To help us determine if a package is vulnerable to an OSV vulnerability, we mess with the vulnerability's FixedInVersion to specify all the parameters. This functionally works, but when we return vulnerability results, we will end up seeing the entire string, which would be nonsensical to users.
- relates to
-
PROJQUAY-5886 Clair 4.7's API response may contain URL encoded data
- Closed