github.com/khulnasoft-lab/tunnel-db@v0.0.0-20231117205118-74e1113bd007/pkg/vulndb/testdata/fixtures/happy/vulnerability-detail.yaml (about) 1 - bucket: vulnerability-detail 2 pairs: 3 - bucket: CVE-2019-10906 4 pairs: 5 - key: redhat 6 value: 7 CvssScoreV3: 9.0 8 SeverityV3: 4 9 Title: "python-jinja2: str.format_map allows sandbox escape" 10 Description: "A flaw was found in Jinja. Python string formatting could allow an attacker to escape the sandbox. The highest threat from this vulnerability is to data confidentiality and integrity and system availability." 11 - key: nvd 12 value: 13 CvssScore: 5.0 14 CvssScoreV3: 8.6 15 Severity: 2 16 SeverityV3: 3 17 Description: "In Pallets Jinja before 2.10.1, str.format_map allows a sandbox escape." 18 LastModifiedDate: "2020-08-24T17:37:00Z" 19 PublishedDate: "2019-04-07T00:29:00Z" 20 - bucket: CVE-2021-3669 21 pairs: 22 - key: redhat 23 value: 24 CvssScoreV3: 5.5 25 SeverityV3: 2 26 Title: "CVE-2021-3669 kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts" 27 Description: "A flaw was found in the Linux kernel. Measuring usage of the shared memory does not scale with large shared memory segment counts which could lead to resource exhaustion and DoS." 28 - key: nvd 29 value: 30 Description: "** REJECT **"