment/applicable/applicable_review_content_no_remediation_standard.md (about)

     1  
     2  ## 📦🔍 Contextual Analysis CVE Vulnerability
     3  <div align='center'>
     4  
     5  | Severity                | Impacted Dependency                  | Finding                  | CVE                  |
     6  | :---------------------: | :-----------------------------------: | :-----------------------------------: | :-----------------------------------: |
     7  | ![](https://raw.githubusercontent.com/jfrog/frogbot/master/resources/v2/applicableCriticalSeverity.png)<br>Critical | werkzeug:1.0.1 | The vulnerable function flask.Flask.run is called | CVE-2022-29361 |
     8  
     9  </div>
    10  
    11  <details>
    12  <summary> <b>Description</b> </summary>
    13  <br>
    14  
    15  The scanner checks whether the vulnerable `Development Server` of the `werkzeug` library is used by looking for calls to `werkzeug.serving.run_simple()`.
    16  
    17  </details>
    18  
    19  <details>
    20  <summary> <b>CVE details</b> </summary>
    21  <br>
    22  
    23  cveDetails
    24  
    25  </details>