File tree Expand file tree Collapse file tree
Expand file tree Collapse file tree Original file line number Diff line number Diff line change @@ -1810,6 +1810,7 @@ def saml2_attrib_map_format(din):
18101810 "ALAS" : "https://alas.aws.amazon.com/AL2/&&.html" , # e.g. https://alas.aws.amazon.com/alas2.html
18111811 "ALBA-" : "https://osv.dev/vulnerability/" , # e.g. https://osv.dev/vulnerability/ALBA-2019:3411
18121812 "ALINUX2-SA-" : "https://mirrors.aliyun.com/alinux/cve/" , # e.g. https://mirrors.aliyun.com/alinux/cve/alinux2-sa-20250007.xml
1813+ "ALINUX3-SA-" : "https://mirrors.aliyun.com/alinux/3/cve/" , # e.g. https://mirrors.aliyun.com/alinux/3/cve/alinux3-sa-20250059.xml
18131814 "ALSA-" : "https://osv.dev/vulnerability/" , # e.g. https://osv.dev/vulnerability/ALSA-2024:0827
18141815 "ASA-" : "https://security.archlinux.org/" , # e.g. https://security.archlinux.org/ASA-202003-8
18151816 "AVD" : "https://avd.aquasec.com/misconfig/" , # e.g. https://avd.aquasec.com/misconfig/avd-ksv-01010
Original file line number Diff line number Diff line change @@ -781,6 +781,8 @@ def vulnerability_url(vulnerability_id):
781781 if vulnerability_id .upper ().startswith (key ):
782782 if key == "ALINUX2-SA-" :
783783 return settings .VULNERABILITY_URLS [key ] + str (vulnerability_id .replace (":" , "" ).lower ()) + ".xml"
784+ if key == "ALINUX3-SA-" :
785+ return settings .VULNERABILITY_URLS [key ] + str (vulnerability_id .replace (":" , "" ).lower ()) + ".xml"
784786 if key == "GLSA" :
785787 return settings .VULNERABILITY_URLS [key ] + str (vulnerability_id .replace ("GLSA-" , "glsa/" ))
786788 if key == "SSA:" :
You can’t perform that action at this time.
0 commit comments