diff --git a/src/vunnel/providers/debian/parser.py b/src/vunnel/providers/debian/parser.py index a4361ff1..d11b1e40 100644 --- a/src/vunnel/providers/debian/parser.py +++ b/src/vunnel/providers/debian/parser.py @@ -354,7 +354,7 @@ def _normalize_json(self, ns_cve_dsalist=None): # noqa: PLR0912,PLR0915,C901 # HACK: when we can represent per-package severity or have a good mechanism # for overriding upstream data, we should take this out. if vid == "CVE-2023-44487": - vuln_record["Vulnerability"]["Severity"] = "High" + vuln_record["Vulnerability"]["Severity"] = "Unknown" # add fixedIn skip_fixedin = False