reports: reformat

Run `vulnreport format` on all reports.

Change-Id: I442d0a3b12bf9a6e2e6b5c3ff5e201313d3929a1
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/382515
Trust: Jonathan Amsterdam <jba@google.com>
Run-TryBot: Jonathan Amsterdam <jba@google.com>
TryBot-Result: Gopher Robot <gobot@golang.org>
Reviewed-by: Julie Qiu <julie@golang.org>
diff --git a/reports/GO-2020-0001.yaml b/reports/GO-2020-0001.yaml
index 4024c14..7c53d62 100644
--- a/reports/GO-2020-0001.yaml
+++ b/reports/GO-2020-0001.yaml
@@ -2,18 +2,18 @@
 versions:
   - fixed: v1.6.0
 description: |
-  The default Formatter for the Logger middleware (LoggerConfig.Formatter),
-  which is included in the Default engine, allows attackers to inject arbitrary
-  log entries by manipulating the request path.
-credit: "@thinkerou <thinkerou@gmail.com>"
+    The default Formatter for the Logger middleware (LoggerConfig.Formatter),
+    which is included in the Default engine, allows attackers to inject arbitrary
+    log entries by manipulating the request path.
+credit: '@thinkerou <thinkerou@gmail.com>'
 symbols:
   - defaultLogFormatter
 links:
-  pr: https://github.com/gin-gonic/gin/pull/2237
-  commit: https://github.com/gin-gonic/gin/commit/a71af9c144f9579f6dbe945341c1df37aaf09c0d
+    pr: https://github.com/gin-gonic/gin/pull/2237
+    commit: https://github.com/gin-gonic/gin/commit/a71af9c144f9579f6dbe945341c1df37aaf09c0d
 cve_metadata:
-  id: CVE-9999-0001
-  cwe: "CWE-20: Improper Input Validation"
-  description: |
-    Unsanitized input in the default logger in github.com/gin-gonic/gin before v1.6.0
-    allows remote attackers to inject arbitrary log lines.
+    id: CVE-9999-0001
+    cwe: 'CWE-20: Improper Input Validation'
+    description: |
+        Unsanitized input in the default logger in github.com/gin-gonic/gin before v1.6.0
+        allows remote attackers to inject arbitrary log lines.
diff --git a/reports/GO-2020-0002.yaml b/reports/GO-2020-0002.yaml
index 465c82a..ccc74d3 100644
--- a/reports/GO-2020-0002.yaml
+++ b/reports/GO-2020-0002.yaml
@@ -2,12 +2,12 @@
 versions:
   - fixed: v0.1.1
 description: |
-  The Data, Context, or Key finalizers might run during or before GPGME
-  operations. This will release the C structures that are still in use, leading
-  to crashes and potentially code execution through a use-after-free.
+    The Data, Context, or Key finalizers might run during or before GPGME
+    operations. This will release the C structures that are still in use, leading
+    to crashes and potentially code execution through a use-after-free.
 cves:
   - CVE-2020-8945
 credit: Ulrich Obergfell <uobergfe@redhat.com>
 links:
-  pr: https://github.com/proglottis/gpgme/pull/23
-  commit: https://github.com/proglottis/gpgme/commit/92153bcb59bd2f511e502262c46c7bd660e21733
+    pr: https://github.com/proglottis/gpgme/pull/23
+    commit: https://github.com/proglottis/gpgme/commit/92153bcb59bd2f511e502262c46c7bd660e21733
diff --git a/reports/GO-2020-0003.yaml b/reports/GO-2020-0003.yaml
index 55d412c..391336f 100644
--- a/reports/GO-2020-0003.yaml
+++ b/reports/GO-2020-0003.yaml
@@ -2,18 +2,18 @@
 versions:
   - fixed: v1.0.0
 description: |
-  An attacker can cause an application that accepts slice parameters
-  (https://revel.github.io/manual/parameters.html#slices) to allocate large
-  amounts of memory and crash through manipulating the request query sent to the application.
-credit: "@SYM01"
+    An attacker can cause an application that accepts slice parameters
+    (https://revel.github.io/manual/parameters.html#slices) to allocate large
+    amounts of memory and crash through manipulating the request query sent to the application.
+credit: '@SYM01'
 links:
-  pr: https://github.com/revel/revel/pull/1427
-  commit: https://github.com/revel/revel/commit/d160ecb72207824005b19778594cbdc272e8a605
-  context:
-    - https://github.com/revel/revel/issues/1424
+    pr: https://github.com/revel/revel/pull/1427
+    commit: https://github.com/revel/revel/commit/d160ecb72207824005b19778594cbdc272e8a605
+    context:
+      - https://github.com/revel/revel/issues/1424
 cve_metadata:
-  id: CVE-9999-0002
-  cwe: "CWE-400: Uncontrolled Resource Consumption"
-  description: |
-    Unsanitized input in the query parser in github.com/revel/revel before v1.0.0
-    allows remote attackers to cause resource exhaustion via memory allocation.
+    id: CVE-9999-0002
+    cwe: 'CWE-400: Uncontrolled Resource Consumption'
+    description: |
+        Unsanitized input in the query parser in github.com/revel/revel before v1.0.0
+        allows remote attackers to cause resource exhaustion via memory allocation.
diff --git a/reports/GO-2020-0004.yaml b/reports/GO-2020-0004.yaml
index a298629..140c38d 100644
--- a/reports/GO-2020-0004.yaml
+++ b/reports/GO-2020-0004.yaml
@@ -3,24 +3,24 @@
   - introduced: v0.0.0-20160722212129-ac0cc4484ad4
     fixed: v0.0.0-20200131131040-063a3fb69896
 description: |
-  If any of the ListenAndServe functions are called with an empty token,
-  token authentication is disabled globally for all listeners.
+    If any of the ListenAndServe functions are called with an empty token,
+    token authentication is disabled globally for all listeners.
 
-  Also, a minor timing side channel was present allowing attackers with
-  very low latency and able to make a lot of requests to potentially
-  recover the token.
-credit: "@bouk"
+    Also, a minor timing side channel was present allowing attackers with
+    very low latency and able to make a lot of requests to potentially
+    recover the token.
+credit: '@bouk'
 symbols:
   - Auth.ServerHTTP
   - Auth.ListenAndServeTLS
   - Auth.ListenAndServe
 links:
-  pr: https://github.com/nanobox-io/golang-nanoauth/pull/5
-  commit: https://github.com/nanobox-io/golang-nanoauth/commit/063a3fb69896acf985759f0fe3851f15973993f3
+    pr: https://github.com/nanobox-io/golang-nanoauth/pull/5
+    commit: https://github.com/nanobox-io/golang-nanoauth/commit/063a3fb69896acf985759f0fe3851f15973993f3
 cve_metadata:
-  id: CVE-9999-0003
-  cwe: "CWE-305: Authentication Bypass by Primary Weakness"
-  description: |
-    Authentication is globally bypassed in github.com/nanobox-io/golang-nanoauth between
-    v0.0.0-20160722212129-ac0cc4484ad4 and v0.0.0-20200131131040-063a3fb69896 if ListenAndServe
-    is called with an empty token.
+    id: CVE-9999-0003
+    cwe: 'CWE-305: Authentication Bypass by Primary Weakness'
+    description: |
+        Authentication is globally bypassed in github.com/nanobox-io/golang-nanoauth between
+        v0.0.0-20160722212129-ac0cc4484ad4 and v0.0.0-20200131131040-063a3fb69896 if ListenAndServe
+        is called with an empty token.
diff --git a/reports/GO-2020-0005.yaml b/reports/GO-2020-0005.yaml
index 27673c6..6657e8e 100644
--- a/reports/GO-2020-0005.yaml
+++ b/reports/GO-2020-0005.yaml
@@ -3,9 +3,9 @@
 versions:
   - fixed: v0.5.0-alpha.5.0.20200423152442-f4b650b51dc4
 description: |
-  Malformed WALs can be constructed such that WAL.ReadAll can cause attempted
-  out of bounds reads, or creation of arbitrarily sized slices, which may be used as
-  a DoS vector.
+    Malformed WALs can be constructed such that WAL.ReadAll can cause attempted
+    out of bounds reads, or creation of arbitrarily sized slices, which may be used as
+    a DoS vector.
 cves:
   - CVE-2020-15106
   - CVE-2020-15112
@@ -14,7 +14,7 @@
   - WAL.ReadAll
   - decoder.decodeRecord
 links:
-  pr: https://github.com/etcd-io/etcd/pull/11793
-  commit: https://github.com/etcd-io/etcd/commit/f4b650b51dc4a53a8700700dc12e1242ac56ba07
-  context:
-    - https://github.com/etcd-io/etcd/blob/master/security/SECURITY_AUDIT.pdf
+    pr: https://github.com/etcd-io/etcd/pull/11793
+    commit: https://github.com/etcd-io/etcd/commit/f4b650b51dc4a53a8700700dc12e1242ac56ba07
+    context:
+      - https://github.com/etcd-io/etcd/blob/master/security/SECURITY_AUDIT.pdf
diff --git a/reports/GO-2020-0006.yaml b/reports/GO-2020-0006.yaml
index 1f521cc..b6c3e37 100644
--- a/reports/GO-2020-0006.yaml
+++ b/reports/GO-2020-0006.yaml
@@ -2,14 +2,14 @@
 versions:
   - fixed: v1.0.4-0.20180125103619-43913f2f4fbd
 description: |
-  An attacker may prevent TCP connections to a Server by opening
-  a connection and leaving it idle, until the connection is closed by
-  the server no other connections will be accepted.
+    An attacker may prevent TCP connections to a Server by opening
+    a connection and leaving it idle, until the connection is closed by
+    the server no other connections will be accepted.
 cves:
   - CVE-2017-15133
 credit: Pedro Sampaio
 symbols:
   - Server.serveTCP
 links:
-  pr: https://github.com/miekg/dns/pull/631
-  commit: https://github.com/miekg/dns/commit/43913f2f4fbd7dcff930b8a809e709591e4dd79e
+    pr: https://github.com/miekg/dns/pull/631
+    commit: https://github.com/miekg/dns/commit/43913f2f4fbd7dcff930b8a809e709591e4dd79e
diff --git a/reports/GO-2020-0007.yaml b/reports/GO-2020-0007.yaml
index 2514916..8b845ba 100644
--- a/reports/GO-2020-0007.yaml
+++ b/reports/GO-2020-0007.yaml
@@ -2,15 +2,15 @@
 versions:
   - fixed: v0.9.1-0.20170424173420-06e7a29f36a3
 description: |
-  Filters containing rules with multiple syscall arguments are improperly
-  constructed, such that all arguments are required to match rather than
-  any of the arguments (AND is used rather than OR). These filters can be
-  bypassed by only specifying a subset of the arguments due to this
-  behavior.
+    Filters containing rules with multiple syscall arguments are improperly
+    constructed, such that all arguments are required to match rather than
+    any of the arguments (AND is used rather than OR). These filters can be
+    bypassed by only specifying a subset of the arguments due to this
+    behavior.
 cves:
   - CVE-2017-18367
-credit: "@ihac"
+credit: '@ihac'
 symbols:
   - ScmpFilter.addRuleGeneric
 links:
-  commit: https://github.com/seccomp/libseccomp-golang/commit/06e7a29f36a34b8cf419aeb87b979ee508e58f9e
+    commit: https://github.com/seccomp/libseccomp-golang/commit/06e7a29f36a34b8cf419aeb87b979ee508e58f9e
diff --git a/reports/GO-2020-0008.yaml b/reports/GO-2020-0008.yaml
index ec36d2a..9bcf259 100644
--- a/reports/GO-2020-0008.yaml
+++ b/reports/GO-2020-0008.yaml
@@ -2,16 +2,16 @@
 versions:
   - fixed: v1.1.25-0.20191211073109-8ebf2e419df7
 description: |
-  DNS message transaction IDs are generated using math/rand which
-  makes them relatively predictable. This reduces the complexity
-  of response spoofing attacks against DNS clients.
+    DNS message transaction IDs are generated using math/rand which
+    makes them relatively predictable. This reduces the complexity
+    of response spoofing attacks against DNS clients.
 cves:
   - CVE-2019-19794
 symbols:
   - id
 links:
-  pr: https://github.com/miekg/dns/pull/1044
-  commit: https://github.com/miekg/dns/commit/8ebf2e419df7857ac8919baa05248789a8ffbf33
-  context:
-    - https://github.com/miekg/dns/issues/1037
-    - https://github.com/miekg/dns/issues/1043
+    pr: https://github.com/miekg/dns/pull/1044
+    commit: https://github.com/miekg/dns/commit/8ebf2e419df7857ac8919baa05248789a8ffbf33
+    context:
+      - https://github.com/miekg/dns/issues/1037
+      - https://github.com/miekg/dns/issues/1043
diff --git a/reports/GO-2020-0009.yaml b/reports/GO-2020-0009.yaml
index e5e6653..0cf648e 100644
--- a/reports/GO-2020-0009.yaml
+++ b/reports/GO-2020-0009.yaml
@@ -8,10 +8,10 @@
 versions:
   - fixed: v0.0.0-20160903044734-789a4c4bd4c1
 description: |
-  On 32-bit platforms an attacker can manipulate a ciphertext encrypted with AES-CBC
-  with HMAC such that they can control how large the input buffer is when computing
-  the HMAC authentication tag. This can can allow a manipulated ciphertext to be
-  verified as authentic, opening the door for padding oracle attacks.
+    On 32-bit platforms an attacker can manipulate a ciphertext encrypted with AES-CBC
+    with HMAC such that they can control how large the input buffer is when computing
+    the HMAC authentication tag. This can can allow a manipulated ciphertext to be
+    verified as authentic, opening the door for padding oracle attacks.
 cves:
   - CVE-2016-9123
 credit: Quan Nguyen from Google's Information Security Engineering Team
@@ -31,6 +31,6 @@
   - s390
   - sparc
 links:
-  commit: https://github.com/square/go-jose/commit/789a4c4bd4c118f7564954f441b29c153ccd6a96
-  context:
-    - https://www.openwall.com/lists/oss-security/2016/11/03/1
+    commit: https://github.com/square/go-jose/commit/789a4c4bd4c118f7564954f441b29c153ccd6a96
+    context:
+      - https://www.openwall.com/lists/oss-security/2016/11/03/1
diff --git a/reports/GO-2020-0010.yaml b/reports/GO-2020-0010.yaml
index 5bf3452..1e16411 100644
--- a/reports/GO-2020-0010.yaml
+++ b/reports/GO-2020-0010.yaml
@@ -7,9 +7,9 @@
 versions:
   - fixed: v0.0.0-20160831185616-c7581939a365
 description: |
-  When using ECDH-ES an attacker can mount an invalid curve attack during
-  decryption as the supplied public key is not checked to be on the same
-  curve as the receivers private key.
+    When using ECDH-ES an attacker can mount an invalid curve attack during
+    decryption as the supplied public key is not checked to be on the same
+    curve as the receivers private key.
 cves:
   - CVE-2016-9121
 credit: Quan Nguyen from Google's Information Security Engineering Team
@@ -18,6 +18,6 @@
   - ecDecrypterSigner.decryptKey
   - rawJsonWebKey.ecPublicKey
 links:
-  commit: https://github.com/square/go-jose/commit/c7581939a3656bb65e89d64da0a52364a33d2507
-  context:
-    - https://www.openwall.com/lists/oss-security/2016/11/03/1
+    commit: https://github.com/square/go-jose/commit/c7581939a3656bb65e89d64da0a52364a33d2507
+    context:
+      - https://www.openwall.com/lists/oss-security/2016/11/03/1
diff --git a/reports/GO-2020-0011.yaml b/reports/GO-2020-0011.yaml
index f86ce76..26e1612 100644
--- a/reports/GO-2020-0011.yaml
+++ b/reports/GO-2020-0011.yaml
@@ -2,11 +2,11 @@
 versions:
   - fixed: v0.0.0-20160922232413-2c5656adca99
 description: |
-  When decrypting JsonWebEncryption objects with multiple recipients
-  or JsonWebSignature objects with multiple signatures the Decrypt
-  and Verify methods do not indicate which recipient or signature was
-  valid. This may lead a caller to rely on protected headers from an
-  invalid recipient or signature.
+    When decrypting JsonWebEncryption objects with multiple recipients
+    or JsonWebSignature objects with multiple signatures the Decrypt
+    and Verify methods do not indicate which recipient or signature was
+    valid. This may lead a caller to rely on protected headers from an
+    invalid recipient or signature.
 cves:
   - CVE-2016-9122
 credit: Quan Nguyen from Google's Information Security Engineering Team
@@ -14,6 +14,6 @@
   - JsonWebEncryption.Decrypt
   - JsonWebSignature.Verify
 links:
-  commit: https://github.com/square/go-jose/commit/2c5656adca9909843c4ff50acf1d2cf8f32da7e6
-  context:
-    - https://www.openwall.com/lists/oss-security/2016/11/03/1
+    commit: https://github.com/square/go-jose/commit/2c5656adca9909843c4ff50acf1d2cf8f32da7e6
+    context:
+      - https://www.openwall.com/lists/oss-security/2016/11/03/1
diff --git a/reports/GO-2020-0012.yaml b/reports/GO-2020-0012.yaml
index 162228d..1753588 100644
--- a/reports/GO-2020-0012.yaml
+++ b/reports/GO-2020-0012.yaml
@@ -3,10 +3,10 @@
 versions:
   - fixed: v0.0.0-20200220183623-bac4c82f6975
 description: |
-  An attacker can craft an ssh-ed25519 or sk-ssh-ed25519@openssh.com public
-  key, such that the library will panic when trying to verify a signature
-  with it. If verifying signatures using user supplied public keys, this
-  may be used as a denial of service vector.
+    An attacker can craft an ssh-ed25519 or sk-ssh-ed25519@openssh.com public
+    key, such that the library will panic when trying to verify a signature
+    with it. If verifying signatures using user supplied public keys, this
+    may be used as a denial of service vector.
 cves:
   - CVE-2020-9283
 credit: Alex Gaynor, Fish in a Barrel
@@ -17,7 +17,7 @@
   - skEd25519PublicKey.Verify
   - NewPublicKey
 links:
-  pr: https://go-review.googlesource.com/c/crypto/+/220357
-  commit: https://go.googlesource.com/crypto/+/bac4c82f69751a6dd76e702d54b3ceb88adab236
-  context:
-    - https://groups.google.com/g/golang-announce/c/3L45YRc91SY
+    pr: https://go-review.googlesource.com/c/crypto/+/220357
+    commit: https://go.googlesource.com/crypto/+/bac4c82f69751a6dd76e702d54b3ceb88adab236
+    context:
+      - https://groups.google.com/g/golang-announce/c/3L45YRc91SY
diff --git a/reports/GO-2020-0013.yaml b/reports/GO-2020-0013.yaml
index ea36426..6bd75a1 100644
--- a/reports/GO-2020-0013.yaml
+++ b/reports/GO-2020-0013.yaml
@@ -3,17 +3,17 @@
 versions:
   - fixed: v0.0.0-20170330155735-e4e2799dd7aa
 description: |
-  By default host key verification is disabled which allows for
-  man-in-the-middle attacks against SSH clients if
-  ClientConfig.HostKeyCallback is not set.
+    By default host key verification is disabled which allows for
+    man-in-the-middle attacks against SSH clients if
+    ClientConfig.HostKeyCallback is not set.
 cves:
   - CVE-2017-3204
 credit: Phil Pennock
 symbols:
   - NewClientConn
 links:
-  pr: https://go-review.googlesource.com/38701
-  commit: https://go.googlesource.com/crypto/+/e4e2799dd7aab89f583e1d898300d96367750991
-  context:
-    - https://go.dev/issue/19767
-    - https://bridge.grumpy-troll.org/2017/04/golang-ssh-security/
+    pr: https://go-review.googlesource.com/38701
+    commit: https://go.googlesource.com/crypto/+/e4e2799dd7aab89f583e1d898300d96367750991
+    context:
+      - https://go.dev/issue/19767
+      - https://bridge.grumpy-troll.org/2017/04/golang-ssh-security/
diff --git a/reports/GO-2020-0014.yaml b/reports/GO-2020-0014.yaml
index 10344ae..2c08ae3 100644
--- a/reports/GO-2020-0014.yaml
+++ b/reports/GO-2020-0014.yaml
@@ -3,9 +3,9 @@
 versions:
   - fixed: v0.0.0-20190125091013-d26f9f9a57f3
 description: |
-  html.Parse does not properly handle "select" tags, which can lead
-  to an infinite loop. If parsing user supplied input, this may be used
-  as a denial of service vector.
+    html.Parse does not properly handle "select" tags, which can lead
+    to an infinite loop. If parsing user supplied input, this may be used
+    as a denial of service vector.
 cves:
   - CVE-2018-17846
 credit: '@tr3ee'
@@ -13,7 +13,7 @@
   - inSelectIM
   - inSelectInTableIM
 links:
-  pr: https://go-review.googlesource.com/c/137275
-  commit: https://go.googlesource.com/net/+/d26f9f9a57f3fab6a695bec0d84433c2c50f8bbf
-  context:
-    - https://go.dev/issue/27842
+    pr: https://go-review.googlesource.com/c/137275
+    commit: https://go.googlesource.com/net/+/d26f9f9a57f3fab6a695bec0d84433c2c50f8bbf
+    context:
+      - https://go.dev/issue/27842
diff --git a/reports/GO-2020-0015.yaml b/reports/GO-2020-0015.yaml
index 72ee7ff..7032e42 100644
--- a/reports/GO-2020-0015.yaml
+++ b/reports/GO-2020-0015.yaml
@@ -10,11 +10,11 @@
 versions:
   - fixed: v0.3.3
 description: |
-  An attacker could provide a single byte to a UTF16 decoder instantiated with
-  UseBOM or ExpectBOM to trigger an infinite loop if the String function on
-  the Decoder is called, or the Decoder is passed to transform.String.
-  If used to parse user supplied input, this may be used as a denial of service
-  vector.
+    An attacker could provide a single byte to a UTF16 decoder instantiated with
+    UseBOM or ExpectBOM to trigger an infinite loop if the String function on
+    the Decoder is called, or the Decoder is passed to transform.String.
+    If used to parse user supplied input, this may be used as a denial of service
+    vector.
 last_modified: 2021-06-07T12:00:00Z
 cves:
   - CVE-2020-14040
@@ -22,8 +22,8 @@
 symbols:
   - utf16Decoder.Transform
 links:
-  pr: https://go-review.googlesource.com/c/text/+/238238
-  commit: https://go.googlesource.com/text/+/23ae387dee1f90d29a23c0e87ee0b46038fbed0e
-  context:
-    - https://go.dev/issue/39491
-    - https://groups.google.com/g/golang-announce/c/bXVeAmGOqz0
+    pr: https://go-review.googlesource.com/c/text/+/238238
+    commit: https://go.googlesource.com/text/+/23ae387dee1f90d29a23c0e87ee0b46038fbed0e
+    context:
+      - https://go.dev/issue/39491
+      - https://groups.google.com/g/golang-announce/c/bXVeAmGOqz0
diff --git a/reports/GO-2020-0016.yaml b/reports/GO-2020-0016.yaml
index 411d20e..d82e803 100644
--- a/reports/GO-2020-0016.yaml
+++ b/reports/GO-2020-0016.yaml
@@ -2,17 +2,17 @@
 versions:
   - fixed: v0.5.8
 description: |
-  An attacker can construct a series of bytes such that calling
-  Reader.Read on the bytes could cause an infinite loop. If
-  parsing user supplied input, this may be used as a denial of
-  service vector.
-credit: "@0xdecaf"
+    An attacker can construct a series of bytes such that calling
+    Reader.Read on the bytes could cause an infinite loop. If
+    parsing user supplied input, this may be used as a denial of
+    service vector.
 cves:
   - CVE-2021-29482
+credit: '@0xdecaf'
 symbols:
   - readUvarint
 links:
-  commit: https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b
-  context:
-    - https://github.com/ulikunitz/xz/issues/35
-    - https://github.com/ulikunitz/xz/security/advisories/GHSA-25xm-hr59-7c27
+    commit: https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b
+    context:
+      - https://github.com/ulikunitz/xz/issues/35
+      - https://github.com/ulikunitz/xz/security/advisories/GHSA-25xm-hr59-7c27
diff --git a/reports/GO-2020-0017.yaml b/reports/GO-2020-0017.yaml
index f195509..04f8d3f 100644
--- a/reports/GO-2020-0017.yaml
+++ b/reports/GO-2020-0017.yaml
@@ -8,16 +8,16 @@
 versions:
   - introduced: v0.0.0-20150717181359-44718f8a89b0
 description: |
-  If a JWT contains an audience claim with an array of strings, rather
-  than a single string, and MapClaims.VerifyAudience is called with
-  req set to false, then audience verification will be bypassed,
-  allowing an invalid set of audiences to be provided.
+    If a JWT contains an audience claim with an array of strings, rather
+    than a single string, and MapClaims.VerifyAudience is called with
+    req set to false, then audience verification will be bypassed,
+    allowing an invalid set of audiences to be provided.
 cves:
   - CVE-2020-26160
-credit: "@christopher-wong"
+credit: '@christopher-wong'
 symbols:
   - MapClaims.VerifyAudience
 links:
-  commit: https://github.com/dgrijalva/jwt-go/commit/ec0a89a131e3e8567adcb21254a5cd20a70ea4ab
-  context:
-    - https://github.com/dgrijalva/jwt-go/issues/422
+    commit: https://github.com/dgrijalva/jwt-go/commit/ec0a89a131e3e8567adcb21254a5cd20a70ea4ab
+    context:
+      - https://github.com/dgrijalva/jwt-go/issues/422
diff --git a/reports/GO-2020-0018.yaml b/reports/GO-2020-0018.yaml
index 1aa3eb2..af677d0 100644
--- a/reports/GO-2020-0018.yaml
+++ b/reports/GO-2020-0018.yaml
@@ -2,18 +2,18 @@
 versions:
   - fixed: v1.2.1-0.20181016170032-d91630c85102
 description: |
-  UUIDs generated using NewV1 and NewV4 may not read the expected
-  number of random bytes. These UUIDs may contain a significantly smaller
-  amount of entropy than expected, possibly leading to collisions.
-credit: "@josselin-c"
+    UUIDs generated using NewV1 and NewV4 may not read the expected
+    number of random bytes. These UUIDs may contain a significantly smaller
+    amount of entropy than expected, possibly leading to collisions.
 cves:
   - CVE-2021-3538
+credit: '@josselin-c'
 symbols:
   - NewV4
   - rfc4122Generator.getClockSequence
   - rfc4122Generator.getHardwareAddr
 links:
-  pr: https://github.com/satori/go.uuid/pull/75
-  commit: https://github.com/satori/go.uuid/commit/d91630c8510268e75203009fe7daf2b8e1d60c45
-  context:
-    - https://github.com/satori/go.uuid/issues/73
+    pr: https://github.com/satori/go.uuid/pull/75
+    commit: https://github.com/satori/go.uuid/commit/d91630c8510268e75203009fe7daf2b8e1d60c45
+    context:
+      - https://github.com/satori/go.uuid/issues/73
diff --git a/reports/GO-2020-0019.yaml b/reports/GO-2020-0019.yaml
index 37183d1..20b5871 100644
--- a/reports/GO-2020-0019.yaml
+++ b/reports/GO-2020-0019.yaml
@@ -2,10 +2,10 @@
 versions:
   - fixed: v1.4.1
 description: |
-  An attacker can craft malicious WebSocket frames that cause an integer
-  overflow in a variable which tracks the number of bytes remaining. This
-  may cause the server or client to get stuck attempting to read frames
-  in a loop, which can be used as a denial of service vector.
+    An attacker can craft malicious WebSocket frames that cause an integer
+    overflow in a variable which tracks the number of bytes remaining. This
+    may cause the server or client to get stuck attempting to read frames
+    in a loop, which can be used as a denial of service vector.
 cves:
   - CVE-2020-27813
 credit: Max Justicz
@@ -13,5 +13,5 @@
   - Conn.advanceFrame
   - messageReader.Read
 links:
-  pr: https://github.com/gorilla/websocket/pull/537
-  commit: https://github.com/gorilla/websocket/commit/5b740c29263eb386f33f265561c8262522f19d37
+    pr: https://github.com/gorilla/websocket/pull/537
+    commit: https://github.com/gorilla/websocket/commit/5b740c29263eb386f33f265561c8262522f19d37
diff --git a/reports/GO-2020-0020.yaml b/reports/GO-2020-0020.yaml
index fd02c03..f0ef171 100644
--- a/reports/GO-2020-0020.yaml
+++ b/reports/GO-2020-0020.yaml
@@ -2,12 +2,12 @@
 versions:
   - fixed: v1.3.0
 description: |
-  Usage of the CORS handler may apply improper CORS headers, allowing
-  the requester to explicitly control the value of the Access-Control-Allow-Origin
-  header, which bypasses the expected behavior of the Same Origin Policy.
+    Usage of the CORS handler may apply improper CORS headers, allowing
+    the requester to explicitly control the value of the Access-Control-Allow-Origin
+    header, which bypasses the expected behavior of the Same Origin Policy.
 credit: Evan J Johnson
 symbols:
   - cors.ServeHTTP
 links:
-  pr: https://github.com/gorilla/handlers/pull/116
-  commit: https://github.com/gorilla/handlers/commit/90663712d74cb411cbef281bc1e08c19d1a76145
+    pr: https://github.com/gorilla/handlers/pull/116
+    commit: https://github.com/gorilla/handlers/commit/90663712d74cb411cbef281bc1e08c19d1a76145
diff --git a/reports/GO-2020-0021.yaml b/reports/GO-2020-0021.yaml
index 61767e1..2991cbb 100644
--- a/reports/GO-2020-0021.yaml
+++ b/reports/GO-2020-0021.yaml
@@ -2,9 +2,9 @@
 versions:
   - fixed: v0.5.8
 description: |
-  Due to improper santization of user input, a number of methods are
-  vulnerable to SQL injection if used with user input that has not
-  been santized by the caller.
+    Due to improper santization of user input, a number of methods are
+    vulnerable to SQL injection if used with user input that has not
+    been santized by the caller.
 cves:
   - CVE-2014-8681
 credit: Pascal Turbing and Jiahua (Joe) Chen
@@ -13,6 +13,6 @@
   - SearchRepositoryByName
   - SearchUserByName
 links:
-  commit: https://github.com/gogs/gogs/commit/83283bca4cb4e0f4ec48a28af680f0d88db3d2c8
-  context:
-    - https://seclists.org/fulldisclosure/2014/Nov/31
+    commit: https://github.com/gogs/gogs/commit/83283bca4cb4e0f4ec48a28af680f0d88db3d2c8
+    context:
+      - https://seclists.org/fulldisclosure/2014/Nov/31
diff --git a/reports/GO-2020-0022.yaml b/reports/GO-2020-0022.yaml
index 19a98f0..c754877 100644
--- a/reports/GO-2020-0022.yaml
+++ b/reports/GO-2020-0022.yaml
@@ -2,13 +2,13 @@
 versions:
   - fixed: v0.0.0-20140711154735-199f5f787806
 description: |
-  LZ4 bindings use a deprecated C API that is vulnerable to
-  memory corruption, which could lead to arbitrary code execution
-  if called with untrusted user input.
+    LZ4 bindings use a deprecated C API that is vulnerable to
+    memory corruption, which could lead to arbitrary code execution
+    if called with untrusted user input.
 credit: Yann Collet
 symbols:
   - Uncompress
 links:
-  commit: https://github.com/cloudflare/golz4/commit/199f5f7878062ca17a98e079f2dbe1205e2ed898
-  context:
-    - https://github.com/cloudflare/golz4/issues/5
+    commit: https://github.com/cloudflare/golz4/commit/199f5f7878062ca17a98e079f2dbe1205e2ed898
+    context:
+      - https://github.com/cloudflare/golz4/issues/5
diff --git a/reports/GO-2020-0023.yaml b/reports/GO-2020-0023.yaml
index 9e7c525..e4cedc2 100644
--- a/reports/GO-2020-0023.yaml
+++ b/reports/GO-2020-0023.yaml
@@ -2,13 +2,13 @@
 versions:
   - fixed: v0.0.0-20170426191122-ca1404ee6e83
 description: |
-  Token validation methods are susceptible to a timing side-channel
-  during HMAC comparison. With a large enough number of requests
-  over a low latency connection, an attacker may use this to determine
-  the expected HMAC.
+    Token validation methods are susceptible to a timing side-channel
+    during HMAC comparison. With a large enough number of requests
+    over a low latency connection, an attacker may use this to determine
+    the expected HMAC.
 symbols:
   - Algorithm.validateSignature
 links:
-  commit: https://github.com/robbert229/jwt/commit/ca1404ee6e83fcbafb66b09ed0d543850a15b654
-  context:
-    - https://github.com/robbert229/jwt/issues/12
+    commit: https://github.com/robbert229/jwt/commit/ca1404ee6e83fcbafb66b09ed0d543850a15b654
+    context:
+      - https://github.com/robbert229/jwt/issues/12
diff --git a/reports/GO-2020-0024.yaml b/reports/GO-2020-0024.yaml
index b5290ef..d3d9c91 100644
--- a/reports/GO-2020-0024.yaml
+++ b/reports/GO-2020-0024.yaml
@@ -11,11 +11,11 @@
 versions:
   - fixed: v0.0.0-20130808000456-233bccbb1abe
 description: |
-  The RemoteAddr and LocalAddr methods on the returned net.Conn may
-  call themselves, leading to an infinite loop which will crash the
-  program due to a stack overflow.
+    The RemoteAddr and LocalAddr methods on the returned net.Conn may
+    call themselves, leading to an infinite loop which will crash the
+    program due to a stack overflow.
 symbols:
   - proxiedConn.LocalAddr
   - proxiedConn.RemoteAddr
 links:
-  commit: https://github.com/btcsuite/go-socks/commit/233bccbb1abe02f05750f7ace66f5bffdb13defc
+    commit: https://github.com/btcsuite/go-socks/commit/233bccbb1abe02f05750f7ace66f5bffdb13defc
diff --git a/reports/GO-2020-0025.yaml b/reports/GO-2020-0025.yaml
index f1f5f3b..922b56c 100644
--- a/reports/GO-2020-0025.yaml
+++ b/reports/GO-2020-0025.yaml
@@ -9,13 +9,13 @@
 versions:
   - fixed: v0.0.0-20180523222229-09b5706aa936
 description: |
-  Due to improper path santization, archives containing relative file
-  paths can cause files to be written (or overwritten) outside of the
-  target directory.
+    Due to improper path santization, archives containing relative file
+    paths can cause files to be written (or overwritten) outside of the
+    target directory.
 symbols:
   - tgzExtractor.Extract
   - zipExtractor.Extract
 links:
-  commit: https://github.com/cloudfoundry/archiver/commit/09b5706aa9367972c09144a450bb4523049ee840
-  context:
-    - https://snyk.io/research/zip-slip-vulnerability
+    commit: https://github.com/cloudfoundry/archiver/commit/09b5706aa9367972c09144a450bb4523049ee840
+    context:
+      - https://snyk.io/research/zip-slip-vulnerability
diff --git a/reports/GO-2020-0026.yaml b/reports/GO-2020-0026.yaml
index e425124..39dceca 100644
--- a/reports/GO-2020-0026.yaml
+++ b/reports/GO-2020-0026.yaml
@@ -3,9 +3,9 @@
 versions:
   - fixed: v1.1.10-0.20180427153919-f5cbcbc5cc6f
 description: |
-  Due to improper path santization, archives containing relative file
-  paths can cause files to be written (or overwritten) outside of the
-  target directory.
+    Due to improper path santization, archives containing relative file
+    paths can cause files to be written (or overwritten) outside of the
+    target directory.
 cves:
   - CVE-2018-1103
 symbols:
@@ -13,6 +13,6 @@
   - stiTar.extractLink
   - New
 links:
-  commit: https://github.com/openshift/source-to-image/commit/f5cbcbc5cc6f8cc2f479a7302443bea407a700cb
-  context:
-    - https://snyk.io/research/zip-slip-vulnerability
+    commit: https://github.com/openshift/source-to-image/commit/f5cbcbc5cc6f8cc2f479a7302443bea407a700cb
+    context:
+      - https://snyk.io/research/zip-slip-vulnerability
diff --git a/reports/GO-2020-0027.yaml b/reports/GO-2020-0027.yaml
index fcb4bf7..5de25ee 100644
--- a/reports/GO-2020-0027.yaml
+++ b/reports/GO-2020-0027.yaml
@@ -8,9 +8,9 @@
 versions:
   - fixed: v0.2.4
 description: |
-  After dropping and then elevating process privileges euid, guid, and groups
-  are not properly restored to their original values, allowing an unprivileged
-  user to gain membership in the root group.
+    After dropping and then elevating process privileges euid, guid, and groups
+    are not properly restored to their original values, allowing an unprivileged
+    user to gain membership in the root group.
 cves:
   - CVE-2018-6558
 symbols:
@@ -18,6 +18,6 @@
   - SetProcessPrivileges
   - Handle.StopAsPamUser
 links:
-  commit: https://github.com/google/fscrypt/commit/3022c1603d968c22f147b4a2c49c4637dd1be91b
-  context:
-    - https://github.com/google/fscrypt/issues/77
+    commit: https://github.com/google/fscrypt/commit/3022c1603d968c22f147b4a2c49c4637dd1be91b
+    context:
+      - https://github.com/google/fscrypt/issues/77
diff --git a/reports/GO-2020-0028.yaml b/reports/GO-2020-0028.yaml
index 77e49bf..f8d731e 100644
--- a/reports/GO-2020-0028.yaml
+++ b/reports/GO-2020-0028.yaml
@@ -2,15 +2,15 @@
 versions:
   - fixed: v1.0.10
 description: |
-  Due to a nil pointer dereference, parsing a malformed zone file
-  containing TA records may cause a panic. If parsing user supplied
-  input, this may be used as a denial of service vector.
+    Due to a nil pointer dereference, parsing a malformed zone file
+    containing TA records may cause a panic. If parsing user supplied
+    input, this may be used as a denial of service vector.
 cves:
   - CVE-2018-17419
-credit: "@tr3ee"
+credit: '@tr3ee'
 symbols:
   - setTA
 links:
-  commit: https://github.com/miekg/dns/commit/501e858f679edecd4a38a86317ce50271014a80d
-  context:
-    - https://github.com/miekg/dns/issues/742
+    commit: https://github.com/miekg/dns/commit/501e858f679edecd4a38a86317ce50271014a80d
+    context:
+      - https://github.com/miekg/dns/issues/742
diff --git a/reports/GO-2020-0029.yaml b/reports/GO-2020-0029.yaml
index 971d6c7..0419e9b 100644
--- a/reports/GO-2020-0029.yaml
+++ b/reports/GO-2020-0029.yaml
@@ -2,12 +2,12 @@
 versions:
   - fixed: v0.0.0-20141229113116-0099840c98ae
 description: |
-  Due to improper HTTP header santization, a malicious user can spoof their
-  source IP address by setting the X-Forwarded-For header. This may allow
-  a user to bypass IP based restrictions, or obfuscate their true source.
-credit: "@nl5887"
+    Due to improper HTTP header santization, a malicious user can spoof their
+    source IP address by setting the X-Forwarded-For header. This may allow
+    a user to bypass IP based restrictions, or obfuscate their true source.
+credit: '@nl5887'
 symbols:
   - Context.ClientIP
 links:
-  commit: https://github.com/gin-gonic/gin/commit/0099840c98ae1473c5ff0f18bc93a8e13ceed829
-  pr: https://github.com/gin-gonic/gin/pull/182
+    pr: https://github.com/gin-gonic/gin/pull/182
+    commit: https://github.com/gin-gonic/gin/commit/0099840c98ae1473c5ff0f18bc93a8e13ceed829
diff --git a/reports/GO-2020-0031.yaml b/reports/GO-2020-0031.yaml
index 91f7131..d600250 100644
--- a/reports/GO-2020-0031.yaml
+++ b/reports/GO-2020-0031.yaml
@@ -2,11 +2,11 @@
 versions:
   - fixed: v0.1.1
 description: |
-  Due to improper setting of finalizers, memory passed to C may be freed before it is used,
-  leading to crashes due to memory corruption or possible code execution.
+    Due to improper setting of finalizers, memory passed to C may be freed before it is used,
+    leading to crashes due to memory corruption or possible code execution.
 cves:
   - CVE-2020-8945
 links:
-  commit: https://github.com/proglottis/gpgme/commit/92153bcb59bd2f511e502262c46c7bd660e21733
-  context:
-    - https://bugzilla.redhat.com/show_bug.cgi?id=1795838
+    commit: https://github.com/proglottis/gpgme/commit/92153bcb59bd2f511e502262c46c7bd660e21733
+    context:
+      - https://bugzilla.redhat.com/show_bug.cgi?id=1795838
diff --git a/reports/GO-2020-0032.yaml b/reports/GO-2020-0032.yaml
index 5bf2026..43e1c5e 100644
--- a/reports/GO-2020-0032.yaml
+++ b/reports/GO-2020-0032.yaml
@@ -13,18 +13,19 @@
 versions:
   - fixed: v1.4.3
 description: |
-  Due to improper santization of user input, Controller.FileHandler allows
-  for directory traversal, allowing an attacker to read files outside of
-  the target directory that the server has permission to read.
-credit: "@christi3k"
+    Due to improper santization of user input, Controller.FileHandler allows
+    for directory traversal, allowing an attacker to read files outside of
+    the target directory that the server has permission to read.
+credit: '@christi3k'
 symbols:
   - Controller.FileHandler
 links:
-  pr: https://github.com/goadesign/goa/pull/2388
-  commit: https://github.com/goadesign/goa/commit/70b5a199d0f813d74423993832c424e1fc73fb39
+    pr: https://github.com/goadesign/goa/pull/2388
+    commit: https://github.com/goadesign/goa/commit/70b5a199d0f813d74423993832c424e1fc73fb39
 cve_metadata:
-  id: CVE-9999-0012
-  cwe: "CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"
-  description: |
-    Improper path santiziation in github.com/goadesign/goa before v3.0.9, v2.0.10, or
-    v1.4.3 allow remote attackers to read files outside of the intended directory.
+    id: CVE-9999-0012
+    cwe: 'CWE-22: Improper Limitation of a Pathname to a Restricted Directory (''Path
+        Traversal'')'
+    description: |
+        Improper path santiziation in github.com/goadesign/goa before v3.0.9, v2.0.10, or
+        v1.4.3 allow remote attackers to read files outside of the intended directory.
diff --git a/reports/GO-2020-0033.yaml b/reports/GO-2020-0033.yaml
index 4b51882..dd831fd 100644
--- a/reports/GO-2020-0033.yaml
+++ b/reports/GO-2020-0033.yaml
@@ -2,14 +2,14 @@
 versions:
   - fixed: v0.12.4
 description: |
-  Due to improper santization of user input, HTTPEngine.Handle allows
-  for directory traversal, allowing an attacker to read files outside of
-  the target directory that the server has permission to read.
-credit: "@snyff"
+    Due to improper santization of user input, HTTPEngine.Handle allows
+    for directory traversal, allowing an attacker to read files outside of
+    the target directory that the server has permission to read.
+credit: '@snyff'
 symbols:
   - HTTPEngine.Handle
 links:
-  pr: https://github.com/go-aah/aah/pull/267
-  commit: https://github.com/go-aah/aah/commit/881dc9f71d1f7a4e8a9a39df9c5c081d3a2da1ec
-  context:
-    - https://github.com/go-aah/aah/issues/266
+    pr: https://github.com/go-aah/aah/pull/267
+    commit: https://github.com/go-aah/aah/commit/881dc9f71d1f7a4e8a9a39df9c5c081d3a2da1ec
+    context:
+      - https://github.com/go-aah/aah/issues/266
diff --git a/reports/GO-2020-0034.yaml b/reports/GO-2020-0034.yaml
index 386085e..4635658 100644
--- a/reports/GO-2020-0034.yaml
+++ b/reports/GO-2020-0034.yaml
@@ -2,13 +2,13 @@
 versions:
   - fixed: v1.0.0
 description: |
-  Due to improper path santization, archives containing relative file
-  paths can cause files to be written (or overwritten) outside of the
-  target directory.
+    Due to improper path santization, archives containing relative file
+    paths can cause files to be written (or overwritten) outside of the
+    target directory.
 symbols:
   - Unzip.Extract
 links:
-  pr: https://github.com/artdarek/go-unzip/pull/2
-  commit: https://github.com/artdarek/go-unzip/commit/4975cbe0a719dc50b12da8585f1f207c82f7dfe0
-  context:
-    - https://snyk.io/research/zip-slip-vulnerability
+    pr: https://github.com/artdarek/go-unzip/pull/2
+    commit: https://github.com/artdarek/go-unzip/commit/4975cbe0a719dc50b12da8585f1f207c82f7dfe0
+    context:
+      - https://snyk.io/research/zip-slip-vulnerability
diff --git a/reports/GO-2020-0035.yaml b/reports/GO-2020-0035.yaml
index 29a500e..89e14c9 100644
--- a/reports/GO-2020-0035.yaml
+++ b/reports/GO-2020-0035.yaml
@@ -2,13 +2,13 @@
 versions:
   - fixed: v1.0.3-0.20200308084313-2adbaa4891b9
 description: |
-  Due to improper path santization, archives containing relative file
-  paths can cause files to be written (or overwritten) outside of the
-  target directory.
+    Due to improper path santization, archives containing relative file
+    paths can cause files to be written (or overwritten) outside of the
+    target directory.
 symbols:
   - Unzip.Extract
 links:
-  pr: https://github.com/yi-ge/unzip/pull/1
-  commit: https://github.com/yi-ge/unzip/commit/2adbaa4891b9690853ef10216189189f5ad7dc73
-  context:
-    - https://snyk.io/research/zip-slip-vulnerability
+    pr: https://github.com/yi-ge/unzip/pull/1
+    commit: https://github.com/yi-ge/unzip/commit/2adbaa4891b9690853ef10216189189f5ad7dc73
+    context:
+      - https://snyk.io/research/zip-slip-vulnerability
diff --git a/reports/GO-2020-0036.yaml b/reports/GO-2020-0036.yaml
index bf56969..0f2221e 100644
--- a/reports/GO-2020-0036.yaml
+++ b/reports/GO-2020-0036.yaml
@@ -1,22 +1,20 @@
 module: gopkg.in/yaml.v2
 additional_packages:
-  # all of the incompatible versions of github.com/go-yaml/yaml
-  # are affected
   - module: github.com/go-yaml/yaml
     symbols:
       - yaml_parser_fetch_more_tokens
 versions:
   - fixed: v2.2.8
 description: |
-  Due to unbounded aliasing, a crafted YAML file can cause consumption
-  of significant system resources. If parsing user supplied input, this
-  may be used as a denial of service vector.
+    Due to unbounded aliasing, a crafted YAML file can cause consumption
+    of significant system resources. If parsing user supplied input, this
+    may be used as a denial of service vector.
 cves:
   - CVE-2019-11254
 symbols:
   - yaml_parser_fetch_more_tokens
 links:
-  pr: https://github.com/go-yaml/yaml/pull/555
-  commit: https://github.com/go-yaml/yaml/commit/53403b58ad1b561927d19068c655246f2db79d48
-  context:
-    - https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18496
+    pr: https://github.com/go-yaml/yaml/pull/555
+    commit: https://github.com/go-yaml/yaml/commit/53403b58ad1b561927d19068c655246f2db79d48
+    context:
+      - https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18496
diff --git a/reports/GO-2020-0037.yaml b/reports/GO-2020-0037.yaml
index 1dd3b21..b28e6e1 100644
--- a/reports/GO-2020-0037.yaml
+++ b/reports/GO-2020-0037.yaml
@@ -3,13 +3,13 @@
 versions:
   - fixed: v0.31.1
 description: |
-  Due to support of Gzip compression in request bodies, as well
-  as a lack of limiting response body sizes, a malicious server
-  can cause a client to consume a significant amount of system
-  resources, which may be used as a denial of service vector.
-credit: "@guagualvcha"
+    Due to support of Gzip compression in request bodies, as well
+    as a lack of limiting response body sizes, a malicious server
+    can cause a client to consume a significant amount of system
+    resources, which may be used as a denial of service vector.
+credit: '@guagualvcha'
 symbols:
   - makeHTTPClient
 links:
-  pr: https://github.com/tendermint/tendermint/pull/3430
-  commit: https://github.com/tendermint/tendermint/commit/03085c2da23b179c4a51f59a03cb40aa4e85a613
+    pr: https://github.com/tendermint/tendermint/pull/3430
+    commit: https://github.com/tendermint/tendermint/commit/03085c2da23b179c4a51f59a03cb40aa4e85a613
diff --git a/reports/GO-2020-0038.yaml b/reports/GO-2020-0038.yaml
index b27d3db..3d08fb1 100644
--- a/reports/GO-2020-0038.yaml
+++ b/reports/GO-2020-0038.yaml
@@ -2,16 +2,16 @@
 versions:
   - fixed: v1.5.2
 description: |
-  Due to improper verification of packets, unencrypted packets containing
-  application data are accepted after the initial handshake. This allows
-  an attacker to inject arbitrary data which the client/server believes
-  was encrypted, despite not knowing the session key.
+    Due to improper verification of packets, unencrypted packets containing
+    application data are accepted after the initial handshake. This allows
+    an attacker to inject arbitrary data which the client/server believes
+    was encrypted, despite not knowing the session key.
 cves:
   - CVE-2019-20786
 symbols:
   - Conn.handleIncomingPacket
 links:
-  pr: https://github.com/pion/dtls/pull/128
-  commit: https://github.com/pion/dtls/commit/fd73a5df2ff0e1fb6ae6a51e2777d7a16cc4f4e0
-  context:
-    - https://www.usenix.org/system/files/sec20fall_fiterau-brostean_prepub.pdf
+    pr: https://github.com/pion/dtls/pull/128
+    commit: https://github.com/pion/dtls/commit/fd73a5df2ff0e1fb6ae6a51e2777d7a16cc4f4e0
+    context:
+      - https://www.usenix.org/system/files/sec20fall_fiterau-brostean_prepub.pdf
diff --git a/reports/GO-2020-0039.yaml b/reports/GO-2020-0039.yaml
index bd0f474..b3b4784 100644
--- a/reports/GO-2020-0039.yaml
+++ b/reports/GO-2020-0039.yaml
@@ -2,16 +2,16 @@
 versions:
   - fixed: v1.3.7
 description: |
-  Due to improper request santization, a specifically crafted URL
-  can cause the static file handler to redirect to an attacker chosen
-  URL, allowing for open redirect attacks.
+    Due to improper request santization, a specifically crafted URL
+    can cause the static file handler to redirect to an attacker chosen
+    URL, allowing for open redirect attacks.
 cves:
   - CVE-2020-12666
-credit: "@ev0A"
+credit: '@ev0A'
 symbols:
   - staticHandler
 links:
-  pr: https://github.com/go-macaron/macaron/pull/199
-  commit: https://github.com/go-macaron/macaron/commit/addc7461c3a90a040e79aa75bfd245107a210245
-  context:
-    - https://github.com/go-macaron/macaron/issues/198
+    pr: https://github.com/go-macaron/macaron/pull/199
+    commit: https://github.com/go-macaron/macaron/commit/addc7461c3a90a040e79aa75bfd245107a210245
+    context:
+      - https://github.com/go-macaron/macaron/issues/198
diff --git a/reports/GO-2020-0040.yaml b/reports/GO-2020-0040.yaml
index b7a786c..8435b0b 100644
--- a/reports/GO-2020-0040.yaml
+++ b/reports/GO-2020-0040.yaml
@@ -1,8 +1,8 @@
 module: github.com/shiyanhui/dht
 description: |
-  Due to unchecked type assertions, maliciously crafted messages can
-  cause panics, which may be used as a denial of service vector.
-credit: "@hMihaiDavid"
+    Due to unchecked type assertions, maliciously crafted messages can
+    cause panics, which may be used as a denial of service vector.
+credit: '@hMihaiDavid'
 links:
-  context:
-    - https://github.com/shiyanhui/dht/issues/57
+    context:
+      - https://github.com/shiyanhui/dht/issues/57
diff --git a/reports/GO-2020-0041.yaml b/reports/GO-2020-0041.yaml
index db9d878..37cef39 100644
--- a/reports/GO-2020-0041.yaml
+++ b/reports/GO-2020-0041.yaml
@@ -1,7 +1,6 @@
 module: github.com/unknwon/cae
 package: github.com/unknwon/cae/tz
 additional_packages:
-  # CVE-2020-7664
   - module: github.com/unknwon/cae
     package: github.com/unknwon/cae/zip
     symbols:
@@ -12,15 +11,15 @@
 versions:
   - fixed: v1.0.1
 description: |
-  Due to improper path santization, archives containing relative file
-  paths can cause files to be written (or overwritten) outside of the
-  target directory.
+    Due to improper path santization, archives containing relative file
+    paths can cause files to be written (or overwritten) outside of the
+    target directory.
 cves:
   - CVE-2020-7668
 symbols:
   - TzArchive.syncFiles
   - TzArchive.ExtractToFunc
 links:
-  commit: https://github.com/unknwon/cae/commit/07971c00a1bfd9dc171c3ad0bfab5b67c2287e11
-  context:
-    - https://snyk.io/research/zip-slip-vulnerability
+    commit: https://github.com/unknwon/cae/commit/07971c00a1bfd9dc171c3ad0bfab5b67c2287e11
+    context:
+      - https://snyk.io/research/zip-slip-vulnerability
diff --git a/reports/GO-2020-0042.yaml b/reports/GO-2020-0042.yaml
index eff7f51..05e0615 100644
--- a/reports/GO-2020-0042.yaml
+++ b/reports/GO-2020-0042.yaml
@@ -3,14 +3,14 @@
 versions:
   - fixed: v0.1.0
 description: |
-  Due to improper path santization, RPMs containing relative file
-  paths can cause files to be written (or overwritten) outside of the
-  target directory.
+    Due to improper path santization, RPMs containing relative file
+    paths can cause files to be written (or overwritten) outside of the
+    target directory.
 cves:
   - CVE-2020-7667
 symbols:
   - Extract
 links:
-  commit: https://github.com/sassoftware/go-rpmutils/commit/a64058cf21b8aada501bba923c9aab66fb6febf0
-  context:
-    - https://snyk.io/research/zip-slip-vulnerability
+    commit: https://github.com/sassoftware/go-rpmutils/commit/a64058cf21b8aada501bba923c9aab66fb6febf0
+    context:
+      - https://snyk.io/research/zip-slip-vulnerability
diff --git a/reports/GO-2020-0043.yaml b/reports/GO-2020-0043.yaml
index 05ade3e..1d38330 100644
--- a/reports/GO-2020-0043.yaml
+++ b/reports/GO-2020-0043.yaml
@@ -3,10 +3,10 @@
 versions:
   - fixed: v0.10.13
 description: |
-  Due to improper TLS verification when serving traffic for multiple
-  SNIs, an attacker may bypass TLS client authentication by indicating
-  an SNI during the TLS handshake that is different from the name in
-  the HTTP Host header.
+    Due to improper TLS verification when serving traffic for multiple
+    SNIs, an attacker may bypass TLS client authentication by indicating
+    an SNI during the TLS handshake that is different from the name in
+    the HTTP Host header.
 cves:
   - CVE-2018-21246
 symbols:
@@ -14,7 +14,7 @@
   - Server.serveHTTP
   - assertConfigsCompatible
 links:
-  pr: https://github.com/caddyserver/caddy/pull/2099
-  commit: https://github.com/caddyserver/caddy/commit/4d9ee000c8d2cbcdd8284007c1e0f2da7bc3c7c3
-  context:
-    - https://bugs.gentoo.org/715214
+    pr: https://github.com/caddyserver/caddy/pull/2099
+    commit: https://github.com/caddyserver/caddy/commit/4d9ee000c8d2cbcdd8284007c1e0f2da7bc3c7c3
+    context:
+      - https://bugs.gentoo.org/715214
diff --git a/reports/GO-2020-0045.yaml b/reports/GO-2020-0045.yaml
index acf05bb..76d9fce 100644
--- a/reports/GO-2020-0045.yaml
+++ b/reports/GO-2020-0045.yaml
@@ -2,14 +2,14 @@
 versions:
   - fixed: v0.3.0
 description: |
-  CSRF tokens are generated using math/rand, which is not a cryptographically secure
-  rander number generation, making predicting their values relatively trivial and
-  allowing an attacker to bypass CSRF protections which relatively few requests.
-credit: "@elithrar"
+    CSRF tokens are generated using math/rand, which is not a cryptographically secure
+    rander number generation, making predicting their values relatively trivial and
+    allowing an attacker to bypass CSRF protections which relatively few requests.
+credit: '@elithrar'
 symbols:
   - randomBytes
 links:
-  pr: https://github.com/dinever/golf/pull/24
-  commit: https://github.com/dinever/golf/commit/3776f338be48b5bc5e8cf9faff7851fc52a3f1fe
-  context:
-    - https://github.com/dinever/golf/issues/20
+    pr: https://github.com/dinever/golf/pull/24
+    commit: https://github.com/dinever/golf/commit/3776f338be48b5bc5e8cf9faff7851fc52a3f1fe
+    context:
+      - https://github.com/dinever/golf/issues/20
diff --git a/reports/GO-2020-0047.yaml b/reports/GO-2020-0047.yaml
index ec804e0..877d507 100644
--- a/reports/GO-2020-0047.yaml
+++ b/reports/GO-2020-0047.yaml
@@ -1,12 +1,12 @@
 module: github.com/RobotsAndPencils/go-saml
 description: |
-  XML Digital Signatures generated and validated using this package use
-  SHA-1, which may allow an attacker to craft inputs which cause hash
-  collisions depending on their control over the input.
+    XML Digital Signatures generated and validated using this package use
+    SHA-1, which may allow an attacker to craft inputs which cause hash
+    collisions depending on their control over the input.
 symbols:
   - AuthnRequest.Validate
   - NewAuthnRequest
   - NewSignedResponse
 links:
-  context:
-    - https://github.com/RobotsAndPencils/go-saml/pull/38
+    context:
+      - https://github.com/RobotsAndPencils/go-saml/pull/38
diff --git a/reports/GO-2020-0048.yaml b/reports/GO-2020-0048.yaml
index 8e52b06..842502e 100644
--- a/reports/GO-2020-0048.yaml
+++ b/reports/GO-2020-0048.yaml
@@ -2,16 +2,16 @@
 versions:
   - fixed: v1.3.1
 description: |
-  LoadURL does not check the Content-Type of loaded resources,
-  which can cause a panic due to nil pointer deference if the loaded
-  resource is not XML. If user supplied URLs are loaded, this may be
-  used as a denial of service vector.
+    LoadURL does not check the Content-Type of loaded resources,
+    which can cause a panic due to nil pointer deference if the loaded
+    resource is not XML. If user supplied URLs are loaded, this may be
+    used as a denial of service vector.
 cves:
   - CVE-2020-25614
-credit: "@dwisiswant0"
+credit: '@dwisiswant0'
 symbols:
   - LoadURL
 links:
-  commit: https://github.com/antchfx/xmlquery/commit/5648b2f39e8d5d3fc903c45a4f1274829df71821
-  context:
-    - https://github.com/antchfx/xmlquery/issues/39
+    commit: https://github.com/antchfx/xmlquery/commit/5648b2f39e8d5d3fc903c45a4f1274829df71821
+    context:
+      - https://github.com/antchfx/xmlquery/issues/39
diff --git a/reports/GO-2020-0049.yaml b/reports/GO-2020-0049.yaml
index 5fc8523..91b603e 100644
--- a/reports/GO-2020-0049.yaml
+++ b/reports/GO-2020-0049.yaml
@@ -2,13 +2,13 @@
 versions:
   - fixed: v1.1.1
 description: |
-  Due to improper validation of caller input, validation is silently disabled
-  if the provided expected token is malformed, causing any user supplied token
-  to be considered valid.
-credit: "@aeneasr"
+    Due to improper validation of caller input, validation is silently disabled
+    if the provided expected token is malformed, causing any user supplied token
+    to be considered valid.
+credit: '@aeneasr'
 symbols:
   - VerifyToken
   - verifyToken
 links:
-  pr: https://github.com/justinas/nosurf/pull/60
-  commit: https://github.com/justinas/nosurf/commit/4d86df7a4affa1fa50ab39fb09aac56c3ce9c314
+    pr: https://github.com/justinas/nosurf/pull/60
+    commit: https://github.com/justinas/nosurf/commit/4d86df7a4affa1fa50ab39fb09aac56c3ce9c314
diff --git a/reports/GO-2020-0050.yaml b/reports/GO-2020-0050.yaml
index 937610b..9d6ba61 100644
--- a/reports/GO-2020-0050.yaml
+++ b/reports/GO-2020-0050.yaml
@@ -2,15 +2,15 @@
 versions:
   - fixed: v1.1.0
 description: |
-  Due to the behavior of encoding/xml, a crafted XML document may cause
-  XML Digital Signature validation to be entirely bypassed, causing an
-  unsigned document to appear signed.
+    Due to the behavior of encoding/xml, a crafted XML document may cause
+    XML Digital Signature validation to be entirely bypassed, causing an
+    unsigned document to appear signed.
 cves:
   - CVE-2020-15216
-credit: "@jupenur"
+credit: '@jupenur'
 symbols:
   - ValidationContext.findSignature
 links:
-  commit: https://github.com/russellhaering/goxmldsig/commit/f6188febf0c29d7ffe26a0436212b19cb9615e64
-  context:
-    - https://github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7
+    commit: https://github.com/russellhaering/goxmldsig/commit/f6188febf0c29d7ffe26a0436212b19cb9615e64
+    context:
+      - https://github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7
diff --git a/reports/GO-2021-0051.yaml b/reports/GO-2021-0051.yaml
index 22c9f8a..cc0f7e7 100644
--- a/reports/GO-2021-0051.yaml
+++ b/reports/GO-2021-0051.yaml
@@ -2,14 +2,14 @@
 versions:
   - fixed: v4.1.18-0.20201215153152-4422e3b66b9f
 description: |
-  Due to improper sanitization of user input on Windows, the static file handler
-  allows for directory traversal, allowing an attacker to read files outside of
-  the target directory that the server has permission to read.
-credit: "@little-cui (Apache ServiceComb)"
+    Due to improper sanitization of user input on Windows, the static file handler
+    allows for directory traversal, allowing an attacker to read files outside of
+    the target directory that the server has permission to read.
+credit: '@little-cui (Apache ServiceComb)'
 symbols:
   - common.static
 os:
   - windows
 links:
-  pr: https://github.com/labstack/echo/pull/1718
-  commit: https://github.com/labstack/echo/commit/4422e3b66b9fd498ed1ae1d0242d660d0ed3faaa
+    pr: https://github.com/labstack/echo/pull/1718
+    commit: https://github.com/labstack/echo/commit/4422e3b66b9fd498ed1ae1d0242d660d0ed3faaa
diff --git a/reports/GO-2021-0052.yaml b/reports/GO-2021-0052.yaml
index f1f2b20..402815e 100644
--- a/reports/GO-2021-0052.yaml
+++ b/reports/GO-2021-0052.yaml
@@ -1,17 +1,17 @@
 module: github.com/gin-gonic/gin
-description: |
-  Due to improper HTTP header santization, a malicious user can spoof their
-  source IP address by setting the X-Forwarded-For header. This may allow
-  a user to bypass IP based restrictions, or obfuscate their true source.
-cves:
-  - CVE-2020-28483
-credit: "@sorenh"
-symbols:
-  - Context.ClientIP
 versions:
   - fixed: v1.6.3-0.20210406033725-bfc8ca285eb4
+description: |
+    Due to improper HTTP header santization, a malicious user can spoof their
+    source IP address by setting the X-Forwarded-For header. This may allow
+    a user to bypass IP based restrictions, or obfuscate their true source.
+cves:
+  - CVE-2020-28483
+credit: '@sorenh'
+symbols:
+  - Context.ClientIP
 links:
-  commit: https://github.com/gin-gonic/gin/commit/bfc8ca285eb46dad60e037d57c545cd260636711
-  pr: https://github.com/gin-gonic/gin/pull/2632
-  context:
-    - https://github.com/gin-gonic/gin/pull/2474
+    pr: https://github.com/gin-gonic/gin/pull/2632
+    commit: https://github.com/gin-gonic/gin/commit/bfc8ca285eb46dad60e037d57c545cd260636711
+    context:
+      - https://github.com/gin-gonic/gin/pull/2474
diff --git a/reports/GO-2021-0053.yaml b/reports/GO-2021-0053.yaml
index 3c3ee99..af6e6e1 100644
--- a/reports/GO-2021-0053.yaml
+++ b/reports/GO-2021-0053.yaml
@@ -2,10 +2,10 @@
 versions:
   - fixed: v1.3.2
 description: |
-  Due to improper bounds checking, maliciously crafted input to generated
-  Unmarshal methods can cause an out-of-bounds panic. If parsing messages
-  from untrusted parties, this may be used as a denial of service vector.
+    Due to improper bounds checking, maliciously crafted input to generated
+    Unmarshal methods can cause an out-of-bounds panic. If parsing messages
+    from untrusted parties, this may be used as a denial of service vector.
 cves:
   - CVE-2021-3121
 links:
-  commit: https://github.com/gogo/protobuf/commit/b03c65ea87cdc3521ede29f62fe3ce239267c1bc
+    commit: https://github.com/gogo/protobuf/commit/b03c65ea87cdc3521ede29f62fe3ce239267c1bc
diff --git a/reports/GO-2021-0054.yaml b/reports/GO-2021-0054.yaml
index 6bbb699..3ff1eee 100644
--- a/reports/GO-2021-0054.yaml
+++ b/reports/GO-2021-0054.yaml
@@ -2,15 +2,15 @@
 versions:
   - fixed: v1.6.6
 description: |
-  Due to improper bounds checking, maliciously crafted JSON objects
-  can cause an out-of-bounds panic. If parsing user input, this may
-  be used as a denial of service vector.
+    Due to improper bounds checking, maliciously crafted JSON objects
+    can cause an out-of-bounds panic. If parsing user input, this may
+    be used as a denial of service vector.
 cves:
   - CVE-2020-36067
-credit: "@toptotu"
+credit: '@toptotu'
 symbols:
   - unwrap
 links:
-  commit: https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b
-  context:
-    - https://github.com/tidwall/gjson/issues/196
+    commit: https://github.com/tidwall/gjson/commit/bf4efcb3c18d1825b2988603dea5909140a5302b
+    context:
+      - https://github.com/tidwall/gjson/issues/196
diff --git a/reports/GO-2021-0056.yaml b/reports/GO-2021-0056.yaml
index e01f66d..c781c2b 100644
--- a/reports/GO-2021-0056.yaml
+++ b/reports/GO-2021-0056.yaml
@@ -3,15 +3,15 @@
 versions:
   - fixed: v0.0.0-20201214082111-324b1c886b40
 description: |
-  Due to the behavior of encoding/xml, a crafted XML document may cause
-  XML Digital Signature validation to be entirely bypassed, causing an
-  unsigned document to appear signed.
+    Due to the behavior of encoding/xml, a crafted XML document may cause
+    XML Digital Signature validation to be entirely bypassed, causing an
+    unsigned document to appear signed.
 cves:
   - CVE-2020-15216
 credit: Juho Nurminen (Mattermost)
 symbols:
   - provider.HandlePOST
 links:
-  commit: https://github.com/dexidp/dex/commit/324b1c886b407594196113a3dbddebe38eecd4e8
-  context:
-    - https://github.com/dexidp/dex/security/advisories/GHSA-m9hp-7r99-94h5
+    commit: https://github.com/dexidp/dex/commit/324b1c886b407594196113a3dbddebe38eecd4e8
+    context:
+      - https://github.com/dexidp/dex/security/advisories/GHSA-m9hp-7r99-94h5
diff --git a/reports/GO-2021-0057.yaml b/reports/GO-2021-0057.yaml
index bc2d900..8b5601e 100644
--- a/reports/GO-2021-0057.yaml
+++ b/reports/GO-2021-0057.yaml
@@ -2,16 +2,16 @@
 versions:
   - fixed: v1.1.1
 description: |
-  Due to improper bounds checking, maliciously crafted JSON objects
-  can cause an out-of-bounds panic. If parsing user input, this may
-  be used as a denial of service vector.
+    Due to improper bounds checking, maliciously crafted JSON objects
+    can cause an out-of-bounds panic. If parsing user input, this may
+    be used as a denial of service vector.
 cves:
   - CVE-2020-35381
-credit: "@toptotu"
+credit: '@toptotu'
 symbols:
   - searchKeys
 links:
-  pr: https://github.com/buger/jsonparser/pull/221
-  commit: https://github.com/buger/jsonparser/commit/df3ea76ece10095374fd1c9a22a4fb85a44efc42
-  context:
-    - https://github.com/buger/jsonparser/issues/219
+    pr: https://github.com/buger/jsonparser/pull/221
+    commit: https://github.com/buger/jsonparser/commit/df3ea76ece10095374fd1c9a22a4fb85a44efc42
+    context:
+      - https://github.com/buger/jsonparser/issues/219
diff --git a/reports/GO-2021-0058.yaml b/reports/GO-2021-0058.yaml
index fbdf88f..e1bba12 100644
--- a/reports/GO-2021-0058.yaml
+++ b/reports/GO-2021-0058.yaml
@@ -11,9 +11,9 @@
 versions:
   - fixed: v0.4.3
 description: |
-  Due to the behavior of encoding/xml, a crafted XML document may cause
-  XML Digital Signature validation to be entirely bypassed, causing an
-  unsigned document to appear signed.
+    Due to the behavior of encoding/xml, a crafted XML document may cause
+    XML Digital Signature validation to be entirely bypassed, causing an
+    unsigned document to appear signed.
 cves:
   - CVE-2020-27846
 symbols:
@@ -22,6 +22,6 @@
   - ServiceProvider.ValidateLogoutResponseForm
   - ServiceProvider.ValidateLogoutResponseRedirect
 links:
-  commit: https://github.com/crewjam/saml/commit/da4f1a0612c0a8dd0452cf8b3c7a6518f6b4d053
-  context:
-    - https://github.com/crewjam/saml/security/advisories/GHSA-4hq8-gmxx-h6w9
+    commit: https://github.com/crewjam/saml/commit/da4f1a0612c0a8dd0452cf8b3c7a6518f6b4d053
+    context:
+      - https://github.com/crewjam/saml/security/advisories/GHSA-4hq8-gmxx-h6w9
diff --git a/reports/GO-2021-0059.yaml b/reports/GO-2021-0059.yaml
index cf8bea5..99209e5 100644
--- a/reports/GO-2021-0059.yaml
+++ b/reports/GO-2021-0059.yaml
@@ -2,15 +2,15 @@
 versions:
   - fixed: v1.6.4
 description: |
-  Due to improper bounds checking, maliciously crafted JSON objects
-  can cause an out-of-bounds panic. If parsing user input, this may
-  be used as a denial of service vector.
+    Due to improper bounds checking, maliciously crafted JSON objects
+    can cause an out-of-bounds panic. If parsing user input, this may
+    be used as a denial of service vector.
 cves:
   - CVE-2020-35380
-credit: "@toptotu"
+credit: '@toptotu'
 symbols:
   - sqaush
 links:
-  commit: https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc
-  context:
-    - https://github.com/tidwall/gjson/issues/192
+    commit: https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc
+    context:
+      - https://github.com/tidwall/gjson/issues/192
diff --git a/reports/GO-2021-0060.yaml b/reports/GO-2021-0060.yaml
index 8696462..b39584e 100644
--- a/reports/GO-2021-0060.yaml
+++ b/reports/GO-2021-0060.yaml
@@ -2,15 +2,15 @@
 versions:
   - fixed: v0.6.0
 description: |
-  Due to the behavior of encoding/xml, a crafted XML document may cause
-  XML Digital Signature validation to be entirely bypassed, causing an
-  unsigned document to appear signed.
+    Due to the behavior of encoding/xml, a crafted XML document may cause
+    XML Digital Signature validation to be entirely bypassed, causing an
+    unsigned document to appear signed.
 cves:
   - CVE-2020-29509
 credit: Juho Nurminen
 symbols:
   - parseResponse
 links:
-  commit: https://github.com/russellhaering/gosaml2/commit/42606dafba60c58c458f14f75c4c230459672ab9
-  context:
-    - https://github.com/russellhaering/gosaml2/security/advisories/GHSA-xhqq-x44f-9fgg
+    commit: https://github.com/russellhaering/gosaml2/commit/42606dafba60c58c458f14f75c4c230459672ab9
+    context:
+      - https://github.com/russellhaering/gosaml2/security/advisories/GHSA-xhqq-x44f-9fgg
diff --git a/reports/GO-2021-0061.yaml b/reports/GO-2021-0061.yaml
index c390f1b..0f19a35 100644
--- a/reports/GO-2021-0061.yaml
+++ b/reports/GO-2021-0061.yaml
@@ -1,19 +1,17 @@
 module: gopkg.in/yaml.v2
 additional_packages:
-  # all of the incompatible versions of github.com/go-yaml/yaml
-  # are affected
   - module: github.com/go-yaml/yaml
     symbols:
       - decoder.unmarshal
 versions:
   - fixed: v2.2.3
 description: |
-  Due to unbounded alias chasing, a maliciously crafted YAML file
-  can cause the system to consume significant system resources. If
-  parsing user input, this may be used as a denial of service vector.
-credit: "@simonferquel"
+    Due to unbounded alias chasing, a maliciously crafted YAML file
+    can cause the system to consume significant system resources. If
+    parsing user input, this may be used as a denial of service vector.
+credit: '@simonferquel'
 symbols:
   - decoder.unmarshal
 links:
-  pr: https://github.com/go-yaml/yaml/pull/375
-  commit: https://github.com/go-yaml/yaml/commit/bb4e33bf68bf89cad44d386192cbed201f35b241
+    pr: https://github.com/go-yaml/yaml/pull/375
+    commit: https://github.com/go-yaml/yaml/commit/bb4e33bf68bf89cad44d386192cbed201f35b241
diff --git a/reports/GO-2021-0063.yaml b/reports/GO-2021-0063.yaml
index d784e26..97fe073 100644
--- a/reports/GO-2021-0063.yaml
+++ b/reports/GO-2021-0063.yaml
@@ -3,14 +3,14 @@
 versions:
   - fixed: v1.9.25
 description: |
-  Due to a nil pointer dereference, a malicously crafted RPC message
-  can cause a panic. If handling RPC messages from untrusted clients,
-  this may be used as a denial of service vector.
+    Due to a nil pointer dereference, a malicously crafted RPC message
+    can cause a panic. If handling RPC messages from untrusted clients,
+    this may be used as a denial of service vector.
 cves:
   - CVE-2020-26264
-credit: "@zsfelfoldi"
+credit: '@zsfelfoldi'
 symbols:
   - serverHandler.handleMsg
 links:
-  pr: https://github.com/ethereum/go-ethereum/pull/21896
-  commit: https://github.com/ethereum/go-ethereum/commit/bddd103a9f0af27ef533f04e06ea429cf76b6d46
+    pr: https://github.com/ethereum/go-ethereum/pull/21896
+    commit: https://github.com/ethereum/go-ethereum/commit/bddd103a9f0af27ef533f04e06ea429cf76b6d46
diff --git a/reports/GO-2021-0064.yaml b/reports/GO-2021-0064.yaml
index b4fdab2..5da2922 100644
--- a/reports/GO-2021-0064.yaml
+++ b/reports/GO-2021-0064.yaml
@@ -10,15 +10,15 @@
 versions:
   - fixed: v0.20.0-alpha.2
 description: |
-  Authorization tokens may be inappropriately logged if the verbosity
-  level is set to a debug level.
+    Authorization tokens may be inappropriately logged if the verbosity
+    level is set to a debug level.
 cves:
   - CVE-2020-8565
-credit: "@sfowl"
+credit: '@sfowl'
 symbols:
   - requestInfo.toCurl
 links:
-  pr: https://github.com/kubernetes/kubernetes/pull/95316
-  commit: https://github.com/kubernetes/kubernetes/commit/e99df0e5a75eb6e86123b56d53e9b7ca0fd00419
-  context:
-    - https://github.com/kubernetes/kubernetes/issues/95623
+    pr: https://github.com/kubernetes/kubernetes/pull/95316
+    commit: https://github.com/kubernetes/kubernetes/commit/e99df0e5a75eb6e86123b56d53e9b7ca0fd00419
+    context:
+      - https://github.com/kubernetes/kubernetes/issues/95623
diff --git a/reports/GO-2021-0065.yaml b/reports/GO-2021-0065.yaml
index 049a6ba..bc044a3 100644
--- a/reports/GO-2021-0065.yaml
+++ b/reports/GO-2021-0065.yaml
@@ -10,14 +10,14 @@
 versions:
   - fixed: v0.17.0
 description: |
-  Authorization tokens may be inappropriately logged if the verbosity
-  level is set to a debug level.
+    Authorization tokens may be inappropriately logged if the verbosity
+    level is set to a debug level.
 cves:
   - CVE-2019-11250
 symbols:
   - debuggingRoundTripper.RoundTrip
 links:
-  pr: https://github.com/kubernetes/kubernetes/pull/81330
-  commit: https://github.com/kubernetes/kubernetes/commit/4441f1d9c3e94d9a3d93b4f184a591cab02a5245
-  context:
-    - https://github.com/kubernetes/kubernetes/issues/81114
+    pr: https://github.com/kubernetes/kubernetes/pull/81330
+    commit: https://github.com/kubernetes/kubernetes/commit/4441f1d9c3e94d9a3d93b4f184a591cab02a5245
+    context:
+      - https://github.com/kubernetes/kubernetes/issues/81114
diff --git a/reports/GO-2021-0066.yaml b/reports/GO-2021-0066.yaml
index 3661234..df884eb 100644
--- a/reports/GO-2021-0066.yaml
+++ b/reports/GO-2021-0066.yaml
@@ -3,16 +3,16 @@
 versions:
   - fixed: v1.20.0-alpha.1
 description: |
-  Attempting to read a malformed .dockercfg may cause secrets to be
-  inappropriately logged.
+    Attempting to read a malformed .dockercfg may cause secrets to be
+    inappropriately logged.
 cves:
   - CVE-2020-8564
-credit: "@sfowl"
+credit: '@sfowl'
 symbols:
   - readDockerConfigFileFromBytes
   - readDockerConfigJSONFileFromBytes
 links:
-  pr: https://github.com/kubernetes/kubernetes/pull/94712
-  commit: https://github.com/kubernetes/kubernetes/commit/11793434dac97a49bfed0150b56ac63e5dc34634
-  context:
-    - https://github.com/kubernetes/kubernetes/issues/95622
+    pr: https://github.com/kubernetes/kubernetes/pull/94712
+    commit: https://github.com/kubernetes/kubernetes/commit/11793434dac97a49bfed0150b56ac63e5dc34634
+    context:
+      - https://github.com/kubernetes/kubernetes/issues/95622
diff --git a/reports/GO-2021-0067.yaml b/reports/GO-2021-0067.yaml
index 1e120d0..2d0e179 100644
--- a/reports/GO-2021-0067.yaml
+++ b/reports/GO-2021-0067.yaml
@@ -4,16 +4,16 @@
   - introduced: go1.16
     fixed: go1.16.1
 description: |
-  Using Reader.Open on an archive containing a file with a path
-  prefixed by "../" will cause a panic due to a stack overflow.
-  If parsing user supplied archives, this may be used as a
-  denial of service vector.
+    Using Reader.Open on an archive containing a file with a path
+    prefixed by "../" will cause a panic due to a stack overflow.
+    If parsing user supplied archives, this may be used as a
+    denial of service vector.
 cves:
   - CVE-2021-27919
 symbols:
   - toValidName
 links:
-  pr: https://go-review.googlesource.com/c/go/+/300489
-  commit: https://go.googlesource.com/go/+/cd3b4ca9f20fd14187ed4cdfdee1a02ea87e5cd8
-  context:
-    - https://go.dev/issue/44916
+    pr: https://go-review.googlesource.com/c/go/+/300489
+    commit: https://go.googlesource.com/go/+/cd3b4ca9f20fd14187ed4cdfdee1a02ea87e5cd8
+    context:
+      - https://go.dev/issue/44916
diff --git a/reports/GO-2021-0068.yaml b/reports/GO-2021-0068.yaml
index 233a62d..5702bf1 100644
--- a/reports/GO-2021-0068.yaml
+++ b/reports/GO-2021-0068.yaml
@@ -5,18 +5,18 @@
   - fixed: go1.14.14
   - fixed: go1.15.7
 description: |
-  The go command may execute arbitrary code at build time when using cgo on Windows.
-  This can be triggered by running go get on a malicious module, or any other time
-  the code is built.
+    The go command may execute arbitrary code at build time when using cgo on Windows.
+    This can be triggered by running go get on a malicious module, or any other time
+    the code is built.
 cves:
   - CVE-2021-3115
 credit: RyotaK
 os:
   - windows
 links:
-  pr: https://go.dev/cl/284783
-  commit: https://go.googlesource.com/go/+/953d1feca9b21af075ad5fc8a3dad096d3ccc3a0
-  context:
-    - https://go.dev/issue/43783
-    - https://go.dev/cl/284780
-    - https://go.googlesource.com/go/+/46e2e2e9d99925bbf724b12693c6d3e27a95d6a0
+    pr: https://go.dev/cl/284783
+    commit: https://go.googlesource.com/go/+/953d1feca9b21af075ad5fc8a3dad096d3ccc3a0
+    context:
+      - https://go.dev/issue/43783
+      - https://go.dev/cl/284780
+      - https://go.googlesource.com/go/+/46e2e2e9d99925bbf724b12693c6d3e27a95d6a0
diff --git a/reports/GO-2021-0069.yaml b/reports/GO-2021-0069.yaml
index ee5bf98..799c7c6 100644
--- a/reports/GO-2021-0069.yaml
+++ b/reports/GO-2021-0069.yaml
@@ -6,14 +6,14 @@
   - introduced: go1.15
     fixed: go1.15.5
 description: |
-  A number of math/big.Int methods can panic when provided large inputs due
-  to a flawed division method.
+    A number of math/big.Int methods can panic when provided large inputs due
+    to a flawed division method.
 cves:
   - CVE-2020-28362
 symbols:
   - nat.divRecursiveStep
 links:
-  pr: https://go-review.googlesource.com/c/go/+/269657
-  commit: https://go.googlesource.com/go/+/1e1fa5903b760c6714ba17e50bf850b01f49135c
-  context:
-    - https://go.dev/issue/42552
+    pr: https://go-review.googlesource.com/c/go/+/269657
+    commit: https://go.googlesource.com/go/+/1e1fa5903b760c6714ba17e50bf850b01f49135c
+    context:
+      - https://go.dev/issue/42552
diff --git a/reports/GO-2021-0070.yaml b/reports/GO-2021-0070.yaml
index 46e3605..aaece4b 100644
--- a/reports/GO-2021-0070.yaml
+++ b/reports/GO-2021-0070.yaml
@@ -3,19 +3,19 @@
 versions:
   - fixed: v0.1.0
 description: |
-  GetExecUser in the github.com/opencontainers/runc/libcontainer/user package will
-  improperly interpret numeric UIDs as usernames. If the method is used without
-  verifying that usernames are formatted as expected, it may allow a user to
-  gain unexpected privileges.
+    GetExecUser in the github.com/opencontainers/runc/libcontainer/user package will
+    improperly interpret numeric UIDs as usernames. If the method is used without
+    verifying that usernames are formatted as expected, it may allow a user to
+    gain unexpected privileges.
 cves:
   - CVE-2016-3697
 symbols:
   - GetExecUser
 links:
-  pr: https://github.com/opencontainers/runc/pull/708
-  commit: https://github.com/opencontainers/runc/commit/69af385de62ea68e2e608335cffbb0f4aa3db091
-  context:
-    - https://github.com/docker/docker/issues/21436
-    - http://rhn.redhat.com/errata/RHSA-2016-1034.html
-    - http://rhn.redhat.com/errata/RHSA-2016-2634.html
-    - https://security.gentoo.org/glsa/201612-28
+    pr: https://github.com/opencontainers/runc/pull/708
+    commit: https://github.com/opencontainers/runc/commit/69af385de62ea68e2e608335cffbb0f4aa3db091
+    context:
+      - https://github.com/docker/docker/issues/21436
+      - http://rhn.redhat.com/errata/RHSA-2016-1034.html
+      - http://rhn.redhat.com/errata/RHSA-2016-2634.html
+      - https://security.gentoo.org/glsa/201612-28
diff --git a/reports/GO-2021-0071.yaml b/reports/GO-2021-0071.yaml
index 9cd5a99..69191d9 100644
--- a/reports/GO-2021-0071.yaml
+++ b/reports/GO-2021-0071.yaml
@@ -3,17 +3,17 @@
 versions:
   - fixed: v0.0.0-20151004155856-19c6961cc101
 description: |
-  A race between chown and chmod operations during a container
-  filesystem shift may allow a user who can modify the filesystem to
-  chmod an arbitrary path of their choice, rather than the expected
-  path.
+    A race between chown and chmod operations during a container
+    filesystem shift may allow a user who can modify the filesystem to
+    chmod an arbitrary path of their choice, rather than the expected
+    path.
 cves:
   - CVE-2015-1340
 credit: Seth Arnold
 symbols:
   - IdmapSet.doUidshiftIntoContainer
 links:
-  pr: https://github.com/lxc/lxd/pull/1189
-  commit: https://github.com/lxc/lxd/commit/19c6961cc1012c8a529f20807328a9357f5034f4
-  context:
-    - https://bugs.launchpad.net/ubuntu/+source/lxd/+bug/1502270
+    pr: https://github.com/lxc/lxd/pull/1189
+    commit: https://github.com/lxc/lxd/commit/19c6961cc1012c8a529f20807328a9357f5034f4
+    context:
+      - https://bugs.launchpad.net/ubuntu/+source/lxd/+bug/1502270
diff --git a/reports/GO-2021-0072.yaml b/reports/GO-2021-0072.yaml
index fa65447..2720a2e 100644
--- a/reports/GO-2021-0072.yaml
+++ b/reports/GO-2021-0072.yaml
@@ -10,16 +10,16 @@
 versions:
   - fixed: v2.7.0-rc.0+incompatible
 description: |
-  Various storage methods do not impose limits on how much content is accepted
-  from user requests, allowing a malicious user to force the caller to allocate
-  an arbitrary amount of memory.
+    Various storage methods do not impose limits on how much content is accepted
+    from user requests, allowing a malicious user to force the caller to allocate
+    an arbitrary amount of memory.
 cves:
   - CVE-2017-11468
 symbols:
   - copyFullPayload
 links:
-  pr: https://github.com/distribution/distribution/pull/2340
-  commit: https://github.com/distribution/distribution/commit/91c507a39abfce14b5c8541cf284330e22208c0f
-  context:
-    - https://access.redhat.com/errata/RHSA-2017:2603
-    - http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00047.html
+    pr: https://github.com/distribution/distribution/pull/2340
+    commit: https://github.com/distribution/distribution/commit/91c507a39abfce14b5c8541cf284330e22208c0f
+    context:
+      - https://access.redhat.com/errata/RHSA-2017:2603
+      - http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00047.html
diff --git a/reports/GO-2021-0073.yaml b/reports/GO-2021-0073.yaml
index ce372c2..94418c4 100644
--- a/reports/GO-2021-0073.yaml
+++ b/reports/GO-2021-0073.yaml
@@ -3,17 +3,17 @@
 versions:
   - fixed: v2.1.1-0.20170519163204-f913f5f9c7c6+incompatible
 description: |
-  Arbitrary command execution can be triggered by improperly
-  sanitized SSH URLs in LFS configuration files. This can be
-  triggered by cloning a malicious repository.
+    Arbitrary command execution can be triggered by improperly
+    sanitized SSH URLs in LFS configuration files. This can be
+    triggered by cloning a malicious repository.
 cves:
   - CVE-2017-17831
 symbols:
   - sshGetLFSExeAndArgs
 links:
-  pr: https://github.com/git-lfs/git-lfs/pull/2241
-  commit: https://github.com/git-lfs/git-lfs/commit/f913f5f9c7c6d1301785fdf9884a2942d59cdf19
-  context:
-    - http://blog.recurity-labs.com/2017-08-10/scm-vulns
-    - https://confluence.atlassian.com/sourcetreekb/sourcetree-security-advisory-2018-01-24-942834324.html
-    - http://www.securityfocus.com/bid/102926
+    pr: https://github.com/git-lfs/git-lfs/pull/2241
+    commit: https://github.com/git-lfs/git-lfs/commit/f913f5f9c7c6d1301785fdf9884a2942d59cdf19
+    context:
+      - http://blog.recurity-labs.com/2017-08-10/scm-vulns
+      - https://confluence.atlassian.com/sourcetreekb/sourcetree-security-advisory-2018-01-24-942834324.html
+      - http://www.securityfocus.com/bid/102926
diff --git a/reports/GO-2021-0075.yaml b/reports/GO-2021-0075.yaml
index b190072..56433ae 100644
--- a/reports/GO-2021-0075.yaml
+++ b/reports/GO-2021-0075.yaml
@@ -3,14 +3,14 @@
 versions:
   - fixed: v1.8.11
 description: |
-  Due to improper argument validation in RPC messages, a maliciously crafted
-  message can cause a panic, leading to denial of service.
+    Due to improper argument validation in RPC messages, a maliciously crafted
+    message can cause a panic, leading to denial of service.
 cves:
   - CVE-2018-12018
 symbols:
   - protocolManager.handleMsg
 links:
-  pr: https://github.com/ethereum/go-ethereum/pull/16891
-  commit: https://github.com/ethereum/go-ethereum/commit/a5237a27eaf81946a3edb4fafe13ed6359d119e4
-  context:
-    - https://peckshield.com/2018/06/27/EPoD/
+    pr: https://github.com/ethereum/go-ethereum/pull/16891
+    commit: https://github.com/ethereum/go-ethereum/commit/a5237a27eaf81946a3edb4fafe13ed6359d119e4
+    context:
+      - https://peckshield.com/2018/06/27/EPoD/
diff --git a/reports/GO-2021-0076.yaml b/reports/GO-2021-0076.yaml
index 9c6d954..b64c5a0 100644
--- a/reports/GO-2021-0076.yaml
+++ b/reports/GO-2021-0076.yaml
@@ -2,13 +2,13 @@
 versions:
   - fixed: v0.5.2
 description: |
-  A malicious JSON patch can cause a panic due to an out-of-bounds
-  write attempt. This can be used as a denial of service vector if
-  exposed to arbitrary user input.
+    A malicious JSON patch can cause a panic due to an out-of-bounds
+    write attempt. This can be used as a denial of service vector if
+    exposed to arbitrary user input.
 cves:
   - CVE-2018-14632
 symbols:
   - partialArray.add
 links:
-  pr: https://github.com/evanphx/json-patch/pull/57
-  commit: https://github.com/evanphx/json-patch/commit/4c9aadca8f89e349c999f04e28199e96e81aba03
+    pr: https://github.com/evanphx/json-patch/pull/57
+    commit: https://github.com/evanphx/json-patch/commit/4c9aadca8f89e349c999f04e28199e96e81aba03
diff --git a/reports/GO-2021-0077.yaml b/reports/GO-2021-0077.yaml
index 9f4aae3..e3f26cb 100644
--- a/reports/GO-2021-0077.yaml
+++ b/reports/GO-2021-0077.yaml
@@ -3,14 +3,14 @@
 versions:
   - fixed: v0.5.0-alpha.5.0.20190108173120-83c051b701d3
 description: |
-  A user can use a valid client certificate that contains a CommonName that matches a
-  valid RBAC username to authenticate themselves as that user, despite lacking the
-  required credentials. This may allow authentication bypass, but requires a certificate
-  that is issued by a CA trusted by the server.
+    A user can use a valid client certificate that contains a CommonName that matches a
+    valid RBAC username to authenticate themselves as that user, despite lacking the
+    required credentials. This may allow authentication bypass, but requires a certificate
+    that is issued by a CA trusted by the server.
 cves:
   - CVE-2018-16886
 symbols:
   - authStore.AuthInfoFromTLS
 links:
-  pr: https://github.com/etcd-io/etcd/pull/10366
-  commit: https://github.com/etcd-io/etcd/commit/bf9d0d8291dc71ecbfb2690612954e1a298154b2
+    pr: https://github.com/etcd-io/etcd/pull/10366
+    commit: https://github.com/etcd-io/etcd/commit/bf9d0d8291dc71ecbfb2690612954e1a298154b2
diff --git a/reports/GO-2021-0078.yaml b/reports/GO-2021-0078.yaml
index 3aeed72..c16393b 100644
--- a/reports/GO-2021-0078.yaml
+++ b/reports/GO-2021-0078.yaml
@@ -3,9 +3,9 @@
 versions:
   - fixed: v0.0.0-20180816102801-aaf60122140d
 description: |
-  The HTML parser does not properly handle "in frameset" insertion mode, and can be made
-  to panic when operating on malformed HTML that contains <template> tags. If operating
-  on user input, this may be a vector for a denial of service attack.
+    The HTML parser does not properly handle "in frameset" insertion mode, and can be made
+    to panic when operating on malformed HTML that contains <template> tags. If operating
+    on user input, this may be a vector for a denial of service attack.
 cves:
   - CVE-2018-17075
 credit: Kunpei Sakai
@@ -13,9 +13,9 @@
   - inBodyIM
   - inFramesetIM
 links:
-  pr: https://go-review.googlesource.com/123776
-  commit: https://go.googlesource.com/net/+/aaf60122140d3fcf75376d319f0554393160eb50
-  context:
-    - https://go.dev/issue/27016
-    - https://bugs.chromium.org/p/chromium/issues/detail?id=829668
-    - https://go-review.googlesource.com/c/net/+/94838/9/html/parse.go#1906
+    pr: https://go-review.googlesource.com/123776
+    commit: https://go.googlesource.com/net/+/aaf60122140d3fcf75376d319f0554393160eb50
+    context:
+      - https://go.dev/issue/27016
+      - https://bugs.chromium.org/p/chromium/issues/detail?id=829668
+      - https://go-review.googlesource.com/c/net/+/94838/9/html/parse.go#1906
diff --git a/reports/GO-2021-0079.yaml b/reports/GO-2021-0079.yaml
index 9a5ee9d..1a9dfc4 100644
--- a/reports/GO-2021-0079.yaml
+++ b/reports/GO-2021-0079.yaml
@@ -3,15 +3,15 @@
 versions:
   - fixed: v1.0.4-0.20180831054840-1ac3c8ac4f2b
 description: |
-  A malformed query can cause an out-of-bounds panic due to improper
-  validation of arguments. If processing queries from untrusted
-  parties, this may be used as a vector for denial of service
-  attacks.
+    A malformed query can cause an out-of-bounds panic due to improper
+    validation of arguments. If processing queries from untrusted
+    parties, this may be used as a vector for denial of service
+    attacks.
 cves:
   - CVE-2018-18206
-credit: "@yahtoo"
+credit: '@yahtoo'
 symbols:
   - Network.checkTopicRegister
 links:
-  pr: https://github.com/Bytom/bytom/pull/1307
-  commit: https://github.com/Bytom/bytom/commit/1ac3c8ac4f2b1e1df9675228290bda6b9586ba42
+    pr: https://github.com/Bytom/bytom/pull/1307
+    commit: https://github.com/Bytom/bytom/commit/1ac3c8ac4f2b1e1df9675228290bda6b9586ba42
diff --git a/reports/GO-2021-0081.yaml b/reports/GO-2021-0081.yaml
index c772927..9a5ee7a 100644
--- a/reports/GO-2021-0081.yaml
+++ b/reports/GO-2021-0081.yaml
@@ -3,16 +3,16 @@
 versions:
   - fixed: v2.0.2-0.20190802080134-634605d06e73+incompatible
 description: |
-  The HTTP client used to connect to the container registry authorization
-  service explicitly disables TLS verification, allowing an attacker that
-  is able to MITM the connection to steal credentials.
+    The HTTP client used to connect to the container registry authorization
+    service explicitly disables TLS verification, allowing an attacker that
+    is able to MITM the connection to steal credentials.
 cves:
   - CVE-2019-10214
 symbols:
   - dockerClient.getBearerToken
 links:
-  pr: https://github.com/containers/image/pull/669
-  commit: https://github.com/containers/image/commit/634605d06e738aec8332bcfd69162e7509ac7aaf
-  context:
-    - https://github.com/containers/image/issues/654
-    - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10214
+    pr: https://github.com/containers/image/pull/669
+    commit: https://github.com/containers/image/commit/634605d06e738aec8332bcfd69162e7509ac7aaf
+    context:
+      - https://github.com/containers/image/issues/654
+      - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10214
diff --git a/reports/GO-2021-0082.yaml b/reports/GO-2021-0082.yaml
index 7472eab..df4ae6a 100644
--- a/reports/GO-2021-0082.yaml
+++ b/reports/GO-2021-0082.yaml
@@ -3,14 +3,14 @@
 versions:
   - fixed: v0.31.1-0.20200311080807-483ed864d69f
 description: |
-  Thirft Servers preallocate memory for the declared size of messages before
-  checking the actual size of the message. This allows a malicious user to
-  send messages that declare that they are significantly larger than they
-  actually are, allowing them to force the server to allocate significant
-  amounts of memory. This can be used as a denial of service vector.
+    Thirft Servers preallocate memory for the declared size of messages before
+    checking the actual size of the message. This allows a malicious user to
+    send messages that declare that they are significantly larger than they
+    actually are, allowing them to force the server to allocate significant
+    amounts of memory. This can be used as a denial of service vector.
 cves:
   - CVE-2019-11939
 links:
-  commit: https://github.com/facebook/fbthrift/commit/483ed864d69f307e9e3b9dadec048216100c0757
-  context:
-    - https://www.facebook.com/security/advisories/cve-2019-11939
+    commit: https://github.com/facebook/fbthrift/commit/483ed864d69f307e9e3b9dadec048216100c0757
+    context:
+      - https://www.facebook.com/security/advisories/cve-2019-11939
diff --git a/reports/GO-2021-0083.yaml b/reports/GO-2021-0083.yaml
index 13f86d0..64e848e 100644
--- a/reports/GO-2021-0083.yaml
+++ b/reports/GO-2021-0083.yaml
@@ -3,14 +3,14 @@
 versions:
   - fixed: v1.12.1-0.20190521122906-c1aa4f867846
 description: |
-  TLS certificate verification is skipped when connecting to a MQTT server.
-  This allows an attacker who can MITM the connection to read, or forge,
-  messages passed between the client and server.
+    TLS certificate verification is skipped when connecting to a MQTT server.
+    This allows an attacker who can MITM the connection to read, or forge,
+    messages passed between the client and server.
 cves:
   - CVE-2019-12496
 symbols:
   - Adaptor.newTLSConfig
 links:
-  commit: https://github.com/hybridgroup/gobot/commit/c1aa4f867846da4669ecf3bc3318bd96b7ee6f3f
-  context:
-    - https://github.com/hybridgroup/gobot/releases/tag/v1.13.0
+    commit: https://github.com/hybridgroup/gobot/commit/c1aa4f867846da4669ecf3bc3318bd96b7ee6f3f
+    context:
+      - https://github.com/hybridgroup/gobot/releases/tag/v1.13.0
diff --git a/reports/GO-2021-0084.yaml b/reports/GO-2021-0084.yaml
index 35a9d2e..f284e27 100644
--- a/reports/GO-2021-0084.yaml
+++ b/reports/GO-2021-0084.yaml
@@ -3,16 +3,16 @@
 versions:
   - fixed: v1.12.2-0.20200613154013-bac2b31afecc
 description: |
-  Session data is stored using permissive permissions, allowing local users
-  with filesystem access to read arbitrary data.
+    Session data is stored using permissive permissions, allowing local users
+    with filesystem access to read arbitrary data.
 cves:
   - CVE-2019-16354
-credit: "@nicowaisman"
+credit: '@nicowaisman'
 symbols:
   - FileProvider.SessionRead
   - FileProvider.SessionRegenerate
 links:
-  pr: https://github.com/beego/beego/pull/3975
-  commit: https://github.com/beego/beego/commit/bac2b31afecc65d9a89f9e473b8006c5edc0c8d1
-  context:
-    - https://github.com/beego/beego/issues/3763
+    pr: https://github.com/beego/beego/pull/3975
+    commit: https://github.com/beego/beego/commit/bac2b31afecc65d9a89f9e473b8006c5edc0c8d1
+    context:
+      - https://github.com/beego/beego/issues/3763
diff --git a/reports/GO-2021-0085.yaml b/reports/GO-2021-0085.yaml
index 0b8d301..eb149c3 100644
--- a/reports/GO-2021-0085.yaml
+++ b/reports/GO-2021-0085.yaml
@@ -8,13 +8,13 @@
 versions:
   - fixed: v1.0.0-rc8.0.20190930145003-cad42f6e0932
 description: |
-  AppArmor restrictions may be bypassed due to improper validation of mount
-  targets, allowing a malicious image to mount volumes over e.g. /proc.
+    AppArmor restrictions may be bypassed due to improper validation of mount
+    targets, allowing a malicious image to mount volumes over e.g. /proc.
 cves:
   - CVE-2019-16884
 credit: Leopold Schabel
 links:
-  pr: https://github.com/opencontainers/runc/pull/2130
-  commit: https://github.com/opencontainers/runc/commit/cad42f6e0932db0ce08c3a3d9e89e6063ec283e4
-  context:
-    - https://github.com/opencontainers/runc/issues/2128
+    pr: https://github.com/opencontainers/runc/pull/2130
+    commit: https://github.com/opencontainers/runc/commit/cad42f6e0932db0ce08c3a3d9e89e6063ec283e4
+    context:
+      - https://github.com/opencontainers/runc/issues/2128
diff --git a/reports/GO-2021-0086.yaml b/reports/GO-2021-0086.yaml
index 8f30be9..b2eaa72 100644
--- a/reports/GO-2021-0086.yaml
+++ b/reports/GO-2021-0086.yaml
@@ -3,11 +3,11 @@
 versions:
   - fixed: v1.76.3-0.20191119114751-a4384210d4d0
 description: |
-  HTML content in markdown is not santized during rendering, possibly allowing
-  XSS if used to render untrusted user input.
+    HTML content in markdown is not santized during rendering, possibly allowing
+    XSS if used to render untrusted user input.
 cves:
   - CVE-2019-19619
 symbols:
   - Provider.Render
 links:
-  commit: https://github.com/documize/community/commit/a4384210d4d0d6b18e6fdb7e155de96d4a1cf9f3
+    commit: https://github.com/documize/community/commit/a4384210d4d0d6b18e6fdb7e155de96d4a1cf9f3
diff --git a/reports/GO-2021-0087.yaml b/reports/GO-2021-0087.yaml
index ff19dcd..0ed1902 100644
--- a/reports/GO-2021-0087.yaml
+++ b/reports/GO-2021-0087.yaml
@@ -3,16 +3,16 @@
 versions:
   - fixed: v1.0.0-rc9.0.20200122160610-2fc03cc11c77
 description: |
-  A race while mounting volumes allows a possible symlink-exchange
-  attack, allowing a user whom can start multiple containers with
-  custom volume mount configurations to escape the container.
+    A race while mounting volumes allows a possible symlink-exchange
+    attack, allowing a user whom can start multiple containers with
+    custom volume mount configurations to escape the container.
 cves:
   - CVE-2019-19921
 credit: Leopold Schabel
 symbols:
   - mountToRootfs
 links:
-  pr: https://github.com/opencontainers/runc/pull/2207
-  commit: https://github.com/opencontainers/runc/commit/2fc03cc11c775b7a8b2e48d7ee447cb9bef32ad0
-  context:
-    - https://github.com/opencontainers/runc/issues/2197
+    pr: https://github.com/opencontainers/runc/pull/2207
+    commit: https://github.com/opencontainers/runc/commit/2fc03cc11c775b7a8b2e48d7ee447cb9bef32ad0
+    context:
+      - https://github.com/opencontainers/runc/issues/2197
diff --git a/reports/GO-2021-0088.yaml b/reports/GO-2021-0088.yaml
index e1c6a46..211bce1 100644
--- a/reports/GO-2021-0088.yaml
+++ b/reports/GO-2021-0088.yaml
@@ -3,15 +3,15 @@
 versions:
   - fixed: v0.31.1-0.20190225164308-c461c1bd1a3e
 description: |
-  Skip ignores unknown fields, rather than failing. A malicious user can craft small
-  messages with unknown fields which can take significant resources to parse. If a
-  server accepts messages from an untrusted user, it may be used as a denial of service
-  vector.
+    Skip ignores unknown fields, rather than failing. A malicious user can craft small
+    messages with unknown fields which can take significant resources to parse. If a
+    server accepts messages from an untrusted user, it may be used as a denial of service
+    vector.
 cves:
   - CVE-2019-3564
 symbols:
   - Skip
 links:
-  commit: https://github.com/facebook/fbthrift/commit/c461c1bd1a3e130b181aa9c854da3030cd4b5156
-  context:
-    - https://www.facebook.com/security/advisories/cve-2019-3564
+    commit: https://github.com/facebook/fbthrift/commit/c461c1bd1a3e130b181aa9c854da3030cd4b5156
+    context:
+      - https://www.facebook.com/security/advisories/cve-2019-3564
diff --git a/reports/GO-2021-0089.yaml b/reports/GO-2021-0089.yaml
index caeee99..3868443 100644
--- a/reports/GO-2021-0089.yaml
+++ b/reports/GO-2021-0089.yaml
@@ -2,16 +2,16 @@
 versions:
   - fixed: v0.0.0-20200321185410-91ac96899e49
 description: |
-  Parsing malformed JSON which contain opening brackets, but not closing brackets,
-  leads to an infinite loop. If operating on untrusted user input this can be
-  used as a denial of service vector.
+    Parsing malformed JSON which contain opening brackets, but not closing brackets,
+    leads to an infinite loop. If operating on untrusted user input this can be
+    used as a denial of service vector.
 cves:
   - CVE-2020-10675
 credit: Cong Wang
 symbols:
   - findKeyStart
 links:
-  pr: https://github.com/buger/jsonparser/pull/192
-  commit: https://github.com/buger/jsonparser/commit/91ac96899e492584984ded0c8f9a08f10b473717
-  context:
-    - https://github.com/buger/jsonparser/issues/188
+    pr: https://github.com/buger/jsonparser/pull/192
+    commit: https://github.com/buger/jsonparser/commit/91ac96899e492584984ded0c8f9a08f10b473717
+    context:
+      - https://github.com/buger/jsonparser/issues/188
diff --git a/reports/GO-2021-0090.yaml b/reports/GO-2021-0090.yaml
index 9f58875..eaf75ef 100644
--- a/reports/GO-2021-0090.yaml
+++ b/reports/GO-2021-0090.yaml
@@ -4,16 +4,16 @@
   - introduced: v0.33.0
     fixed: v0.34.0-dev1.0.20200702134149-480b995a3172
 description: |
-  Proposed commits may contain signatures for blocks not contained within the commit. Instead of skipping
-  these signatures, they cause failure during verification. A malicious proposer can use this to force
-  consensus failures.
+    Proposed commits may contain signatures for blocks not contained within the commit. Instead of skipping
+    these signatures, they cause failure during verification. A malicious proposer can use this to force
+    consensus failures.
 cves:
   - CVE-2020-15091
 credit: Neeraj Murarka
 symbols:
   - VoteSet.MakeCommit
 links:
-  pr: https://github.com/tendermint/tendermint/pull/5426
-  commit: https://github.com/tendermint/tendermint/commit/480b995a31727593f58b361af979054d17d84340
-  context:
-    - https://github.com/tendermint/tendermint/issues/4926
+    pr: https://github.com/tendermint/tendermint/pull/5426
+    commit: https://github.com/tendermint/tendermint/commit/480b995a31727593f58b361af979054d17d84340
+    context:
+      - https://github.com/tendermint/tendermint/issues/4926
diff --git a/reports/GO-2021-0091.yaml b/reports/GO-2021-0091.yaml
index f929af9..6e23cb1 100644
--- a/reports/GO-2021-0091.yaml
+++ b/reports/GO-2021-0091.yaml
@@ -2,16 +2,16 @@
 versions:
   - fixed: v1.12.6-0.20200710202935-a8ad5454363f
 description: |
-  Due to improper input validation when uploading a file, a malicious user may
-  force the server to return arbitrary HTTP headers when the uploaded
-  file is downloaded.
+    Due to improper input validation when uploading a file, a malicious user may
+    force the server to return arbitrary HTTP headers when the uploaded
+    file is downloaded.
 cves:
   - CVE-2020-15111
 credit: Hasibul Hasan and Abdullah Shaleh
 symbols:
   - Ctx.Attachment
 links:
-  pr: github.com/gofiber/fiber/pull/579
-  commit: https://github.com/gofiber/fiber/commit/a8ad5454363f627c3f9469c56c5faaf1b943f06a
-  context:
-    - https://github.com/gofiber/fiber/security/advisories/GHSA-9cx9-x2gp-9qvh
+    pr: github.com/gofiber/fiber/pull/579
+    commit: https://github.com/gofiber/fiber/commit/a8ad5454363f627c3f9469c56c5faaf1b943f06a
+    context:
+      - https://github.com/gofiber/fiber/security/advisories/GHSA-9cx9-x2gp-9qvh
diff --git a/reports/GO-2021-0092.yaml b/reports/GO-2021-0092.yaml
index 46cfa47..08dea9e 100644
--- a/reports/GO-2021-0092.yaml
+++ b/reports/GO-2021-0092.yaml
@@ -2,13 +2,13 @@
 versions:
   - fixed: v0.31.0
 description: |
-  Uniqueness of JWT IDs (jti) are not checked, allowing the JWT to be
-  replayed.
+    Uniqueness of JWT IDs (jti) are not checked, allowing the JWT to be
+    replayed.
 cves:
   - CVE-2020-15222
 symbols:
   - Fosite.AuthenticateClient
 links:
-  commit: https://github.com/ory/fosite/commit/0c9e0f6d654913ad57c507dd9a36631e1858a3e9
-  context:
-    - https://github.com/ory/fosite/security/advisories/GHSA-v3q9-2p3m-7g43
+    commit: https://github.com/ory/fosite/commit/0c9e0f6d654913ad57c507dd9a36631e1858a3e9
+    context:
+      - https://github.com/ory/fosite/security/advisories/GHSA-v3q9-2p3m-7g43
diff --git a/reports/GO-2021-0094.yaml b/reports/GO-2021-0094.yaml
index db90638..e353dd7 100644
--- a/reports/GO-2021-0094.yaml
+++ b/reports/GO-2021-0094.yaml
@@ -2,18 +2,18 @@
 versions:
   - fixed: v0.5.0
 description: |
-  Protections against directory traversal during archive extraction can be
-  bypassed by chaining multiple symbolic links within the archive. This allows
-  a malicious attacker to cause files to be created outside of the target
-  directory. Additionally if the attacker is able to read extracted files
-  they may create symbolic links to arbitrary files on the system which the
-  unpacker has permissions to read.
+    Protections against directory traversal during archive extraction can be
+    bypassed by chaining multiple symbolic links within the archive. This allows
+    a malicious attacker to cause files to be created outside of the target
+    directory. Additionally if the attacker is able to read extracted files
+    they may create symbolic links to arbitrary files on the system which the
+    unpacker has permissions to read.
 cves:
   - CVE-2020-29529
 symbols:
   - Unpack
 links:
-  pr: https://github.com/hashicorp/go-slug/pull/12
-  commit: https://github.com/hashicorp/go-slug/commit/28cafc59c8da6126a3ae94dfa84181df4073454f
-  context:
-    - https://securitylab.github.com/advisories/GHSL-2020-262-zipslip-go-slug
+    pr: https://github.com/hashicorp/go-slug/pull/12
+    commit: https://github.com/hashicorp/go-slug/commit/28cafc59c8da6126a3ae94dfa84181df4073454f
+    context:
+      - https://securitylab.github.com/advisories/GHSL-2020-262-zipslip-go-slug
diff --git a/reports/GO-2021-0095.yaml b/reports/GO-2021-0095.yaml
index a5b1072..9000916 100644
--- a/reports/GO-2021-0095.yaml
+++ b/reports/GO-2021-0095.yaml
@@ -3,16 +3,16 @@
 versions:
   - fixed: v0.3.0
 description: |
-  Due to repeated usage of a XOR key an attacker that can eavesdrop on the TPM 1.2 transport
-  is able to calculate usageAuth for keys created using CreateWrapKey, despite it being encrypted,
-  allowing them to use the created key.
+    Due to repeated usage of a XOR key an attacker that can eavesdrop on the TPM 1.2 transport
+    is able to calculate usageAuth for keys created using CreateWrapKey, despite it being encrypted,
+    allowing them to use the created key.
 cves:
   - CVE-2020-8918
 credit: Chris Fenner
 symbols:
   - CreateWrapKey
 links:
-  pr: https://github.com/google/go-tpm/pull/195
-  commit: https://github.com/google/go-tpm/commit/d7806cce857a1a020190c03348e5361725d8f141
-  context:
-    - https://github.com/google/go-tpm/security/advisories/GHSA-5x29-3hr9-6wpw
+    pr: https://github.com/google/go-tpm/pull/195
+    commit: https://github.com/google/go-tpm/commit/d7806cce857a1a020190c03348e5361725d8f141
+    context:
+      - https://github.com/google/go-tpm/security/advisories/GHSA-5x29-3hr9-6wpw
diff --git a/reports/GO-2021-0096.yaml b/reports/GO-2021-0096.yaml
index ad656b4..79c045b 100644
--- a/reports/GO-2021-0096.yaml
+++ b/reports/GO-2021-0096.yaml
@@ -2,11 +2,11 @@
 versions:
   - fixed: v0.1.1
 description: |
-  Due to improper setting of finalizers, memory passed to C may be freed before it is used,
-  leading to crashes due to memory corruption or possible code execution.
+    Due to improper setting of finalizers, memory passed to C may be freed before it is used,
+    leading to crashes due to memory corruption or possible code execution.
 cves:
   - CVE-2020-8945
 credit: Ulrich Obergfell
 links:
-  pr: https://github.com/proglottis/gpgme/pull/23
-  commit: https://github.com/proglottis/gpgme/commit/92153bcb59bd2f511e502262c46c7bd660e21733
+    pr: https://github.com/proglottis/gpgme/pull/23
+    commit: https://github.com/proglottis/gpgme/commit/92153bcb59bd2f511e502262c46c7bd660e21733
diff --git a/reports/GO-2021-0097.yaml b/reports/GO-2021-0097.yaml
index 98b69a9..430ae9a 100644
--- a/reports/GO-2021-0097.yaml
+++ b/reports/GO-2021-0097.yaml
@@ -2,23 +2,23 @@
 versions:
   - fixed: v0.0.0-20201120070457-d52dcb253c63
 description: |
-  Due to improper bounds checking, a number of methods can trigger a panic due to attempted
-  out-of-bounds reads. If the package is used to parse user supplied input, this may be
-  used as a vector for a denial of service attack.
+    Due to improper bounds checking, a number of methods can trigger a panic due to attempted
+    out-of-bounds reads. If the package is used to parse user supplied input, this may be
+    used as a vector for a denial of service attack.
 cves:
   - CVE-2020-29242
   - CVE-2020-29243
   - CVE-2020-29244
   - CVE-2020-29245
-credit: "@Jayl1n"
+credit: '@Jayl1n'
 symbols:
   - readPICFrame
   - readAPICFrame
   - readTextWithDescrFrame
   - readAtomData
 links:
-  commit: https://github.com/dhowden/tag/commit/d52dcb253c63a153632bfee5f269dd411dcd8e96
-  context:
-    - https://github.com/dhowden/tag/commit/a92213460e4838490ce3066ef11dc823cdc1740e
-    - https://github.com/dhowden/tag/commit/4b595ed4fac79f467594aa92f8953f90f817116e
-    - https://github.com/dhowden/tag/commit/6b18201aa5c5535511802ddfb4e4117686b4866d
+    commit: https://github.com/dhowden/tag/commit/d52dcb253c63a153632bfee5f269dd411dcd8e96
+    context:
+      - https://github.com/dhowden/tag/commit/a92213460e4838490ce3066ef11dc823cdc1740e
+      - https://github.com/dhowden/tag/commit/4b595ed4fac79f467594aa92f8953f90f817116e
+      - https://github.com/dhowden/tag/commit/6b18201aa5c5535511802ddfb4e4117686b4866d
diff --git a/reports/GO-2021-0098.yaml b/reports/GO-2021-0098.yaml
index 6ed99fa..29c2617 100644
--- a/reports/GO-2021-0098.yaml
+++ b/reports/GO-2021-0098.yaml
@@ -23,16 +23,16 @@
 versions:
   - fixed: v1.5.1-0.20210113180018-fc664697ed2c
 description: |
-  Due to the standard library behavior of exec.LookPath on Windows a number of methods may
-  result in arbitrary code execution when cloning or operating on untrusted Git repositories.
+    Due to the standard library behavior of exec.LookPath on Windows a number of methods may
+    result in arbitrary code execution when cloning or operating on untrusted Git repositories.
 cves:
   - CVE-2021-21237
-credit: "@Ry0taK"
+credit: '@Ry0taK'
 symbols:
   - PipeCommand
 os:
   - windows
 links:
-  commit: https://github.com/git-lfs/git-lfs/commit/fc664697ed2c2081ee9633010de0a7f9debea72a
-  context:
-    - https://github.com/git-lfs/git-lfs/security/advisories/GHSA-cx3w-xqmc-84g5
+    commit: https://github.com/git-lfs/git-lfs/commit/fc664697ed2c2081ee9633010de0a7f9debea72a
+    context:
+      - https://github.com/git-lfs/git-lfs/security/advisories/GHSA-cx3w-xqmc-84g5
diff --git a/reports/GO-2021-0099.yaml b/reports/GO-2021-0099.yaml
index f060230..2a2a58c 100644
--- a/reports/GO-2021-0099.yaml
+++ b/reports/GO-2021-0099.yaml
@@ -3,15 +3,15 @@
 versions:
   - fixed: v0.9.0
 description: |
-  Due to improper path validation, using the github.com/deislabs/oras/pkg/content.FileStore
-  content store may result in directory traversal during archive extraction, allowing a
-  malicious archive to write paths to arbitrary paths that the process can write to.
+    Due to improper path validation, using the github.com/deislabs/oras/pkg/content.FileStore
+    content store may result in directory traversal during archive extraction, allowing a
+    malicious archive to write paths to arbitrary paths that the process can write to.
 cves:
   - CVE-2021-21272
 credit: Chris Smowton
 symbols:
   - extractTarDirectory
 links:
-  commit: https://github.com/deislabs/oras/commit/96cd90423303f1bb42bd043cb4c36085e6e91e8e
-  context:
-    - https://github.com/deislabs/oras/security/advisories/GHSA-g5v4-5x39-vwhx
+    commit: https://github.com/deislabs/oras/commit/96cd90423303f1bb42bd043cb4c36085e6e91e8e
+    context:
+      - https://github.com/deislabs/oras/security/advisories/GHSA-g5v4-5x39-vwhx
diff --git a/reports/GO-2021-0100.yaml b/reports/GO-2021-0100.yaml
index 836e22d..fbdb8aa 100644
--- a/reports/GO-2021-0100.yaml
+++ b/reports/GO-2021-0100.yaml
@@ -3,18 +3,18 @@
 versions:
   - fixed: v1.28.1
 description: |
-  Due to a goroutine deadlock, using github.com/containers/storage/pkg/archive.DecompressStream
-  on a xz archive returns a reader which will hang indefinitely when Close is called. An attacker
-  can use this to cause denial of service if they are able to cause the caller to attempt to
-  decompress an archive they control.
+    Due to a goroutine deadlock, using github.com/containers/storage/pkg/archive.DecompressStream
+    on a xz archive returns a reader which will hang indefinitely when Close is called. An attacker
+    can use this to cause denial of service if they are able to cause the caller to attempt to
+    decompress an archive they control.
 cves:
   - CVE-2021-20291
 credit: Aviv Sasson (Palo Alto Networks)
 symbols:
   - cmdStream
 links:
-  commit: https://github.com/containers/storage/commit/306fcabc964470e4b3b87a43a8f6b7d698209ee1
-  pr: https://github.com/containers/storage/pull/860
-  context:
-    - https://github.com/advisories/GHSA-7qw8-847f-pggm
-    - https://bugzilla.redhat.com/show_bug.cgi?id=1939485
+    pr: https://github.com/containers/storage/pull/860
+    commit: https://github.com/containers/storage/commit/306fcabc964470e4b3b87a43a8f6b7d698209ee1
+    context:
+      - https://github.com/advisories/GHSA-7qw8-847f-pggm
+      - https://bugzilla.redhat.com/show_bug.cgi?id=1939485
diff --git a/reports/GO-2021-0101.yaml b/reports/GO-2021-0101.yaml
index b7bdd1b..76ee7f3 100644
--- a/reports/GO-2021-0101.yaml
+++ b/reports/GO-2021-0101.yaml
@@ -4,14 +4,14 @@
   - introduced: v0.0.0-20151001171628-53dd39833a08
   - fixed: v0.13.0
 description: |
-  Due to an improper bounds check, parsing maliciously crafted messages can cause panics. If
-  this package is used to parse untrusted input, this may be used as a vector for a denial of
-  service attack.
+    Due to an improper bounds check, parsing maliciously crafted messages can cause panics. If
+    this package is used to parse untrusted input, this may be used as a vector for a denial of
+    service attack.
 cves:
   - CVE-2019-0210
 symbols:
   - TSimpleJSONProtocol.safePeekContains
 links:
-  commit: https://github.com/apache/thrift/commit/264a3f318ed3e9e51573f67f963c8509786bcec2
-  context:
-    - https://github.com/advisories/GHSA-jq7p-26h5-w78r
+    commit: https://github.com/apache/thrift/commit/264a3f318ed3e9e51573f67f963c8509786bcec2
+    context:
+      - https://github.com/advisories/GHSA-jq7p-26h5-w78r
diff --git a/reports/GO-2021-0102.yaml b/reports/GO-2021-0102.yaml
index 80c3b34..a54178d 100644
--- a/reports/GO-2021-0102.yaml
+++ b/reports/GO-2021-0102.yaml
@@ -10,15 +10,15 @@
 versions:
   - fixed: v0.0.0-20191101214924-b1b5c44e050f
 description: |
-  Due to improper input validation, a maliciously crafted input can cause a panic, due to incorrect
-  nonce size. If this package is used to decrypt user supplied messages without checking the size of
-  supplied nonces, this may be used as a vector for a denial of service attack.
+    Due to improper input validation, a maliciously crafted input can cause a panic, due to incorrect
+    nonce size. If this package is used to decrypt user supplied messages without checking the size of
+    supplied nonces, this may be used as a vector for a denial of service attack.
 cves:
   - CVE-2019-11289
 symbols:
   - AesGCM.Decrypt
 links:
-  commit: https://github.com/cloudfoundry/gorouter/commit/b1b5c44e050f73b399b379ca63a42a2c5780a83f
-  context:
-    - https://github.com/advisories/GHSA-5796-p3m6-9qj4
-    - https://www.cloudfoundry.org/blog/cve-2019-11289/
+    commit: https://github.com/cloudfoundry/gorouter/commit/b1b5c44e050f73b399b379ca63a42a2c5780a83f
+    context:
+      - https://github.com/advisories/GHSA-5796-p3m6-9qj4
+      - https://www.cloudfoundry.org/blog/cve-2019-11289/
diff --git a/reports/GO-2021-0103.yaml b/reports/GO-2021-0103.yaml
index 097e8dd..1a7252c 100644
--- a/reports/GO-2021-0103.yaml
+++ b/reports/GO-2021-0103.yaml
@@ -3,16 +3,16 @@
   - introduced: v0.1.0
   - fixed: v1.1.1
 description: |
-  Due to improper bounds checking, certain mathmatical operations can cause a panic via an
-  out of bounds read. If this package is used to process untrusted user inputs, this may be used
-  as a vector for a denial of service attack.
+    Due to improper bounds checking, certain mathmatical operations can cause a panic via an
+    out of bounds read. If this package is used to process untrusted user inputs, this may be used
+    as a vector for a denial of service attack.
 cves:
   - CVE-2020-26242
 credit: Dima Stebaev
 symbols:
   - udivrem
 links:
-  commit: https://github.com/holiman/uint256/commit/6785da6e3eea403260a5760029e722aa4ff1716d
-  pr: https://github.com/holiman/uint256/pull/80
-  context:
-    - https://github.com/ethereum/go-ethereum/security/advisories/GHSA-jm5c-rv3w-w83m
+    pr: https://github.com/holiman/uint256/pull/80
+    commit: https://github.com/holiman/uint256/commit/6785da6e3eea403260a5760029e722aa4ff1716d
+    context:
+      - https://github.com/ethereum/go-ethereum/security/advisories/GHSA-jm5c-rv3w-w83m
diff --git a/reports/GO-2021-0104.yaml b/reports/GO-2021-0104.yaml
index 9bf9df6..f416ae5 100644
--- a/reports/GO-2021-0104.yaml
+++ b/reports/GO-2021-0104.yaml
@@ -2,18 +2,18 @@
 versions:
   - fixed: v3.0.15
 description: |
-  Due to improper error handling, DTLS connections were not killed when certificate verification
-  failed, causing users who did not check the connection state to continue to use the connection.
-  This could allow allow an attacker which holds the ICE password, but not a valid certificate,
-  to bypass this restriction.
+    Due to improper error handling, DTLS connections were not killed when certificate verification
+    failed, causing users who did not check the connection state to continue to use the connection.
+    This could allow allow an attacker which holds the ICE password, but not a valid certificate,
+    to bypass this restriction.
 cves:
   - CVE-2021-28681
 credit: Gaukas Wang (@Gaukas)
 symbols:
   - DTLSTransport.Start
 links:
-  commit: https://github.com/pion/webrtc/commit/545613dcdeb5dedb01cce94175f40bcbe045df2e
-  pr: https://github.com/pion/webrtc/pull/1709
-  context:
-    - https://github.com/pion/webrtc/issues/1708
-    - https://github.com/advisories/GHSA-74xm-qj29-cq8p
+    pr: https://github.com/pion/webrtc/pull/1709
+    commit: https://github.com/pion/webrtc/commit/545613dcdeb5dedb01cce94175f40bcbe045df2e
+    context:
+      - https://github.com/pion/webrtc/issues/1708
+      - https://github.com/advisories/GHSA-74xm-qj29-cq8p
diff --git a/reports/GO-2021-0105.yaml b/reports/GO-2021-0105.yaml
index c769476..719f2a7 100644
--- a/reports/GO-2021-0105.yaml
+++ b/reports/GO-2021-0105.yaml
@@ -4,15 +4,15 @@
   - introduced: v1.9.4
   - fixed: v1.9.20
 description: |
-  Due to an incorrect state calculation, a specific set of transactions could cause a consensus disagreement,
-  causing users of this package to reject a canonical chain.
+    Due to an incorrect state calculation, a specific set of transactions could cause a consensus disagreement,
+    causing users of this package to reject a canonical chain.
 cves:
   - CVE-2020-26265
 credit: John Youngseok Yang (Software Platform Lab)
 symbols:
   - StateDB.createObject
 links:
-  commit: https://github.com/ethereum/go-ethereum/commit/87c0ba92136a75db0ab2aba1046d4a9860375d6a
-  pr: https://github.com/ethereum/go-ethereum/pull/21080
-  context:
-    - https://github.com/advisories/GHSA-xw37-57qp-9mm4
+    pr: https://github.com/ethereum/go-ethereum/pull/21080
+    commit: https://github.com/ethereum/go-ethereum/commit/87c0ba92136a75db0ab2aba1046d4a9860375d6a
+    context:
+      - https://github.com/advisories/GHSA-xw37-57qp-9mm4
diff --git a/reports/GO-2021-0106.yaml b/reports/GO-2021-0106.yaml
index d65de68..bb53de4 100644
--- a/reports/GO-2021-0106.yaml
+++ b/reports/GO-2021-0106.yaml
@@ -2,12 +2,12 @@
 versions:
   - fixed: v0.0.0-20201201191210-20a61371de5b
 description: |
-  Due to improper path santization, archives containing relative file
-  paths can cause files to be written (or overwritten) outside of the
-  target directory.
+    Due to improper path santization, archives containing relative file
+    paths can cause files to be written (or overwritten) outside of the
+    target directory.
 symbols:
   - Extractor.outputPath
 links:
-  commit: https://github.com/whyrusleeping/tar-utils/commit/20a61371de5b51380bbdb0c7935b30b0625ac227
-  context:
-    - https://snyk.io/research/zip-slip-vulnerability
+    commit: https://github.com/whyrusleeping/tar-utils/commit/20a61371de5b51380bbdb0c7935b30b0625ac227
+    context:
+      - https://snyk.io/research/zip-slip-vulnerability
diff --git a/reports/GO-2021-0107.yaml b/reports/GO-2021-0107.yaml
index 8c8c13c..931c466 100644
--- a/reports/GO-2021-0107.yaml
+++ b/reports/GO-2021-0107.yaml
@@ -2,12 +2,12 @@
 versions:
   - fixed: v1.5.2
 description: |
-  Web Sockets do not execute any AuthenticateMethod methods which may be set, leading to a
-  nil pointer dereference if the returned UserData pointer is assumed to be non-nil, or
-  authentication bypass.
+    Web Sockets do not execute any AuthenticateMethod methods which may be set, leading to a
+    nil pointer dereference if the returned UserData pointer is assumed to be non-nil, or
+    authentication bypass.
 symbols:
   - Server.socketHandler
 links:
-  commit: https://github.com/ecnepsnai/web/commit/5a78f8d5c41ce60dcf9f61aaf47a7a8dc3e0002f
-  context:
-    - https://github.com/advisories/GHSA-5gjg-jgh4-gppm
+    commit: https://github.com/ecnepsnai/web/commit/5a78f8d5c41ce60dcf9f61aaf47a7a8dc3e0002f
+    context:
+      - https://github.com/advisories/GHSA-5gjg-jgh4-gppm
diff --git a/reports/GO-2021-0108.yaml b/reports/GO-2021-0108.yaml
index e9dcd67..8bea79c 100644
--- a/reports/GO-2021-0108.yaml
+++ b/reports/GO-2021-0108.yaml
@@ -2,16 +2,16 @@
 versions:
   - fixed: v1.12.6
 description: |
-  Due to improper input sanitization, a maliciously constructed filename could cause a file
-  download to use an attacker controlled filename, as well as injecting additional headers
-  into an HTTP response.
+    Due to improper input sanitization, a maliciously constructed filename could cause a file
+    download to use an attacker controlled filename, as well as injecting additional headers
+    into an HTTP response.
 cves:
   - CVE-2020-15111
 credit: Hasibul Hasan and Abdullah Shaleh
 symbols:
   - Ctx.Attachment
 links:
-  commit: https://github.com/gofiber/fiber/commit/f698b5d5066cfe594102ae252cd58a1fe57cf56f
-  pr: https://github.com/gofiber/fiber/pull/579
-  context:
-    - https://github.com/advisories/GHSA-9cx9-x2gp-9qvh
+    pr: https://github.com/gofiber/fiber/pull/579
+    commit: https://github.com/gofiber/fiber/commit/f698b5d5066cfe594102ae252cd58a1fe57cf56f
+    context:
+      - https://github.com/advisories/GHSA-9cx9-x2gp-9qvh
diff --git a/reports/GO-2021-0109.yaml b/reports/GO-2021-0109.yaml
index 7bb59d1..5278b6a 100644
--- a/reports/GO-2021-0109.yaml
+++ b/reports/GO-2021-0109.yaml
@@ -2,14 +2,14 @@
 versions:
   - fixed: v0.34.0
 description: |
-  Due to improper error handling, an error with the underlying token storage may cause a user
-  to believe a token has been successfully revoked when it is in fact still valid. An attackers
-  ability to exploit this relies on an ability to trigger errors in the underlying storage.
+    Due to improper error handling, an error with the underlying token storage may cause a user
+    to believe a token has been successfully revoked when it is in fact still valid. An attackers
+    ability to exploit this relies on an ability to trigger errors in the underlying storage.
 cves:
   - CVE-2020-15223
 symbols:
   - TokenRevocationHandler.RevokeToken
 links:
-  commit: https://github.com/ory/fosite/commit/03dd55813f5521985f7dd64277b7ba0cf1441319
-  context:
-    - https://github.com/advisories/GHSA-7mqr-2v3q-v2wm
+    commit: https://github.com/ory/fosite/commit/03dd55813f5521985f7dd64277b7ba0cf1441319
+    context:
+      - https://github.com/advisories/GHSA-7mqr-2v3q-v2wm
diff --git a/reports/GO-2021-0110.yaml b/reports/GO-2021-0110.yaml
index 46cfa47..08dea9e 100644
--- a/reports/GO-2021-0110.yaml
+++ b/reports/GO-2021-0110.yaml
@@ -2,13 +2,13 @@
 versions:
   - fixed: v0.31.0
 description: |
-  Uniqueness of JWT IDs (jti) are not checked, allowing the JWT to be
-  replayed.
+    Uniqueness of JWT IDs (jti) are not checked, allowing the JWT to be
+    replayed.
 cves:
   - CVE-2020-15222
 symbols:
   - Fosite.AuthenticateClient
 links:
-  commit: https://github.com/ory/fosite/commit/0c9e0f6d654913ad57c507dd9a36631e1858a3e9
-  context:
-    - https://github.com/ory/fosite/security/advisories/GHSA-v3q9-2p3m-7g43
+    commit: https://github.com/ory/fosite/commit/0c9e0f6d654913ad57c507dd9a36631e1858a3e9
+    context:
+      - https://github.com/ory/fosite/security/advisories/GHSA-v3q9-2p3m-7g43
diff --git a/reports/GO-2021-0111.yaml b/reports/GO-2021-0111.yaml
index a56e002..93b908d 100644
--- a/reports/GO-2021-0111.yaml
+++ b/reports/GO-2021-0111.yaml
@@ -1,18 +1,18 @@
-module: go.mongodb.org/mongo-driver # there is also a non-canonical import since <v2
+module: go.mongodb.org/mongo-driver
 package: go.mongodb.org/mongo-driver/bson/bsonrw
 versions:
   - fixed: v1.5.1
 description: |
-  Due to improper input sanitization when marshalling Go objects into BSON, a maliciously constructed
-  Go structure could allow an attacker to inject additional fields into a MongoDB document. Users are
-  affected if they use this package to handle untrusted user input.
+    Due to improper input sanitization when marshalling Go objects into BSON, a maliciously constructed
+    Go structure could allow an attacker to inject additional fields into a MongoDB document. Users are
+    affected if they use this package to handle untrusted user input.
 cves:
   - CVE-2021-20329
 symbols:
   - valueWriter.writeElementHeader
 links:
-  commit: https://github.com/mongodb/mongo-go-driver/commit/2aca31d5986a9e1c65a92264736de9fdc3b9b4ca
-  pr: https://github.com/mongodb/mongo-go-driver/pull/622
-  context:
-    - https://github.com/advisories/GHSA-f6mq-5m25-4r72
-    - https://jira.mongodb.org/browse/GODRIVER-1923
+    pr: https://github.com/mongodb/mongo-go-driver/pull/622
+    commit: https://github.com/mongodb/mongo-go-driver/commit/2aca31d5986a9e1c65a92264736de9fdc3b9b4ca
+    context:
+      - https://github.com/advisories/GHSA-f6mq-5m25-4r72
+      - https://jira.mongodb.org/browse/GODRIVER-1923
diff --git a/reports/GO-2021-0112.yaml b/reports/GO-2021-0112.yaml
index befddf1..7d71db9 100644
--- a/reports/GO-2021-0112.yaml
+++ b/reports/GO-2021-0112.yaml
@@ -1,19 +1,19 @@
-module: go.mongodb.org/mongo-driver # there is also a non-canonical import since <v2
+module: go.mongodb.org/mongo-driver
 package: go.mongodb.org/mongo-driver/x/bsonx/bsoncore
 versions:
   - fixed: v1.5.1
 description: |
-  Due to improper input sanitization when marshalling Go objects into BSON, a maliciously constructed
-  Go structure could allow an attacker to inject additional fields into a MongoDB document. Users are
-  affected if they use this package to handle untrusted user input.
+    Due to improper input sanitization when marshalling Go objects into BSON, a maliciously constructed
+    Go structure could allow an attacker to inject additional fields into a MongoDB document. Users are
+    affected if they use this package to handle untrusted user input.
 cves:
   - CVE-2021-20329
 symbols:
   - AppendHeader
   - AppendRegex
 links:
-  commit: https://github.com/mongodb/mongo-go-driver/commit/2aca31d5986a9e1c65a92264736de9fdc3b9b4ca
-  pr: https://github.com/mongodb/mongo-go-driver/pull/622
-  context:
-    - https://github.com/advisories/GHSA-f6mq-5m25-4r72
-    - https://jira.mongodb.org/browse/GODRIVER-1923
+    pr: https://github.com/mongodb/mongo-go-driver/pull/622
+    commit: https://github.com/mongodb/mongo-go-driver/commit/2aca31d5986a9e1c65a92264736de9fdc3b9b4ca
+    context:
+      - https://github.com/advisories/GHSA-f6mq-5m25-4r72
+      - https://jira.mongodb.org/browse/GODRIVER-1923
diff --git a/reports/GO-2021-0113.yaml b/reports/GO-2021-0113.yaml
index 9df798c..e2b4635 100644
--- a/reports/GO-2021-0113.yaml
+++ b/reports/GO-2021-0113.yaml
@@ -3,14 +3,14 @@
 versions:
   - fixed: v0.3.7
 description: |
-  Due to improper index calculation, an incorrectly formatted language tag can cause Parse
-  to panic via an out of bounds read. If Parse is used to process untrusted user inputs,
-  this may be used as a vector for a denial of service attack.
+    Due to improper index calculation, an incorrectly formatted language tag can cause Parse
+    to panic via an out of bounds read. If Parse is used to process untrusted user inputs,
+    this may be used as a vector for a denial of service attack.
 cves:
   - CVE-2021-38561
 credit: Guido Vranken
 symbols:
   - Parse
 links:
-  commit: https://go.googlesource.com/text/+/383b2e75a7a4198c42f8f87833eefb772868a56f
-  pr: https://go-review.googlesource.com/c/text/+/340830
+    pr: https://go-review.googlesource.com/c/text/+/340830
+    commit: https://go.googlesource.com/text/+/383b2e75a7a4198c42f8f87833eefb772868a56f
diff --git a/reports/GO-2021-0140.yaml b/reports/GO-2021-0140.yaml
index a2b0cd1..49d3f3c 100644
--- a/reports/GO-2021-0140.yaml
+++ b/reports/GO-2021-0140.yaml
@@ -4,8 +4,8 @@
   - fixed: go1.13.13
   - fixed: go1.14.5
 description: |
-  X509 Certificate verification does not validate KeyUsages EKU
-  requirements on Windows if VerifyOptions.Roots is nil.
+    X509 Certificate verification does not validate KeyUsages EKU
+    requirements on Windows if VerifyOptions.Roots is nil.
 cves:
   - CVE-2020-14039
 credit: Niall Newman
@@ -14,7 +14,7 @@
 os:
   - windows
 links:
-  pr: https://go.dev/cl/242597
-  commit: https://go.googlesource.com/go/+/82175e699a2e2cd83d3aa34949e9b922d66d52f5
-  context:
-    - https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w
+    pr: https://go.dev/cl/242597
+    commit: https://go.googlesource.com/go/+/82175e699a2e2cd83d3aa34949e9b922d66d52f5
+    context:
+      - https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w
diff --git a/reports/GO-2021-0141.yaml b/reports/GO-2021-0141.yaml
index 5f5da5f..454671f 100644
--- a/reports/GO-2021-0141.yaml
+++ b/reports/GO-2021-0141.yaml
@@ -4,16 +4,16 @@
   - fixed: go1.13.13
   - fixed: go1.14.5
 description: |
-  A Go HTTP server which reads from the request body while
-  simultaneously writing a response can panic when clients
-  send a "Expect: 100-continue" header.
+    A Go HTTP server which reads from the request body while
+    simultaneously writing a response can panic when clients
+    send a "Expect: 100-continue" header.
 cves:
   - CVE-2020-15586
 credit: Mikael Manukyan
 symbols:
   - expectContinueReader.Read
 links:
-  pr: https://go.dev/cl/242598
-  commit: https://go.googlesource.com/go/+/fa98f46741f818913a8c11b877520a548715131f
-  context:
-    - https://go.dev/issue/34902
+    pr: https://go.dev/cl/242598
+    commit: https://go.googlesource.com/go/+/fa98f46741f818913a8c11b877520a548715131f
+    context:
+      - https://go.dev/issue/34902
diff --git a/reports/GO-2021-0157.yaml b/reports/GO-2021-0157.yaml
index 9657244..a8056ec 100644
--- a/reports/GO-2021-0157.yaml
+++ b/reports/GO-2021-0157.yaml
@@ -1,19 +1,19 @@
 module: std
 package: net/textproto
 versions:
-- fixed: go1.4.3
+  - fixed: go1.4.3
 description: |
-  The MIME header parser treated spaces and hyphens
-  as equivalent, which can permit HTTP request smuggling.
+    The MIME header parser treated spaces and hyphens
+    as equivalent, which can permit HTTP request smuggling.
 published: 2022-01-05T20:00:00Z
 cves:
-- CVE-2015-5739
+  - CVE-2015-5739
 credit: Régis Leroy
 symbols:
-- CanonicalMIMEHeaderKey
-- canonicalMIMEHeaderKey
+  - CanonicalMIMEHeaderKey
+  - canonicalMIMEHeaderKey
 links:
-  pr: https://go.dev/cl/11772
-  commit: https://go.googlesource.com/go/+/117ddcb83d7f42d6aa72241240af99ded81118e9
-  context:
-  - https://groups.google.com/g/golang-announce/c/iSIyW4lM4hY/m/ADuQR4DiDwAJ
+    pr: https://go.dev/cl/11772
+    commit: https://go.googlesource.com/go/+/117ddcb83d7f42d6aa72241240af99ded81118e9
+    context:
+      - https://groups.google.com/g/golang-announce/c/iSIyW4lM4hY/m/ADuQR4DiDwAJ
diff --git a/reports/GO-2021-0159.yaml b/reports/GO-2021-0159.yaml
index 38a5762..9f2df65 100644
--- a/reports/GO-2021-0159.yaml
+++ b/reports/GO-2021-0159.yaml
@@ -1,34 +1,34 @@
-package: net/http
 module: std
+package: net/http
 versions:
-- fixed: go1.4.3
+  - fixed: go1.4.3
 description: |
-  HTTP headers were not properly parsed, which allows remote attackers to
-  conduct HTTP request smuggling attacks via a request that contains
-  Content-Length and Transfer-Encoding header fields.
+    HTTP headers were not properly parsed, which allows remote attackers to
+    conduct HTTP request smuggling attacks via a request that contains
+    Content-Length and Transfer-Encoding header fields.
 cves:
   - CVE-2015-5739
   - CVE-2015-5740
   - CVE-2015-5741
 credit: Jed Denlea and Régis Leroy
 symbols:
-- CanonicalMIMEHeaderKey
-- body.readLocked
-- canonicalMIMEHeaderKey
-- chunkWriter.writeHeader
-- fixLength
-- fixTransferEncoding
-- readTransfer
-- transferWriter.shouldSendContentLength
-- validHeaderFieldByte
+  - CanonicalMIMEHeaderKey
+  - body.readLocked
+  - canonicalMIMEHeaderKey
+  - chunkWriter.writeHeader
+  - fixLength
+  - fixTransferEncoding
+  - readTransfer
+  - transferWriter.shouldSendContentLength
+  - validHeaderFieldByte
 links:
-  pr: https://go.dev/cl/13148
-  commit: https://go.googlesource.com/go/+/26049f6f9171d1190f3bbe05ec304845cfe6399f
-  context:
-  - https://go.dev/cl/11772
-  - https://go.dev/cl/11810
-  - https://go.dev/cl/12865
-  - https://go.googlesource.com/go/+/117ddcb83d7f42d6aa72241240af99ded81118e9
-  - https://go.googlesource.com/go/+/300d9a21583e7cf0149a778a0611e76ff7c6680f
-  - https://go.googlesource.com/go/+/c2db5f4ccc61ba7df96a747e268a277b802cbb87
-  - https://groups.google.com/g/golang-announce/c/iSIyW4lM4hY/m/ADuQR4DiDwAJ
+    pr: https://go.dev/cl/13148
+    commit: https://go.googlesource.com/go/+/26049f6f9171d1190f3bbe05ec304845cfe6399f
+    context:
+      - https://go.dev/cl/11772
+      - https://go.dev/cl/11810
+      - https://go.dev/cl/12865
+      - https://go.googlesource.com/go/+/117ddcb83d7f42d6aa72241240af99ded81118e9
+      - https://go.googlesource.com/go/+/300d9a21583e7cf0149a778a0611e76ff7c6680f
+      - https://go.googlesource.com/go/+/c2db5f4ccc61ba7df96a747e268a277b802cbb87
+      - https://groups.google.com/g/golang-announce/c/iSIyW4lM4hY/m/ADuQR4DiDwAJ
diff --git a/reports/GO-2021-0160.yaml b/reports/GO-2021-0160.yaml
index 045796f..a6ceaee 100644
--- a/reports/GO-2021-0160.yaml
+++ b/reports/GO-2021-0160.yaml
@@ -4,25 +4,25 @@
   - introduced: go1.5
     fixed: go1.5.3
 description: |
-  Int.Exp Montgomery mishandled carry propagation and produced an incorrect
-  output, which makes it easier for attackers to obtain private RSA keys via
-  unspecified vectors.
+    Int.Exp Montgomery mishandled carry propagation and produced an incorrect
+    output, which makes it easier for attackers to obtain private RSA keys via
+    unspecified vectors.
 
-  This issue can affect RSA computations in crypto/rsa, which is used by
-  crypto/tls. TLS servers on 32-bit systems could plausibly leak their RSA
-  private key due to this issue. Other protocol implementations that create
-  many RSA signatures could also be impacted in the same way.
+    This issue can affect RSA computations in crypto/rsa, which is used by
+    crypto/tls. TLS servers on 32-bit systems could plausibly leak their RSA
+    private key due to this issue. Other protocol implementations that create
+    many RSA signatures could also be impacted in the same way.
 
-  Specifically, incorrect results in one part of the RSA Chinese Remainder
-  computation can cause the result to be incorrect in such a way that it leaks
-  one of the primes. While RSA blinding should prevent an attacker from crafting
-  specific inputs that trigger the bug, on 32-bit systems the bug can be expected
-  to occur at random around one in 2^26 times. Thus collecting around 64 million
-  signatures (of known data) from an affected server should be enough to extract
-  the private key used.
+    Specifically, incorrect results in one part of the RSA Chinese Remainder
+    computation can cause the result to be incorrect in such a way that it leaks
+    one of the primes. While RSA blinding should prevent an attacker from crafting
+    specific inputs that trigger the bug, on 32-bit systems the bug can be expected
+    to occur at random around one in 2^26 times. Thus collecting around 64 million
+    signatures (of known data) from an affected server should be enough to extract
+    the private key used.
 
-  Note that on 64-bit systems, the frequency of the bug is so low
-  (less than one in 2^50) that it would be very difficult to exploit.
+    Note that on 64-bit systems, the frequency of the bug is so low
+    (less than one in 2^50) that it would be very difficult to exploit.
 cves:
   - CVE-2015-8618
 credit: Nick Craig-Wood
@@ -30,10 +30,10 @@
   - nat.expNNMontgomery
   - nat.montgomery
 links:
-  pr: https://go.dev/cl/18491
-  commit: https://go.googlesource.com/go/+/1e066cad1ba23f4064545355b8737e4762dd6838
-  context:
-    - https://go.googlesource.com/go/+/4306352182bf94f86f0cfc6a8b0ed461cbf1d82c
-    - https://go.dev/cl/17672
-    - https://go.dev/issue/13515
-    - https://groups.google.com/g/golang-announce/c/MEATuOi_ei4
+    pr: https://go.dev/cl/18491
+    commit: https://go.googlesource.com/go/+/1e066cad1ba23f4064545355b8737e4762dd6838
+    context:
+      - https://go.googlesource.com/go/+/4306352182bf94f86f0cfc6a8b0ed461cbf1d82c
+      - https://go.dev/cl/17672
+      - https://go.dev/issue/13515
+      - https://groups.google.com/g/golang-announce/c/MEATuOi_ei4
diff --git a/reports/GO-2021-0163.yaml b/reports/GO-2021-0163.yaml
index a59cd16..c4e5653 100644
--- a/reports/GO-2021-0163.yaml
+++ b/reports/GO-2021-0163.yaml
@@ -4,16 +4,16 @@
   - fixed: go1.5.4
   - fixed: go1.6.1
 description: |
-  Untrusted search path vulnerability on Windows related to LoadLibrary allows
-  local users to gain privileges via a malicious DLL in the current working
-  directory.
+    Untrusted search path vulnerability on Windows related to LoadLibrary allows
+    local users to gain privileges via a malicious DLL in the current working
+    directory.
 cves:
   - CVE-2016-3958
 symbols:
   - LoadLibrary
 links:
-  commit: https://go.googlesource.com/go/+/6a0bb87bd0bf0fdf8ddbd35f77a75ebd412f61b0
-  pr: https://go.dev/cl/21428
-  context:
-  - https://go.dev/issue/14959
-  - https://groups.google.com/g/golang-announce/c/9eqIHqaWvck
+    pr: https://go.dev/cl/21428
+    commit: https://go.googlesource.com/go/+/6a0bb87bd0bf0fdf8ddbd35f77a75ebd412f61b0
+    context:
+      - https://go.dev/issue/14959
+      - https://groups.google.com/g/golang-announce/c/9eqIHqaWvck
diff --git a/reports/GO-2021-0225.yaml b/reports/GO-2021-0225.yaml
index 6d14706..4d14669 100644
--- a/reports/GO-2021-0225.yaml
+++ b/reports/GO-2021-0225.yaml
@@ -1,28 +1,28 @@
 module: std
 package: encoding/binary
 versions:
-- fixed: go1.13.15
-- fixed: go1.14.7
+  - fixed: go1.13.15
+  - fixed: go1.14.7
 description: |
-  Certain invalid inputs to ReadUvarint or ReadVarint could cause those
-  functions to read an unlimited number of bytes from the ByteReader argument
-  before returning an error. This could lead to processing more input than
-  expected when the caller is reading directly from a network and depends on
-  ReadUvarint and ReadVarint only consuming a small, bounded number of bytes,
-  even from invalid inputs.
+    Certain invalid inputs to ReadUvarint or ReadVarint could cause those
+    functions to read an unlimited number of bytes from the ByteReader argument
+    before returning an error. This could lead to processing more input than
+    expected when the caller is reading directly from a network and depends on
+    ReadUvarint and ReadVarint only consuming a small, bounded number of bytes,
+    even from invalid inputs.
 
-  With the update, ReadUvarint and ReadVarint now always return after consuming
-  a bounded number of bytes (specifically, MaxVarintLen64, which is 10). The
-  result being returned has not changed; the functions merely detect and return
-  some errors without reading as much input.
+    With the update, ReadUvarint and ReadVarint now always return after consuming
+    a bounded number of bytes (specifically, MaxVarintLen64, which is 10). The
+    result being returned has not changed; the functions merely detect and return
+    some errors without reading as much input.
 cves:
-- CVE-2020-16845
+  - CVE-2020-16845
 credit: Diederik Loerakker, Jonny Rhea, Raúl Kripalani, and Preston Van Loon
 symbols:
-- ReadUvarint
+  - ReadUvarint
 links:
-  pr: https://go.dev/cl/247120
-  commit: https://go.googlesource.com/go/+/027d7241ce050d197e7fabea3d541ffbe3487258
-  context:
-  - https://go.dev/issue/40618
-  - https://groups.google.com/g/golang-announce/c/NyPIaucMgXo
+    pr: https://go.dev/cl/247120
+    commit: https://go.googlesource.com/go/+/027d7241ce050d197e7fabea3d541ffbe3487258
+    context:
+      - https://go.dev/issue/40618
+      - https://groups.google.com/g/golang-announce/c/NyPIaucMgXo
diff --git a/reports/GO-2021-0226.yaml b/reports/GO-2021-0226.yaml
index 5e1016e..bec9077 100644
--- a/reports/GO-2021-0226.yaml
+++ b/reports/GO-2021-0226.yaml
@@ -1,31 +1,31 @@
 module: std
 package: net/http/cgi
 versions:
-- fixed: go1.14.8
-- fixed: go1.15.1
+  - fixed: go1.14.8
+  - fixed: go1.15.1
 description: |
-  When a Handler does not explicitly set the Content-Type header, the the
-  package would default to “text/html”, which could cause a Cross-Site Scripting
-  vulnerability if an attacker can control any part of the contents of a
-  response.
+    When a Handler does not explicitly set the Content-Type header, the the
+    package would default to “text/html”, which could cause a Cross-Site Scripting
+    vulnerability if an attacker can control any part of the contents of a
+    response.
 
-  The Content-Type header is now set based on the contents of the first Write
-  using http.DetectContentType, which is consistent with the behavior of the
-  net/http package.
+    The Content-Type header is now set based on the contents of the first Write
+    using http.DetectContentType, which is consistent with the behavior of the
+    net/http package.
 
-  Although this protects some applications that validate the contents of
-  uploaded files, not setting the Content-Type header explicitly on any
-  attacker-controlled file is unsafe and should be avoided.
+    Although this protects some applications that validate the contents of
+    uploaded files, not setting the Content-Type header explicitly on any
+    attacker-controlled file is unsafe and should be avoided.
 cves:
-- CVE-2020-24553
+  - CVE-2020-24553
 credit: RedTeam Pentesting GmbH
 symbols:
-- response.Write
-- response.WriteHeader
-- response.writeCGIHeader
+  - response.Write
+  - response.WriteHeader
+  - response.writeCGIHeader
 links:
-  pr: https://go.dev/cl/252179
-  commit: https://go.googlesource.com/go/+/4f5cd0c0331943c7ec72df3b827d972584f77833
-  context:
-  - https://groups.google.com/g/golang-announce/c/8wqlSbkLdPs
-  - https://go.dev/issue/40928
+    pr: https://go.dev/cl/252179
+    commit: https://go.googlesource.com/go/+/4f5cd0c0331943c7ec72df3b827d972584f77833
+    context:
+      - https://groups.google.com/g/golang-announce/c/8wqlSbkLdPs
+      - https://go.dev/issue/40928
diff --git a/reports/GO-2021-0228.yaml b/reports/GO-2021-0228.yaml
index 23d6c89..2b7783e 100644
--- a/reports/GO-2021-0228.yaml
+++ b/reports/GO-2021-0228.yaml
@@ -1,20 +1,20 @@
 module: github.com/unknwon/cae
 package: github.com/unknwon/cae/zip
 versions:
-- fixed: v1.0.1
+  - fixed: v1.0.1
 description: |
-  The ExtractTo function doesn't securely escape file paths in zip archives
-  which include leading or non-leading "..". This allows an attacker to add or
-  replace files system-wide.
+    The ExtractTo function doesn't securely escape file paths in zip archives
+    which include leading or non-leading "..". This allows an attacker to add or
+    replace files system-wide.
 cves:
-- CVE-2020-7664
+  - CVE-2020-7664
 credit: Georgios Gkitsas of Snyk Security Team
 symbols:
-- TzArchive.syncFiles
-- TzArchive.ExtractToFunc
-- ZipArchive.Open
-- ZipArchive.ExtractToFunc
+  - TzArchive.syncFiles
+  - TzArchive.ExtractToFunc
+  - ZipArchive.Open
+  - ZipArchive.ExtractToFunc
 links:
-  commit: https://github.com/unknwon/cae/commit/07971c00a1bfd9dc171c3ad0bfab5b67c2287e11
-  context:
-  - https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUNKNWONCAEZIP-570383
+    commit: https://github.com/unknwon/cae/commit/07971c00a1bfd9dc171c3ad0bfab5b67c2287e11
+    context:
+      - https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUNKNWONCAEZIP-570383
diff --git a/reports/GO-2021-0237.yaml b/reports/GO-2021-0237.yaml
index 6d87ac9..4b583eb 100644
--- a/reports/GO-2021-0237.yaml
+++ b/reports/GO-2021-0237.yaml
@@ -1,17 +1,17 @@
 module: github.com/AndrewBurian/powermux
 versions:
-- fixed: v1.1.1
+  - fixed: v1.1.1
 description: |
-  Attackers may be able to craft phishing links and other open
-  redirects by exploiting PowerMux's trailing slash redirection
-  feature.  This may lead to users being redirected to untrusted
-  sites after following an attacker crafted link.
+    Attackers may be able to craft phishing links and other open
+    redirects by exploiting PowerMux's trailing slash redirection
+    feature.  This may lead to users being redirected to untrusted
+    sites after following an attacker crafted link.
 cves:
-- CVE-2021-32721
+  - CVE-2021-32721
 symbols:
-- Route.execute
+  - Route.execute
 links:
-  pr: https://github.com/AndrewBurian/powermux/pull/42
-  commit: https://github.com/AndrewBurian/powermux/commit/5e60a8a0372b35a898796c2697c40e8daabed8e9
-  context:
-  - https://github.com/AndrewBurian/powermux/security/advisories/GHSA-mj9r-wwm8-7q52
+    pr: https://github.com/AndrewBurian/powermux/pull/42
+    commit: https://github.com/AndrewBurian/powermux/commit/5e60a8a0372b35a898796c2697c40e8daabed8e9
+    context:
+      - https://github.com/AndrewBurian/powermux/security/advisories/GHSA-mj9r-wwm8-7q52
diff --git a/reports/GO-2021-0258.yaml b/reports/GO-2021-0258.yaml
index 7cb9aae..ee59322 100644
--- a/reports/GO-2021-0258.yaml
+++ b/reports/GO-2021-0258.yaml
@@ -1,21 +1,21 @@
 module: github.com/pomerium/pomerium
 versions:
-- fixed: v0.15.6
+  - fixed: v0.15.6
 description: |
-  Pomerium is an open source identity-aware access proxy. Changes to the OIDC
-  claims of a user after initial login are not reflected in policy evaluation
-  when using allowed_idp_claims as part of policy. If using allowed_idp_claims
-  and a user's claims are changed, Pomerium can make incorrect authorization
-  decisions.
+    Pomerium is an open source identity-aware access proxy. Changes to the OIDC
+    claims of a user after initial login are not reflected in policy evaluation
+    when using allowed_idp_claims as part of policy. If using allowed_idp_claims
+    and a user's claims are changed, Pomerium can make incorrect authorization
+    decisions.
 
-  For users unable to upgrade clear data on databroker service by clearing
-  redis or restarting the in-memory databroker to force claims to be updated.
+    For users unable to upgrade clear data on databroker service by clearing
+    redis or restarting the in-memory databroker to force claims to be updated.
 cves:
-- CVE-2021-41230
+  - CVE-2021-41230
 symbols:
-- Manager.onUpdateRecords
+  - Manager.onUpdateRecords
 links:
-  pr: https://github.com/pomerium/pomerium/pull/2724
-  commit: https://github.com/pomerium/pomerium/commit/f20542c4bf2cc691e4c324f7ec79e02e46d95511
-  context:
-  - https://github.com/pomerium/pomerium/security/advisories/GHSA-j6wp-3859-vxfg
+    pr: https://github.com/pomerium/pomerium/pull/2724
+    commit: https://github.com/pomerium/pomerium/commit/f20542c4bf2cc691e4c324f7ec79e02e46d95511
+    context:
+      - https://github.com/pomerium/pomerium/security/advisories/GHSA-j6wp-3859-vxfg
diff --git a/reports/GO-2021-0263.yaml b/reports/GO-2021-0263.yaml
index 77d0a51..668bc21 100644
--- a/reports/GO-2021-0263.yaml
+++ b/reports/GO-2021-0263.yaml
@@ -1,21 +1,21 @@
 module: std
 package: debug/macho
 versions:
-- fixed: go1.17.3
-- fixed: go1.16.10
+  - fixed: go1.17.3
+  - fixed: go1.16.10
 description: |
-  Calling File.ImportedSymbols on a loaded file which contains an invalid
-  dynamic symbol table command can cause a panic, in particular if the encoded
-  number of undefined symbols is larger than the number of symbols in the symbol
-  table.
+    Calling File.ImportedSymbols on a loaded file which contains an invalid
+    dynamic symbol table command can cause a panic, in particular if the encoded
+    number of undefined symbols is larger than the number of symbols in the symbol
+    table.
 cves:
-- CVE-2021-41771
+  - CVE-2021-41771
 credit: Burak Çarıkçı - Yunus Yıldırım (CT-Zer0 Crypttech)
 symbols:
-- NewFile
+  - NewFile
 links:
-  pr: https://go.dev/cl/367075
-  commit: https://go.googlesource.com/go/+/61536ec03063b4951163bd09609c86d82631fa27
-  context:
-  - https://groups.google.com/g/golang-announce/c/0fM21h43arc
-  - https://go.dev/issue/48990
+    pr: https://go.dev/cl/367075
+    commit: https://go.googlesource.com/go/+/61536ec03063b4951163bd09609c86d82631fa27
+    context:
+      - https://groups.google.com/g/golang-announce/c/0fM21h43arc
+      - https://go.dev/issue/48990
diff --git a/reports/GO-2021-0264.yaml b/reports/GO-2021-0264.yaml
index dcd5b2b..2742e09 100644
--- a/reports/GO-2021-0264.yaml
+++ b/reports/GO-2021-0264.yaml
@@ -4,30 +4,31 @@
   - fixed: go1.16.10
   - fixed: go1.17.3
 description: |
-  Previously, opening a zip with (*Reader).Open could result in a panic if the
-  zip contained a file whose name was exclusively made up of slash characters or
-  ".." path elements.
+    Previously, opening a zip with (*Reader).Open could result in a panic if the
+    zip contained a file whose name was exclusively made up of slash characters or
+    ".." path elements.
 
-  Open could also panic if passed the empty string directly as an argument.
+    Open could also panic if passed the empty string directly as an argument.
 
-  Now, any files in the zip whose name could not be made valid for fs.FS.Open
-  will be skipped, and no longer added to the fs.FS file list, although they
-  are still accessible through (*Reader).File.
+    Now, any files in the zip whose name could not be made valid for fs.FS.Open
+    will be skipped, and no longer added to the fs.FS file list, although they
+    are still accessible through (*Reader).File.
 
-  Note that it was already the case that a file could be accessible from
-  (*Reader).Open with a name different from the one in (*Reader).File, as the
-  former is the cleaned name, while the latter is the original one.
+    Note that it was already the case that a file could be accessible from
+    (*Reader).Open with a name different from the one in (*Reader).File, as the
+    former is the cleaned name, while the latter is the original one.
 
-  Finally, the actual panic site was made robust as a defense-in-depth measure.
+    Finally, the actual panic site was made robust as a defense-in-depth measure.
 cves:
   - CVE-2021-41772
-credit: Colin Arnott, SiteHost and Noah Santschi-Cooney, Sourcegraph Code Intelligence Team
+credit: Colin Arnott, SiteHost and Noah Santschi-Cooney, Sourcegraph Code Intelligence
+    Team
 symbols:
   - split
   - Reader.Open
 links:
-  pr: https://go.dev/cl/349770
-  commit: https://go.googlesource.com/go/+/b24687394b55a93449e2be4e6892ead58ea9a10f
-  context:
-    - https://groups.google.com/g/golang-announce/c/0fM21h43arc
-    - https://go.dev/issue/48085
+    pr: https://go.dev/cl/349770
+    commit: https://go.googlesource.com/go/+/b24687394b55a93449e2be4e6892ead58ea9a10f
+    context:
+      - https://groups.google.com/g/golang-announce/c/0fM21h43arc
+      - https://go.dev/issue/48085
diff --git a/reports/GO-2021-0265.yaml b/reports/GO-2021-0265.yaml
index 4ac4ac1..6a2fb91 100644
--- a/reports/GO-2021-0265.yaml
+++ b/reports/GO-2021-0265.yaml
@@ -1,15 +1,15 @@
 module: github.com/tidwall/gjson
 versions:
-- fixed: v1.9.3
+  - fixed: v1.9.3
 description: |
-  GJSON allowed a ReDoS (regular expression denial of service) attack.
+    GJSON allowed a ReDoS (regular expression denial of service) attack.
 cves:
-- CVE-2021-42836
+  - CVE-2021-42836
 symbols:
-- match.Match
+  - match.Match
 links:
-  commit: https://github.com/tidwall/gjson/commit/590010fdac311cc8990ef5c97448d4fec8f29944
-  context:
-  - https://github.com/tidwall/gjson/compare/v1.9.2...v1.9.3
-  - https://github.com/tidwall/gjson/issues/236
-  - https://github.com/tidwall/gjson/issues/237
+    commit: https://github.com/tidwall/gjson/commit/590010fdac311cc8990ef5c97448d4fec8f29944
+    context:
+      - https://github.com/tidwall/gjson/compare/v1.9.2...v1.9.3
+      - https://github.com/tidwall/gjson/issues/236
+      - https://github.com/tidwall/gjson/issues/237
diff --git a/reports/GO-2021-0269.yaml b/reports/GO-2021-0269.yaml
index 4e55c15..74b4547 100644
--- a/reports/GO-2021-0269.yaml
+++ b/reports/GO-2021-0269.yaml
@@ -1,31 +1,31 @@
 module: std
 package: net/http/fcgi
 versions:
-- fixed: go1.14.8
-- fixed: go1.15.1
+  - fixed: go1.14.8
+  - fixed: go1.15.1
 description: |
-  When a Handler does not explicitly set the Content-Type header, the the
-  package would default to “text/html”, which could cause a Cross-Site Scripting
-  vulnerability if an attacker can control any part of the contents of a
-  response.
+    When a Handler does not explicitly set the Content-Type header, the the
+    package would default to “text/html”, which could cause a Cross-Site Scripting
+    vulnerability if an attacker can control any part of the contents of a
+    response.
 
-  The Content-Type header is now set based on the contents of the first Write
-  using http.DetectContentType, which is consistent with the behavior of the
-  net/http package.
+    The Content-Type header is now set based on the contents of the first Write
+    using http.DetectContentType, which is consistent with the behavior of the
+    net/http package.
 
-  Although this protects some applications that validate the contents of
-  uploaded files, not setting the Content-Type header explicitly on any
-  attacker-controlled file is unsafe and should be avoided.
+    Although this protects some applications that validate the contents of
+    uploaded files, not setting the Content-Type header explicitly on any
+    attacker-controlled file is unsafe and should be avoided.
 cves:
-- CVE-2020-24553
+  - CVE-2020-24553
 credit: RedTeam Pentesting GmbH
 symbols:
-- response.Write
-- response.WriteHeader
-- response.writeCGIHeader
+  - response.Write
+  - response.WriteHeader
+  - response.writeCGIHeader
 links:
-  pr: https://go.dev/cl/252179
-  commit: https://go.googlesource.com/go/+/4f5cd0c0331943c7ec72df3b827d972584f77833
-  context:
-  - https://groups.google.com/g/golang-announce/c/8wqlSbkLdPs
-  - https://go.dev/issue/40928
+    pr: https://go.dev/cl/252179
+    commit: https://go.googlesource.com/go/+/4f5cd0c0331943c7ec72df3b827d972584f77833
+    context:
+      - https://groups.google.com/g/golang-announce/c/8wqlSbkLdPs
+      - https://go.dev/issue/40928