Spaces:
Sleeping
Sleeping
| { | |
| "count": 200, | |
| "snapshots": [ | |
| { | |
| "osv_id": "PYSEC-2013-1", | |
| "file": "data/snapshots/PYSEC-2013-1.json", | |
| "cve_id": "CVE-2013-4259", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2013-2", | |
| "file": "data/snapshots/PYSEC-2013-2.json", | |
| "cve_id": "CVE-2013-4260", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2014-98", | |
| "file": "data/snapshots/PYSEC-2014-98.json", | |
| "cve_id": "CVE-2014-2260", | |
| "package": "ajenti" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2014-99", | |
| "file": "data/snapshots/PYSEC-2014-99.json", | |
| "cve_id": "CVE-2014-4301", | |
| "package": "ajenti" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2015-1", | |
| "file": "data/snapshots/PYSEC-2015-1.json", | |
| "cve_id": "CVE-2015-3908", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2016-1", | |
| "file": "data/snapshots/PYSEC-2016-1.json", | |
| "cve_id": "CVE-2016-3096", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2017-105", | |
| "file": "data/snapshots/PYSEC-2017-105.json", | |
| "cve_id": "CVE-2016-8752", | |
| "package": "apache-atlas" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2017-106", | |
| "file": "data/snapshots/PYSEC-2017-106.json", | |
| "cve_id": "CVE-2017-3150", | |
| "package": "apache-atlas" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2017-107", | |
| "file": "data/snapshots/PYSEC-2017-107.json", | |
| "cve_id": "CVE-2017-3151", | |
| "package": "apache-atlas" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2017-108", | |
| "file": "data/snapshots/PYSEC-2017-108.json", | |
| "cve_id": "CVE-2017-3152", | |
| "package": "apache-atlas" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2017-109", | |
| "file": "data/snapshots/PYSEC-2017-109.json", | |
| "cve_id": "CVE-2017-3153", | |
| "package": "apache-atlas" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2017-110", | |
| "file": "data/snapshots/PYSEC-2017-110.json", | |
| "cve_id": "CVE-2017-3154", | |
| "package": "apache-atlas" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2017-111", | |
| "file": "data/snapshots/PYSEC-2017-111.json", | |
| "cve_id": "CVE-2017-3155", | |
| "package": "apache-atlas" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2017-2", | |
| "file": "data/snapshots/PYSEC-2017-2.json", | |
| "cve_id": "CVE-2014-3498", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2017-3", | |
| "file": "data/snapshots/PYSEC-2017-3.json", | |
| "cve_id": "CVE-2015-6240", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2017-4", | |
| "file": "data/snapshots/PYSEC-2017-4.json", | |
| "cve_id": "CVE-2017-7550", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2017-5", | |
| "file": "data/snapshots/PYSEC-2017-5.json", | |
| "cve_id": "CVE-2017-2809", | |
| "package": "ansible-vault" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2018-107", | |
| "file": "data/snapshots/PYSEC-2018-107.json", | |
| "cve_id": "CVE-2018-18548", | |
| "package": "ajenti" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2018-109", | |
| "file": "data/snapshots/PYSEC-2018-109.json", | |
| "cve_id": "CVE-2018-1000080", | |
| "package": "ajenti-panel" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2018-110", | |
| "file": "data/snapshots/PYSEC-2018-110.json", | |
| "cve_id": "CVE-2018-1000081", | |
| "package": "ajenti-panel" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2018-111", | |
| "file": "data/snapshots/PYSEC-2018-111.json", | |
| "cve_id": "CVE-2018-1000082", | |
| "package": "ajenti-panel" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2018-112", | |
| "file": "data/snapshots/PYSEC-2018-112.json", | |
| "cve_id": "CVE-2018-1000083", | |
| "package": "ajenti-panel" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2018-113", | |
| "file": "data/snapshots/PYSEC-2018-113.json", | |
| "cve_id": "CVE-2018-1000126", | |
| "package": "ajenti-panel" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2018-35", | |
| "file": "data/snapshots/PYSEC-2018-35.json", | |
| "cve_id": "CVE-2018-1000814", | |
| "package": "aiohttp-session" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2018-36", | |
| "file": "data/snapshots/PYSEC-2018-36.json", | |
| "cve_id": "CVE-2013-2233", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2018-37", | |
| "file": "data/snapshots/PYSEC-2018-37.json", | |
| "cve_id": "CVE-2016-8614", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2018-38", | |
| "file": "data/snapshots/PYSEC-2018-38.json", | |
| "cve_id": "CVE-2016-8628", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2018-39", | |
| "file": "data/snapshots/PYSEC-2018-39.json", | |
| "cve_id": "CVE-2016-9587", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2018-40", | |
| "file": "data/snapshots/PYSEC-2018-40.json", | |
| "cve_id": "CVE-2017-7466", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2018-41", | |
| "file": "data/snapshots/PYSEC-2018-41.json", | |
| "cve_id": "CVE-2017-7481", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2018-42", | |
| "file": "data/snapshots/PYSEC-2018-42.json", | |
| "cve_id": "CVE-2018-10855", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2018-43", | |
| "file": "data/snapshots/PYSEC-2018-43.json", | |
| "cve_id": "CVE-2018-10875", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2018-44", | |
| "file": "data/snapshots/PYSEC-2018-44.json", | |
| "cve_id": "CVE-2018-16837", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2018-45", | |
| "file": "data/snapshots/PYSEC-2018-45.json", | |
| "cve_id": "CVE-2017-12614", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2018-58", | |
| "file": "data/snapshots/PYSEC-2018-58.json", | |
| "cve_id": "CVE-2016-8647", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2018-60", | |
| "file": "data/snapshots/PYSEC-2018-60.json", | |
| "cve_id": "CVE-2018-16859", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2018-80", | |
| "file": "data/snapshots/PYSEC-2018-80.json", | |
| "cve_id": "CVE-2018-1000519", | |
| "package": "aiohttp-session" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2018-81", | |
| "file": "data/snapshots/PYSEC-2018-81.json", | |
| "cve_id": "CVE-2018-10874", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2019-1", | |
| "file": "data/snapshots/PYSEC-2019-1.json", | |
| "cve_id": "CVE-2019-1000007", | |
| "package": "aioxmpp" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2019-141", | |
| "file": "data/snapshots/PYSEC-2019-141.json", | |
| "cve_id": "CVE-2018-16876", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2019-142", | |
| "file": "data/snapshots/PYSEC-2019-142.json", | |
| "cve_id": "CVE-2018-20244", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2019-143", | |
| "file": "data/snapshots/PYSEC-2019-143.json", | |
| "cve_id": "CVE-2018-20245", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2019-145", | |
| "file": "data/snapshots/PYSEC-2019-145.json", | |
| "cve_id": "CVE-2019-10206", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2019-146", | |
| "file": "data/snapshots/PYSEC-2019-146.json", | |
| "cve_id": "CVE-2019-14856", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2019-147", | |
| "file": "data/snapshots/PYSEC-2019-147.json", | |
| "cve_id": "CVE-2017-15720", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2019-148", | |
| "file": "data/snapshots/PYSEC-2019-148.json", | |
| "cve_id": "CVE-2017-17835", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2019-149", | |
| "file": "data/snapshots/PYSEC-2019-149.json", | |
| "cve_id": "CVE-2017-17836", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2019-171", | |
| "file": "data/snapshots/PYSEC-2019-171.json", | |
| "cve_id": "CVE-2019-14858", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2019-2", | |
| "file": "data/snapshots/PYSEC-2019-2.json", | |
| "cve_id": "CVE-2019-10156", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2019-214", | |
| "file": "data/snapshots/PYSEC-2019-214.json", | |
| "cve_id": "CVE-2019-0216", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2019-215", | |
| "file": "data/snapshots/PYSEC-2019-215.json", | |
| "cve_id": "CVE-2019-0229", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2019-216", | |
| "file": "data/snapshots/PYSEC-2019-216.json", | |
| "cve_id": "CVE-2019-12417", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2019-3", | |
| "file": "data/snapshots/PYSEC-2019-3.json", | |
| "cve_id": "CVE-2019-10217", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2019-4", | |
| "file": "data/snapshots/PYSEC-2019-4.json", | |
| "cve_id": "CVE-2019-14846", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2019-5", | |
| "file": "data/snapshots/PYSEC-2019-5.json", | |
| "cve_id": "CVE-2019-3828", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2020-1", | |
| "file": "data/snapshots/PYSEC-2020-1.json", | |
| "cve_id": "CVE-2020-10685", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2020-10", | |
| "file": "data/snapshots/PYSEC-2020-10.json", | |
| "cve_id": "CVE-2020-1738", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2020-11", | |
| "file": "data/snapshots/PYSEC-2020-11.json", | |
| "cve_id": "CVE-2020-1739", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2020-12", | |
| "file": "data/snapshots/PYSEC-2020-12.json", | |
| "cve_id": "CVE-2020-1740", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2020-13", | |
| "file": "data/snapshots/PYSEC-2020-13.json", | |
| "cve_id": "CVE-2020-1746", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2020-14", | |
| "file": "data/snapshots/PYSEC-2020-14.json", | |
| "cve_id": "CVE-2020-11978", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2020-15", | |
| "file": "data/snapshots/PYSEC-2020-15.json", | |
| "cve_id": "CVE-2020-11981", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2020-159", | |
| "file": "data/snapshots/PYSEC-2020-159.json", | |
| "cve_id": "CVE-2020-26214", | |
| "package": "alerta-server" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2020-16", | |
| "file": "data/snapshots/PYSEC-2020-16.json", | |
| "cve_id": "CVE-2020-11982", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2020-160", | |
| "file": "data/snapshots/PYSEC-2020-160.json", | |
| "cve_id": "CVE-2019-14864", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2020-161", | |
| "file": "data/snapshots/PYSEC-2020-161.json", | |
| "cve_id": "CVE-2019-14904", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2020-162", | |
| "file": "data/snapshots/PYSEC-2020-162.json", | |
| "cve_id": "CVE-2019-12398", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2020-17", | |
| "file": "data/snapshots/PYSEC-2020-17.json", | |
| "cve_id": "CVE-2020-11983", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2020-18", | |
| "file": "data/snapshots/PYSEC-2020-18.json", | |
| "cve_id": "CVE-2020-13927", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2020-19", | |
| "file": "data/snapshots/PYSEC-2020-19.json", | |
| "cve_id": "CVE-2020-13944", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2020-198", | |
| "file": "data/snapshots/PYSEC-2020-198.json", | |
| "cve_id": "CVE-2014-2686", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2020-199", | |
| "file": "data/snapshots/PYSEC-2020-199.json", | |
| "cve_id": "CVE-2014-4657", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2020-2", | |
| "file": "data/snapshots/PYSEC-2020-2.json", | |
| "cve_id": "CVE-2020-10691", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2020-20", | |
| "file": "data/snapshots/PYSEC-2020-20.json", | |
| "cve_id": "CVE-2020-17513", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2020-200", | |
| "file": "data/snapshots/PYSEC-2020-200.json", | |
| "cve_id": "CVE-2014-4658", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2020-201", | |
| "file": "data/snapshots/PYSEC-2020-201.json", | |
| "cve_id": "CVE-2014-4659", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2020-202", | |
| "file": "data/snapshots/PYSEC-2020-202.json", | |
| "cve_id": "CVE-2014-4660", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2020-203", | |
| "file": "data/snapshots/PYSEC-2020-203.json", | |
| "cve_id": "CVE-2014-4678", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2020-204", | |
| "file": "data/snapshots/PYSEC-2020-204.json", | |
| "cve_id": "CVE-2014-4966", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2020-205", | |
| "file": "data/snapshots/PYSEC-2020-205.json", | |
| "cve_id": "CVE-2014-4967", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2020-206", | |
| "file": "data/snapshots/PYSEC-2020-206.json", | |
| "cve_id": "CVE-2019-14905", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2020-207", | |
| "file": "data/snapshots/PYSEC-2020-207.json", | |
| "cve_id": "CVE-2020-10684", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2020-208", | |
| "file": "data/snapshots/PYSEC-2020-208.json", | |
| "cve_id": "CVE-2020-10744", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2020-209", | |
| "file": "data/snapshots/PYSEC-2020-209.json", | |
| "cve_id": "CVE-2020-14365", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2020-21", | |
| "file": "data/snapshots/PYSEC-2020-21.json", | |
| "cve_id": "CVE-2020-17515", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2020-210", | |
| "file": "data/snapshots/PYSEC-2020-210.json", | |
| "cve_id": "CVE-2020-1753", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2020-22", | |
| "file": "data/snapshots/PYSEC-2020-22.json", | |
| "cve_id": "CVE-2020-17526", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2020-220", | |
| "file": "data/snapshots/PYSEC-2020-220.json", | |
| "cve_id": "CVE-2020-25635", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2020-221", | |
| "file": "data/snapshots/PYSEC-2020-221.json", | |
| "cve_id": null, | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2020-23", | |
| "file": "data/snapshots/PYSEC-2020-23.json", | |
| "cve_id": "CVE-2020-9485", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2020-262", | |
| "file": "data/snapshots/PYSEC-2020-262.json", | |
| "cve_id": "CVE-2020-17511", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2020-3", | |
| "file": "data/snapshots/PYSEC-2020-3.json", | |
| "cve_id": "CVE-2020-14330", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2020-4", | |
| "file": "data/snapshots/PYSEC-2020-4.json", | |
| "cve_id": "CVE-2020-14332", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2020-5", | |
| "file": "data/snapshots/PYSEC-2020-5.json", | |
| "cve_id": "CVE-2020-1733", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2020-6", | |
| "file": "data/snapshots/PYSEC-2020-6.json", | |
| "cve_id": "CVE-2020-1734", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2020-7", | |
| "file": "data/snapshots/PYSEC-2020-7.json", | |
| "cve_id": "CVE-2020-1735", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2020-8", | |
| "file": "data/snapshots/PYSEC-2020-8.json", | |
| "cve_id": "CVE-2020-1736", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2020-9", | |
| "file": "data/snapshots/PYSEC-2020-9.json", | |
| "cve_id": "CVE-2020-1737", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2021-1", | |
| "file": "data/snapshots/PYSEC-2021-1.json", | |
| "cve_id": "CVE-2021-20228", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2021-105", | |
| "file": "data/snapshots/PYSEC-2021-105.json", | |
| "cve_id": "CVE-2020-10729", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2021-106", | |
| "file": "data/snapshots/PYSEC-2021-106.json", | |
| "cve_id": "CVE-2021-20178", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2021-107", | |
| "file": "data/snapshots/PYSEC-2021-107.json", | |
| "cve_id": "CVE-2021-3447", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2021-122", | |
| "file": "data/snapshots/PYSEC-2021-122.json", | |
| "cve_id": "CVE-2021-35936", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2021-124", | |
| "file": "data/snapshots/PYSEC-2021-124.json", | |
| "cve_id": "CVE-2021-20191", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2021-125", | |
| "file": "data/snapshots/PYSEC-2021-125.json", | |
| "cve_id": null, | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2021-126", | |
| "file": "data/snapshots/PYSEC-2021-126.json", | |
| "cve_id": "CVE-2021-3533", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2021-2", | |
| "file": "data/snapshots/PYSEC-2021-2.json", | |
| "cve_id": "CVE-2021-26559", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2021-3", | |
| "file": "data/snapshots/PYSEC-2021-3.json", | |
| "cve_id": "CVE-2021-26697", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2021-326", | |
| "file": "data/snapshots/PYSEC-2021-326.json", | |
| "cve_id": "CVE-2021-38540", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2021-335", | |
| "file": "data/snapshots/PYSEC-2021-335.json", | |
| "cve_id": "CVE-2021-32807", | |
| "package": "accesscontrol" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2021-358", | |
| "file": "data/snapshots/PYSEC-2021-358.json", | |
| "cve_id": "CVE-2021-3583", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2021-370", | |
| "file": "data/snapshots/PYSEC-2021-370.json", | |
| "cve_id": "CVE-2021-32807", | |
| "package": "accesscontrol" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2021-4", | |
| "file": "data/snapshots/PYSEC-2021-4.json", | |
| "cve_id": "CVE-2021-28359", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2021-76", | |
| "file": "data/snapshots/PYSEC-2021-76.json", | |
| "cve_id": "CVE-2021-21330", | |
| "package": "aiohttp" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2021-839", | |
| "file": "data/snapshots/PYSEC-2021-839.json", | |
| "cve_id": "CVE-2021-43775", | |
| "package": "aim" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2021-840", | |
| "file": "data/snapshots/PYSEC-2021-840.json", | |
| "cve_id": "CVE-2021-3840", | |
| "package": "antilles-tools" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2021-876", | |
| "file": "data/snapshots/PYSEC-2021-876.json", | |
| "cve_id": "CVE-2020-13922", | |
| "package": "apache-dolphinscheduler" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2022-11", | |
| "file": "data/snapshots/PYSEC-2022-11.json", | |
| "cve_id": "CVE-2021-45230", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2022-164", | |
| "file": "data/snapshots/PYSEC-2022-164.json", | |
| "cve_id": "CVE-2021-3620", | |
| "package": "ansible" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2022-176", | |
| "file": "data/snapshots/PYSEC-2022-176.json", | |
| "cve_id": "CVE-2022-25598", | |
| "package": "apache-dolphinscheduler" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2022-182", | |
| "file": "data/snapshots/PYSEC-2022-182.json", | |
| "cve_id": "CVE-2018-25033", | |
| "package": "admesh" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2022-253", | |
| "file": "data/snapshots/PYSEC-2022-253.json", | |
| "cve_id": "CVE-2021-4041", | |
| "package": "ansible-runner" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2022-261", | |
| "file": "data/snapshots/PYSEC-2022-261.json", | |
| "cve_id": "CVE-2022-38170", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2022-263", | |
| "file": "data/snapshots/PYSEC-2022-263.json", | |
| "cve_id": "CVE-2022-38054", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2022-279", | |
| "file": "data/snapshots/PYSEC-2022-279.json", | |
| "cve_id": "CVE-2022-40604", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2022-280", | |
| "file": "data/snapshots/PYSEC-2022-280.json", | |
| "cve_id": "CVE-2022-40754", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2022-29", | |
| "file": "data/snapshots/PYSEC-2022-29.json", | |
| "cve_id": "CVE-2021-45229", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2022-30", | |
| "file": "data/snapshots/PYSEC-2022-30.json", | |
| "cve_id": "CVE-2022-24288", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2022-42970", | |
| "file": "data/snapshots/PYSEC-2022-42970.json", | |
| "cve_id": "CVE-2022-43982", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2022-42971", | |
| "file": "data/snapshots/PYSEC-2022-42971.json", | |
| "cve_id": "CVE-2022-43985", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2022-42972", | |
| "file": "data/snapshots/PYSEC-2022-42972.json", | |
| "cve_id": "CVE-2022-43766", | |
| "package": "apache-iotdb" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2022-42981", | |
| "file": "data/snapshots/PYSEC-2022-42981.json", | |
| "cve_id": "CVE-2022-27949", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2022-42982", | |
| "file": "data/snapshots/PYSEC-2022-42982.json", | |
| "cve_id": "CVE-2022-40127", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2022-42983", | |
| "file": "data/snapshots/PYSEC-2022-42983.json", | |
| "cve_id": "CVE-2022-41672", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2022-42984", | |
| "file": "data/snapshots/PYSEC-2022-42984.json", | |
| "cve_id": "CVE-2022-45402", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2022-43059", | |
| "file": "data/snapshots/PYSEC-2022-43059.json", | |
| "cve_id": null, | |
| "package": "aiohttp" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2022-43060", | |
| "file": "data/snapshots/PYSEC-2022-43060.json", | |
| "cve_id": "CVE-2022-32531", | |
| "package": "apache-bookkeeper-client" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2022-43066", | |
| "file": "data/snapshots/PYSEC-2022-43066.json", | |
| "cve_id": null, | |
| "package": "aamiles" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2022-43067", | |
| "file": "data/snapshots/PYSEC-2022-43067.json", | |
| "cve_id": "CVE-2021-3701", | |
| "package": "ansible-runner" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2022-43068", | |
| "file": "data/snapshots/PYSEC-2022-43068.json", | |
| "cve_id": "CVE-2021-3702", | |
| "package": "ansible-runner" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2022-43069", | |
| "file": "data/snapshots/PYSEC-2022-43069.json", | |
| "cve_id": "CVE-2022-38369", | |
| "package": "apache-iotdb" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2022-43070", | |
| "file": "data/snapshots/PYSEC-2022-43070.json", | |
| "cve_id": null, | |
| "package": "apache-iotdb" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2023-1", | |
| "file": "data/snapshots/PYSEC-2023-1.json", | |
| "cve_id": null, | |
| "package": "adyen" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2023-103", | |
| "file": "data/snapshots/PYSEC-2023-103.json", | |
| "cve_id": "CVE-2022-46651", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2023-104", | |
| "file": "data/snapshots/PYSEC-2023-104.json", | |
| "cve_id": "CVE-2023-22887", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2023-105", | |
| "file": "data/snapshots/PYSEC-2023-105.json", | |
| "cve_id": "CVE-2023-22888", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2023-106", | |
| "file": "data/snapshots/PYSEC-2023-106.json", | |
| "cve_id": "CVE-2023-36543", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2023-119", | |
| "file": "data/snapshots/PYSEC-2023-119.json", | |
| "cve_id": "CVE-2023-35908", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2023-120", | |
| "file": "data/snapshots/PYSEC-2023-120.json", | |
| "cve_id": "CVE-2023-37276", | |
| "package": "aiohttp" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2023-134", | |
| "file": "data/snapshots/PYSEC-2023-134.json", | |
| "cve_id": "CVE-2023-39508", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2023-136", | |
| "file": "data/snapshots/PYSEC-2023-136.json", | |
| "cve_id": "CVE-2023-39553", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2023-152", | |
| "file": "data/snapshots/PYSEC-2023-152.json", | |
| "cve_id": "CVE-2023-37379", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2023-156", | |
| "file": "data/snapshots/PYSEC-2023-156.json", | |
| "cve_id": "CVE-2023-40195", | |
| "package": "apache-airflow-providers-apache-spark" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2023-158", | |
| "file": "data/snapshots/PYSEC-2023-158.json", | |
| "cve_id": "CVE-2023-40273", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2023-170", | |
| "file": "data/snapshots/PYSEC-2023-170.json", | |
| "cve_id": "CVE-2023-40611", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2023-171", | |
| "file": "data/snapshots/PYSEC-2023-171.json", | |
| "cve_id": "CVE-2023-40712", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2023-197", | |
| "file": "data/snapshots/PYSEC-2023-197.json", | |
| "cve_id": "CVE-2023-42663", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2023-2", | |
| "file": "data/snapshots/PYSEC-2023-2.json", | |
| "cve_id": "CVE-2023-25695", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2023-202", | |
| "file": "data/snapshots/PYSEC-2023-202.json", | |
| "cve_id": "CVE-2023-42780", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2023-203", | |
| "file": "data/snapshots/PYSEC-2023-203.json", | |
| "cve_id": "CVE-2023-42792", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2023-204", | |
| "file": "data/snapshots/PYSEC-2023-204.json", | |
| "cve_id": "CVE-2023-45348", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2023-218", | |
| "file": "data/snapshots/PYSEC-2023-218.json", | |
| "cve_id": "CVE-2023-46288", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2023-231", | |
| "file": "data/snapshots/PYSEC-2023-231.json", | |
| "cve_id": "CVE-2023-42781", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2023-232", | |
| "file": "data/snapshots/PYSEC-2023-232.json", | |
| "cve_id": "CVE-2023-47037", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2023-246", | |
| "file": "data/snapshots/PYSEC-2023-246.json", | |
| "cve_id": "CVE-2023-47627", | |
| "package": "aiohttp" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2023-247", | |
| "file": "data/snapshots/PYSEC-2023-247.json", | |
| "cve_id": "CVE-2023-47641", | |
| "package": "aiohttp" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2023-250", | |
| "file": "data/snapshots/PYSEC-2023-250.json", | |
| "cve_id": "CVE-2023-49081", | |
| "package": "aiohttp" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2023-251", | |
| "file": "data/snapshots/PYSEC-2023-251.json", | |
| "cve_id": "CVE-2023-49082", | |
| "package": "aiohttp" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2023-263", | |
| "file": "data/snapshots/PYSEC-2023-263.json", | |
| "cve_id": null, | |
| "package": "admesh" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2023-264", | |
| "file": "data/snapshots/PYSEC-2023-264.json", | |
| "cve_id": "CVE-2023-47265", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2023-265", | |
| "file": "data/snapshots/PYSEC-2023-265.json", | |
| "cve_id": "CVE-2023-48291", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2023-266", | |
| "file": "data/snapshots/PYSEC-2023-266.json", | |
| "cve_id": "CVE-2023-49920", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2023-267", | |
| "file": "data/snapshots/PYSEC-2023-267.json", | |
| "cve_id": "CVE-2023-50783", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2023-268", | |
| "file": "data/snapshots/PYSEC-2023-268.json", | |
| "cve_id": "CVE-2023-48796", | |
| "package": "apache-dolphinscheduler" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2023-3", | |
| "file": "data/snapshots/PYSEC-2023-3.json", | |
| "cve_id": "CVE-2023-28707", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2023-4", | |
| "file": "data/snapshots/PYSEC-2023-4.json", | |
| "cve_id": "CVE-2022-45875", | |
| "package": "apache-dolphinscheduler" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2023-5", | |
| "file": "data/snapshots/PYSEC-2023-5.json", | |
| "cve_id": "CVE-2023-24829", | |
| "package": "apache-iotdb" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2023-59", | |
| "file": "data/snapshots/PYSEC-2023-59.json", | |
| "cve_id": "CVE-2023-25754", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2023-6", | |
| "file": "data/snapshots/PYSEC-2023-6.json", | |
| "cve_id": "CVE-2023-24830", | |
| "package": "apache-iotdb" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2023-60", | |
| "file": "data/snapshots/PYSEC-2023-60.json", | |
| "cve_id": "CVE-2023-29247", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2023-7", | |
| "file": "data/snapshots/PYSEC-2023-7.json", | |
| "cve_id": "CVE-2023-24831", | |
| "package": "apache-iotdb" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2023-8", | |
| "file": "data/snapshots/PYSEC-2023-8.json", | |
| "cve_id": "CVE-2023-30771", | |
| "package": "apache-iotdb" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2023-89", | |
| "file": "data/snapshots/PYSEC-2023-89.json", | |
| "cve_id": "CVE-2023-35005", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2024-13", | |
| "file": "data/snapshots/PYSEC-2024-13.json", | |
| "cve_id": "CVE-2023-50943", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2024-14", | |
| "file": "data/snapshots/PYSEC-2024-14.json", | |
| "cve_id": "CVE-2023-50944", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2024-152", | |
| "file": "data/snapshots/PYSEC-2024-152.json", | |
| "cve_id": null, | |
| "package": "aiocpa" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2024-181", | |
| "file": "data/snapshots/PYSEC-2024-181.json", | |
| "cve_id": "CVE-2024-41937", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2024-182", | |
| "file": "data/snapshots/PYSEC-2024-182.json", | |
| "cve_id": "CVE-2024-45784", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2024-189", | |
| "file": "data/snapshots/PYSEC-2024-189.json", | |
| "cve_id": "CVE-2024-39863", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2024-190", | |
| "file": "data/snapshots/PYSEC-2024-190.json", | |
| "cve_id": "CVE-2024-39877", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2024-195", | |
| "file": "data/snapshots/PYSEC-2024-195.json", | |
| "cve_id": "CVE-2024-25142", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2024-212", | |
| "file": "data/snapshots/PYSEC-2024-212.json", | |
| "cve_id": "CVE-2024-45034", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2024-221", | |
| "file": "data/snapshots/PYSEC-2024-221.json", | |
| "cve_id": "CVE-2024-27305", | |
| "package": "aiosmtpd" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2024-24", | |
| "file": "data/snapshots/PYSEC-2024-24.json", | |
| "cve_id": "CVE-2024-23334", | |
| "package": "aiohttp" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2024-245", | |
| "file": "data/snapshots/PYSEC-2024-245.json", | |
| "cve_id": "CVE-2024-27906", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2024-26", | |
| "file": "data/snapshots/PYSEC-2024-26.json", | |
| "cve_id": "CVE-2024-23829", | |
| "package": "aiohttp" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2024-36", | |
| "file": "data/snapshots/PYSEC-2024-36.json", | |
| "cve_id": "CVE-2024-0690", | |
| "package": "ansible-core" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2024-42", | |
| "file": "data/snapshots/PYSEC-2024-42.json", | |
| "cve_id": "CVE-2024-26280", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2024-46", | |
| "file": "data/snapshots/PYSEC-2024-46.json", | |
| "cve_id": "CVE-2024-28746", | |
| "package": "apache-airflow" | |
| }, | |
| { | |
| "osv_id": "PYSEC-2025-51", | |
| "file": "data/snapshots/PYSEC-2025-51.json", | |
| "cve_id": "CVE-2025-50213", | |
| "package": "apache-airflow-providers-snowflake" | |
| } | |
| ] | |
| } |