Bulk process empty affected_range when affected_versions: "All versions"
Problem
There are 135 advisories where affected_range: ""
.
Advisories
% ag -l "affected_range\: \"\"" | pbcopy
pypi/pysha3/CVE-2022-37454.yml
pypi/sqlite-web/CVE-2021-23404.yml
pypi/graphite-web/CVE-2022-4729.yml
pypi/graphite-web/CVE-2022-4728.yml
pypi/graphite-web/CVE-2022-4730.yml
pypi/pymatgen/CVE-2022-42964.yml
pypi/opcua/CVE-2022-25304.yml
pypi/pyRdfa3/CVE-2022-4396.yml
pypi/Flask-User/CVE-2021-23401.yml
pypi/tripleo-ansible/CVE-2022-3101.yml
pypi/tripleo-ansible/CVE-2022-3146.yml
pypi/youtube-dlc/CVE-2023-35934.yml
go/k8s.io/kubernetes/pkg/apis/apps/validation/CVE-2020-8554.yml
go/k8s.io/kubernetes/pkg/kubelet/server/CVE-2020-8554.yml
go/github.com/u-root/u-root/pkg/uzip/CVE-2020-7665.yml
go/github.com/u-root/u-root/pkg/uzip/CVE-2020-7666.yml
go/github.com/u-root/u-root/pkg/uzip/CVE-2020-7669.yml
go/github.com/IBAX-io/go-ibax/CVE-2022-3802.yml
go/github.com/IBAX-io/go-ibax/CVE-2022-3800.yml
go/github.com/IBAX-io/go-ibax/CVE-2022-3801.yml
go/github.com/IBAX-io/go-ibax/CVE-2022-3799.yml
go/github.com/IBAX-io/go-ibax/CVE-2022-3798.yml
go/github.com/containers/podman/CVE-2022-2989.yml
go/github.com/gomarkdown/markdown/CVE-2023-42821.yml
go/github.com/kubernetes/kubelet/CVE-2020-8554.yml
go/github.com/kubernetes/kubernetes/CVE-2020-8554.yml
go/github.com/kubernetes/pkg/kubelet/server/CVE-2020-8554.yml
go/github.com/sylabs/singularity/internal/pkg/runtime/engines/singularity/CVE-2023-30549.yml
packagist/feehi/feehicms/CVE-2022-4014.yml
packagist/phpservermon/phpservermon/CVE-2021-4240.yml
packagist/phpservermon/phpservermon/CVE-2021-4241.yml
packagist/phpwhois/phpwhois/CVE-2021-43698.yml
packagist/grumpydictator/firefly-iii/CVE-2021-3728.yml
packagist/grumpydictator/firefly-iii/CVE-2021-3729.yml
packagist/grumpydictator/firefly-iii/CVE-2021-3730.yml
packagist/dweeves/magmi/CVE-2020-5776.yml
packagist/noumo/easyii/CVE-2022-3772.yml
packagist/noumo/easyii/CVE-2022-3771.yml
conan/jerryscript/CVE-2022-22901.yml
conan/jerryscript/CVE-2021-41959.yml
conan/libsndfile/CVE-2022-33065.yml
npm/tiny-conf/CVE-2020-7724.yml
npm/js-data/CVE-2020-28442.yml
npm/node-ps/CVE-2020-7785.yml
npm/wifey/CVE-2022-25890.yml
npm/mc-kill-port/CVE-2022-25973.yml
npm/promisehelpers/CVE-2020-7723.yml
npm/git-clone/CVE-2022-25900.yml
npm/gammautils/CVE-2020-7718.yml
npm/dot-notes/CVE-2020-7717.yml
npm/geojson2kml/CVE-2020-28429.yml
npm/git-promise/CVE-2022-24376.yml
npm/sds/CVE-2022-25862.yml
npm/vagrant.js/CVE-2022-25962.yml
npm/@pendo324/get-process-by-name/CVE-2022-25644.yml
npm/confucious/CVE-2020-7714.yml
npm/create-choo-app3/CVE-2022-25855.yml
npm/merge-deep2/CVE-2021-23700.yml
npm/is-http2/CVE-2022-25906.yml
npm/Proto/CVE-2021-23426.yml
npm/dat.gui/CVE-2020-7755.yml
npm/deeps/CVE-2020-7716.yml
npm/opus/CVE-2022-25345.yml
npm/keycloak-connect/CVE-2023-0105.yml
npm/keycloak-connect/CVE-2022-1438.yml
npm/keycloak-connect/CVE-2022-4137.yml
npm/keycloak-connect/CVE-2023-0091.yml
npm/keycloak-connect/GMS-2023-578.yml
npm/merge/CVE-2021-23397.yml
npm/corenlp-js-prefab/CVE-2020-28439.yml
npm/calipso/CVE-2021-23391.yml
npm/nodee-utils/CVE-2020-7722.yml
npm/hyperdown/CVE-2022-25849.yml
npm/macfromip/CVE-2020-7786.yml
npm/corenlp-js-interface/CVE-2020-28440.yml
npm/easy-static-server/CVE-2022-25931.yml
npm/spritesheet-js/CVE-2020-7782.yml
npm/keyget/CVE-2021-23760.yml
npm/wc-cmd/CVE-2020-28431.yml
npm/sey/CVE-2021-23663.yml
npm/arr-flatten-unflatten/CVE-2020-7713.yml
npm/n158/CVE-2023-26127.yml
npm/angular/CVE-2022-25869.yml
npm/excalidraw/CVE-2023-26140.yml
npm/dicer/CVE-2022-24434.yml
npm/semver-tags/CVE-2022-25853.yml
npm/lightning-server/CVE-2020-7747.yml
npm/morgan-json/CVE-2022-25921.yml
npm/node-oojs/CVE-2020-7721.yml
npm/comb/CVE-2021-23561.yml
npm/nuance-gulp-build-common/CVE-2020-28430.yml
npm/osm-static-maps/CVE-2020-7749.yml
npm/url-regex/CVE-2022-21195.yml
npm/theme-core/CVE-2020-28432.yml
npm/lite-dev-server/CVE-2022-25895.yml
npm/safe-object2/CVE-2020-7726.yml
npm/deep-get-set/CVE-2020-7715.yml
npm/record-like-deep-assign/CVE-2021-23402.yml
npm/lite-server/CVE-2022-25940.yml
npm/jsen/CVE-2020-7777.yml
npm/flatnest/CVE-2023-26135.yml
npm/mout/CVE-2020-7792.yml
npm/port-killer/CVE-2021-23359.yml
npm/http-server-node/CVE-2021-23797.yml
npm/react-bootstrap-table/CVE-2021-23398.yml
npm/mootools/CVE-2021-23432.yml
npm/djvalidator/CVE-2020-7779.yml
npm/mongo-express/CVE-2021-23372.yml
npm/node-bluetooth-serial-port/CVE-2023-26109.yml
npm/@diez/generation/CVE-2021-32830.yml
npm/libpq/CVE-2022-25852.yml
npm/iniparserjs/CVE-2021-23328.yml
npm/create-choo-electron/CVE-2022-25908.yml
npm/lutils/CVE-2021-23396.yml
npm/progressbar.js/CVE-2023-26133.yml
npm/worksmith/CVE-2020-7725.yml
npm/hummus/CVE-2022-41957.yml
npm/ts-nodash/CVE-2021-23403.yml
npm/x-data-spreadsheet/CVE-2022-25646.yml
npm/scss-tokenizer/CVE-2022-25758.yml
npm/plupload/CVE-2021-23673.yml
npm/hbs/CVE-2021-32822.yml
npm/docker-cli-js/CVE-2021-23732.yml
npm/rangy/CVE-2023-26102.yml
npm/safetydance/CVE-2020-7737.yml
npm/gedi/CVE-2020-7727.yml
npm/startserver/CVE-2021-23430.yml
npm/puppet-facter/CVE-2022-25350.yml
npm/pg-native/CVE-2022-25852.yml
npm/serve-lite/CVE-2022-25847.yml
npm/serve-lite/CVE-2022-21192.yml
npm/react-adal/CVE-2020-7787.yml
npm/kill-process-on-port/CVE-2020-28426.yml
gem/actionpack-page_caching/CVE-2021-22885.yml
gem/smart_proxy_dynflow/CVE-2018-14643.yml
Proposal
For those that also specify affected_versions: "All versions"
specify another token denoting that the range is known.