From a1329404f9b88fdceb4b8a4941f1b8b4129a2c7c Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 26 Jun 2018 14:04:59 -0400 Subject: [PATCH] - Synchronized data. --- 2018/10xxx/CVE-2018-10658.json | 58 +++++++++++++- 2018/10xxx/CVE-2018-10659.json | 58 +++++++++++++- 2018/10xxx/CVE-2018-10660.json | 58 +++++++++++++- 2018/10xxx/CVE-2018-10661.json | 58 +++++++++++++- 2018/10xxx/CVE-2018-10662.json | 58 +++++++++++++- 2018/10xxx/CVE-2018-10663.json | 58 +++++++++++++- 2018/10xxx/CVE-2018-10664.json | 58 +++++++++++++- 2018/11xxx/CVE-2018-11447.json | 2 + 2018/11xxx/CVE-2018-11448.json | 2 + 2018/11xxx/CVE-2018-11449.json | 2 + 2018/1xxx/CVE-2018-1072.json | 135 +++++++++++++++++---------------- 2018/4xxx/CVE-2018-4845.json | 2 + 2018/4xxx/CVE-2018-4846.json | 2 + 2018/4xxx/CVE-2018-4859.json | 2 + 2018/4xxx/CVE-2018-4860.json | 2 + 2018/4xxx/CVE-2018-4861.json | 2 + 16 files changed, 477 insertions(+), 80 deletions(-) diff --git a/2018/10xxx/CVE-2018-10658.json b/2018/10xxx/CVE-2018-10658.json index ae5662703a2..adb22a3366a 100644 --- a/2018/10xxx/CVE-2018-10658.json +++ b/2018/10xxx/CVE-2018-10658.json @@ -2,7 +2,30 @@ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2018-10658", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,38 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "There was a Memory Corruption issue discovered in multiple models of Axis IP Cameras which causes a denial of service (crash). The crash arises from code inside libdbus-send.so shared object or similar." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://blog.vdoo.com/2018/06/18/vdoo-discovers-significant-vulnerabilities-in-axis-cameras/", + "refsource" : "MISC", + "url" : "https://blog.vdoo.com/2018/06/18/vdoo-discovers-significant-vulnerabilities-in-axis-cameras/" + }, + { + "name" : "https://www.axis.com/files/faq/Advisory_ACV-128401.pdf", + "refsource" : "CONFIRM", + "url" : "https://www.axis.com/files/faq/Advisory_ACV-128401.pdf" + }, + { + "name" : "https://www.axis.com/files/sales/ACV-128401_Affected_Product_List.pdf", + "refsource" : "CONFIRM", + "url" : "https://www.axis.com/files/sales/ACV-128401_Affected_Product_List.pdf" } ] } diff --git a/2018/10xxx/CVE-2018-10659.json b/2018/10xxx/CVE-2018-10659.json index fbb07bbc450..9f07e035595 100644 --- a/2018/10xxx/CVE-2018-10659.json +++ b/2018/10xxx/CVE-2018-10659.json @@ -2,7 +2,30 @@ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2018-10659", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,38 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "There was a Memory Corruption issue discovered in multiple models of Axis IP Cameras which allows remote attackers to cause a denial of service (crash) by sending a crafted command which will result in a code path that calls the UND undefined ARM instruction." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://blog.vdoo.com/2018/06/18/vdoo-discovers-significant-vulnerabilities-in-axis-cameras/", + "refsource" : "MISC", + "url" : "https://blog.vdoo.com/2018/06/18/vdoo-discovers-significant-vulnerabilities-in-axis-cameras/" + }, + { + "name" : "https://www.axis.com/files/faq/Advisory_ACV-128401.pdf", + "refsource" : "CONFIRM", + "url" : "https://www.axis.com/files/faq/Advisory_ACV-128401.pdf" + }, + { + "name" : "https://www.axis.com/files/sales/ACV-128401_Affected_Product_List.pdf", + "refsource" : "CONFIRM", + "url" : "https://www.axis.com/files/sales/ACV-128401_Affected_Product_List.pdf" } ] } diff --git a/2018/10xxx/CVE-2018-10660.json b/2018/10xxx/CVE-2018-10660.json index 45db75bb2a9..a1eeff988bc 100644 --- a/2018/10xxx/CVE-2018-10660.json +++ b/2018/10xxx/CVE-2018-10660.json @@ -2,7 +2,30 @@ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2018-10660", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,38 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "An issue was discovered in multiple models of Axis IP Cameras. There is Shell Command Injection." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://blog.vdoo.com/2018/06/18/vdoo-discovers-significant-vulnerabilities-in-axis-cameras/", + "refsource" : "MISC", + "url" : "https://blog.vdoo.com/2018/06/18/vdoo-discovers-significant-vulnerabilities-in-axis-cameras/" + }, + { + "name" : "https://www.axis.com/files/faq/Advisory_ACV-128401.pdf", + "refsource" : "CONFIRM", + "url" : "https://www.axis.com/files/faq/Advisory_ACV-128401.pdf" + }, + { + "name" : "https://www.axis.com/files/sales/ACV-128401_Affected_Product_List.pdf", + "refsource" : "CONFIRM", + "url" : "https://www.axis.com/files/sales/ACV-128401_Affected_Product_List.pdf" } ] } diff --git a/2018/10xxx/CVE-2018-10661.json b/2018/10xxx/CVE-2018-10661.json index 0bdb45857c7..85388f9a335 100644 --- a/2018/10xxx/CVE-2018-10661.json +++ b/2018/10xxx/CVE-2018-10661.json @@ -2,7 +2,30 @@ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2018-10661", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,38 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "An issue was discovered in multiple models of Axis IP Cameras. There is a bypass of access control." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://blog.vdoo.com/2018/06/18/vdoo-discovers-significant-vulnerabilities-in-axis-cameras/", + "refsource" : "MISC", + "url" : "https://blog.vdoo.com/2018/06/18/vdoo-discovers-significant-vulnerabilities-in-axis-cameras/" + }, + { + "name" : "https://www.axis.com/files/faq/Advisory_ACV-128401.pdf", + "refsource" : "CONFIRM", + "url" : "https://www.axis.com/files/faq/Advisory_ACV-128401.pdf" + }, + { + "name" : "https://www.axis.com/files/sales/ACV-128401_Affected_Product_List.pdf", + "refsource" : "CONFIRM", + "url" : "https://www.axis.com/files/sales/ACV-128401_Affected_Product_List.pdf" } ] } diff --git a/2018/10xxx/CVE-2018-10662.json b/2018/10xxx/CVE-2018-10662.json index 6eef14b98aa..7a872433a44 100644 --- a/2018/10xxx/CVE-2018-10662.json +++ b/2018/10xxx/CVE-2018-10662.json @@ -2,7 +2,30 @@ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2018-10662", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,38 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "An issue was discovered in multiple models of Axis IP Cameras. There is an Exposed Insecure Interface." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://blog.vdoo.com/2018/06/18/vdoo-discovers-significant-vulnerabilities-in-axis-cameras/", + "refsource" : "MISC", + "url" : "https://blog.vdoo.com/2018/06/18/vdoo-discovers-significant-vulnerabilities-in-axis-cameras/" + }, + { + "name" : "https://www.axis.com/files/faq/Advisory_ACV-128401.pdf", + "refsource" : "CONFIRM", + "url" : "https://www.axis.com/files/faq/Advisory_ACV-128401.pdf" + }, + { + "name" : "https://www.axis.com/files/sales/ACV-128401_Affected_Product_List.pdf", + "refsource" : "CONFIRM", + "url" : "https://www.axis.com/files/sales/ACV-128401_Affected_Product_List.pdf" } ] } diff --git a/2018/10xxx/CVE-2018-10663.json b/2018/10xxx/CVE-2018-10663.json index ad292a48ebe..74a042c4377 100644 --- a/2018/10xxx/CVE-2018-10663.json +++ b/2018/10xxx/CVE-2018-10663.json @@ -2,7 +2,30 @@ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2018-10663", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,38 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "An issue was discovered in multiple models of Axis IP Cameras. There is an Incorrect Size Calculation." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://blog.vdoo.com/2018/06/18/vdoo-discovers-significant-vulnerabilities-in-axis-cameras/", + "refsource" : "MISC", + "url" : "https://blog.vdoo.com/2018/06/18/vdoo-discovers-significant-vulnerabilities-in-axis-cameras/" + }, + { + "name" : "https://www.axis.com/files/faq/Advisory_ACV-128401.pdf", + "refsource" : "CONFIRM", + "url" : "https://www.axis.com/files/faq/Advisory_ACV-128401.pdf" + }, + { + "name" : "https://www.axis.com/files/sales/ACV-128401_Affected_Product_List.pdf", + "refsource" : "CONFIRM", + "url" : "https://www.axis.com/files/sales/ACV-128401_Affected_Product_List.pdf" } ] } diff --git a/2018/10xxx/CVE-2018-10664.json b/2018/10xxx/CVE-2018-10664.json index aaa9cb1b3a4..76ed77c439d 100644 --- a/2018/10xxx/CVE-2018-10664.json +++ b/2018/10xxx/CVE-2018-10664.json @@ -2,7 +2,30 @@ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2018-10664", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,38 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "An issue was discovered in the httpd process in multiple models of Axis IP Cameras. There is Memory Corruption." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://blog.vdoo.com/2018/06/18/vdoo-discovers-significant-vulnerabilities-in-axis-cameras/", + "refsource" : "MISC", + "url" : "https://blog.vdoo.com/2018/06/18/vdoo-discovers-significant-vulnerabilities-in-axis-cameras/" + }, + { + "name" : "https://www.axis.com/files/faq/Advisory_ACV-128401.pdf", + "refsource" : "CONFIRM", + "url" : "https://www.axis.com/files/faq/Advisory_ACV-128401.pdf" + }, + { + "name" : "https://www.axis.com/files/sales/ACV-128401_Affected_Product_List.pdf", + "refsource" : "CONFIRM", + "url" : "https://www.axis.com/files/sales/ACV-128401_Affected_Product_List.pdf" } ] } diff --git a/2018/11xxx/CVE-2018-11447.json b/2018/11xxx/CVE-2018-11447.json index afbc539337b..134eadfed78 100644 --- a/2018/11xxx/CVE-2018-11447.json +++ b/2018/11xxx/CVE-2018-11447.json @@ -54,6 +54,8 @@ "references" : { "reference_data" : [ { + "name" : "https://cert-portal.siemens.com/productcert/pdf/ssa-977428.pdf", + "refsource" : "CONFIRM", "url" : "https://cert-portal.siemens.com/productcert/pdf/ssa-977428.pdf" } ] diff --git a/2018/11xxx/CVE-2018-11448.json b/2018/11xxx/CVE-2018-11448.json index 4ac94faf89f..69f310d0b3b 100644 --- a/2018/11xxx/CVE-2018-11448.json +++ b/2018/11xxx/CVE-2018-11448.json @@ -54,6 +54,8 @@ "references" : { "reference_data" : [ { + "name" : "https://cert-portal.siemens.com/productcert/pdf/ssa-977428.pdf", + "refsource" : "CONFIRM", "url" : "https://cert-portal.siemens.com/productcert/pdf/ssa-977428.pdf" } ] diff --git a/2018/11xxx/CVE-2018-11449.json b/2018/11xxx/CVE-2018-11449.json index f7f8289b19d..ed5e43b80bd 100644 --- a/2018/11xxx/CVE-2018-11449.json +++ b/2018/11xxx/CVE-2018-11449.json @@ -54,6 +54,8 @@ "references" : { "reference_data" : [ { + "name" : "https://cert-portal.siemens.com/productcert/pdf/ssa-977428.pdf", + "refsource" : "CONFIRM", "url" : "https://cert-portal.siemens.com/productcert/pdf/ssa-977428.pdf" } ] diff --git a/2018/1xxx/CVE-2018-1072.json b/2018/1xxx/CVE-2018-1072.json index 34a2c3b7ead..d363619f921 100644 --- a/2018/1xxx/CVE-2018-1072.json +++ b/2018/1xxx/CVE-2018-1072.json @@ -1,69 +1,72 @@ { - "impact": { - "cvss": [ - [ - { - "vectorString": "5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", - "version": "3.0" - } + "CVE_data_meta" : { + "ASSIGNER" : "lpardo@redhat.com", + "ID" : "CVE-2018-1072", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "ovirt-engine-setup", + "version" : { + "version_data" : [ + { + "version_value" : "oVirt 4.2.2" + } + ] + } + } + ] + }, + "vendor_name" : "[UNKNOWN]" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "ovirt-engine before version ovirt 4.2.2 is vulnerable to an information exposure through log files. When engine-backup was run with one of the options \"--provision*db\", the database username and password were logged in cleartext. Sharing the provisioning log might inadvertently leak database passwords." + } + ] + }, + "impact" : { + "cvss" : [ + [ + { + "vectorString" : "5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", + "version" : "3.0" + } + ] + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "CWE-532" + } ] - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "ovirt-engine before version ovirt 4.2.2 is vulnerable to an information exposure through log files. When engine-backup was run with one of the options \"--provision*db\", the database username and password were logged in cleartext. Sharing the provisioning log might inadvertently leak database passwords." - } - ] - }, - "data_type": "CVE", - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "version": { - "version_data": [ - { - "version_value": "oVirt 4.2.2" - } - ] - }, - "product_name": "ovirt-engine-setup" - } - ] - }, - "vendor_name": "[UNKNOWN]" - } - ] - } - }, - "data_format": "MITRE", - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-532" - } - ] - } - ] - }, - "data_version": "4.0", - "references": { - "reference_data": [ - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1072" - } - ] - }, - "CVE_data_meta": { - "ID": "CVE-2018-1072", - "ASSIGNER": "lpardo@redhat.com" - } + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1072", + "refsource" : "CONFIRM", + "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1072" + } + ] + } } diff --git a/2018/4xxx/CVE-2018-4845.json b/2018/4xxx/CVE-2018-4845.json index 4e005263ff3..d1f23226da7 100644 --- a/2018/4xxx/CVE-2018-4845.json +++ b/2018/4xxx/CVE-2018-4845.json @@ -69,6 +69,8 @@ "references" : { "reference_data" : [ { + "name" : "https://cert-portal.siemens.com/productcert/pdf/ssa-755010.pdf", + "refsource" : "CONFIRM", "url" : "https://cert-portal.siemens.com/productcert/pdf/ssa-755010.pdf" } ] diff --git a/2018/4xxx/CVE-2018-4846.json b/2018/4xxx/CVE-2018-4846.json index 13bb578559c..43c6de2b3df 100644 --- a/2018/4xxx/CVE-2018-4846.json +++ b/2018/4xxx/CVE-2018-4846.json @@ -54,6 +54,8 @@ "references" : { "reference_data" : [ { + "name" : "https://cert-portal.siemens.com/productcert/pdf/ssa-755010.pdf", + "refsource" : "CONFIRM", "url" : "https://cert-portal.siemens.com/productcert/pdf/ssa-755010.pdf" } ] diff --git a/2018/4xxx/CVE-2018-4859.json b/2018/4xxx/CVE-2018-4859.json index 2d6d54ddd29..342c3feee98 100644 --- a/2018/4xxx/CVE-2018-4859.json +++ b/2018/4xxx/CVE-2018-4859.json @@ -54,6 +54,8 @@ "references" : { "reference_data" : [ { + "name" : "https://cert-portal.siemens.com/productcert/pdf/ssa-977428.pdf", + "refsource" : "CONFIRM", "url" : "https://cert-portal.siemens.com/productcert/pdf/ssa-977428.pdf" } ] diff --git a/2018/4xxx/CVE-2018-4860.json b/2018/4xxx/CVE-2018-4860.json index db88e708cfa..9b4149afb7a 100644 --- a/2018/4xxx/CVE-2018-4860.json +++ b/2018/4xxx/CVE-2018-4860.json @@ -54,6 +54,8 @@ "references" : { "reference_data" : [ { + "name" : "https://cert-portal.siemens.com/productcert/pdf/ssa-977428.pdf", + "refsource" : "CONFIRM", "url" : "https://cert-portal.siemens.com/productcert/pdf/ssa-977428.pdf" } ] diff --git a/2018/4xxx/CVE-2018-4861.json b/2018/4xxx/CVE-2018-4861.json index f04e0604c62..6166319268a 100644 --- a/2018/4xxx/CVE-2018-4861.json +++ b/2018/4xxx/CVE-2018-4861.json @@ -54,6 +54,8 @@ "references" : { "reference_data" : [ { + "name" : "https://cert-portal.siemens.com/productcert/pdf/ssa-977428.pdf", + "refsource" : "CONFIRM", "url" : "https://cert-portal.siemens.com/productcert/pdf/ssa-977428.pdf" } ]