github.com/khulnasoft-lab/tunnel-db@v0.0.0-20231117205118-74e1113bd007/pkg/vulndb/testdata/fixtures/happy/vulnerability-detail.yaml (about)

     1  - bucket: vulnerability-detail
     2    pairs:
     3      - bucket: CVE-2019-10906
     4        pairs:
     5          - key: redhat
     6            value:
     7              CvssScoreV3: 9.0
     8              SeverityV3: 4
     9              Title: "python-jinja2: str.format_map allows sandbox escape"
    10              Description: "A flaw was found in Jinja. Python string formatting could allow an attacker to escape the sandbox. The highest threat from this vulnerability is to data confidentiality and integrity and system availability."
    11          - key: nvd
    12            value:
    13              CvssScore: 5.0
    14              CvssScoreV3: 8.6
    15              Severity: 2
    16              SeverityV3: 3
    17              Description: "In Pallets Jinja before 2.10.1, str.format_map allows a sandbox escape."
    18              LastModifiedDate: "2020-08-24T17:37:00Z"
    19              PublishedDate: "2019-04-07T00:29:00Z"
    20      - bucket: CVE-2021-3669
    21        pairs:
    22          - key: redhat
    23            value:
    24              CvssScoreV3: 5.5
    25              SeverityV3: 2
    26              Title: "CVE-2021-3669 kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts"
    27              Description: "A flaw was found in the Linux kernel. Measuring usage of the shared memory does not scale with large shared memory segment counts which could lead to resource exhaustion and DoS."
    28          - key: nvd
    29            value:
    30              Description: "** REJECT **"