From b5869b4a8bb87058143991ad3fbebecc101dabd7 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 29 Aug 2022 23:00:36 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2022/36xxx/CVE-2022-36553.json | 66 ++++++++++++++++++++++++++++++---- 2022/36xxx/CVE-2022-36554.json | 66 ++++++++++++++++++++++++++++++---- 2022/36xxx/CVE-2022-36555.json | 66 ++++++++++++++++++++++++++++++---- 2022/36xxx/CVE-2022-36556.json | 61 +++++++++++++++++++++++++++---- 2022/36xxx/CVE-2022-36557.json | 61 +++++++++++++++++++++++++++---- 2022/36xxx/CVE-2022-36558.json | 61 +++++++++++++++++++++++++++---- 2022/36xxx/CVE-2022-36559.json | 61 +++++++++++++++++++++++++++---- 2022/36xxx/CVE-2022-36560.json | 61 +++++++++++++++++++++++++++---- 2022/37xxx/CVE-2022-37680.json | 61 +++++++++++++++++++++++++++---- 2022/37xxx/CVE-2022-37681.json | 61 +++++++++++++++++++++++++++---- 2022/38xxx/CVE-2022-38625.json | 66 ++++++++++++++++++++++++++++++---- 11 files changed, 625 insertions(+), 66 deletions(-) diff --git a/2022/36xxx/CVE-2022-36553.json b/2022/36xxx/CVE-2022-36553.json index 8c6d5c52ee7..a7064913328 100644 --- a/2022/36xxx/CVE-2022-36553.json +++ b/2022/36xxx/CVE-2022-36553.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-36553", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-36553", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Hytec Inter HWL-2511-SS v1.05 and below was discovered to contain a command injection vulnerability via the component /www/cgi-bin/popen.cgi." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://hytec.co.jp/eng/products/our-brand/hwl-2511-ss.html", + "refsource": "MISC", + "name": "https://hytec.co.jp/eng/products/our-brand/hwl-2511-ss.html" + }, + { + "url": "https://hytec.co.jp/eng/wordpress/wp-content/uploads/2019/09/hwl-2511-ss-ds.3.0.pdf", + "refsource": "MISC", + "name": "https://hytec.co.jp/eng/wordpress/wp-content/uploads/2019/09/hwl-2511-ss-ds.3.0.pdf" + }, + { + "url": "https://gist.github.com/Nwqda/b27418ab801eb0b9cdbe8d042cb0249b", + "refsource": "MISC", + "name": "https://gist.github.com/Nwqda/b27418ab801eb0b9cdbe8d042cb0249b" } ] } diff --git a/2022/36xxx/CVE-2022-36554.json b/2022/36xxx/CVE-2022-36554.json index 962bb9eddf9..3e743010d0a 100644 --- a/2022/36xxx/CVE-2022-36554.json +++ b/2022/36xxx/CVE-2022-36554.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-36554", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-36554", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A command injection vulnerability in the CLI (Command Line Interface) implementation of Hytec Inter HWL-2511-SS v1.05 and below allows attackers to execute arbitrary commands with root privileges." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://hytec.co.jp/eng/products/our-brand/hwl-2511-ss.html", + "refsource": "MISC", + "name": "https://hytec.co.jp/eng/products/our-brand/hwl-2511-ss.html" + }, + { + "url": "https://hytec.co.jp/eng/wordpress/wp-content/uploads/2019/09/hwl-2511-ss-ds.3.0.pdf", + "refsource": "MISC", + "name": "https://hytec.co.jp/eng/wordpress/wp-content/uploads/2019/09/hwl-2511-ss-ds.3.0.pdf" + }, + { + "url": "https://gist.github.com/Nwqda/b27418ab801eb0b9cdbe8d042cb0249b", + "refsource": "MISC", + "name": "https://gist.github.com/Nwqda/b27418ab801eb0b9cdbe8d042cb0249b" } ] } diff --git a/2022/36xxx/CVE-2022-36555.json b/2022/36xxx/CVE-2022-36555.json index 405a0137518..c157074d4a1 100644 --- a/2022/36xxx/CVE-2022-36555.json +++ b/2022/36xxx/CVE-2022-36555.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-36555", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-36555", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Hytec Inter HWL-2511-SS v1.05 and below implements a SHA512crypt hash for the root account which can be easily cracked via a brute-force attack." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://hytec.co.jp/eng/products/our-brand/hwl-2511-ss.html", + "refsource": "MISC", + "name": "https://hytec.co.jp/eng/products/our-brand/hwl-2511-ss.html" + }, + { + "url": "https://hytec.co.jp/eng/wordpress/wp-content/uploads/2019/09/hwl-2511-ss-ds.3.0.pdf", + "refsource": "MISC", + "name": "https://hytec.co.jp/eng/wordpress/wp-content/uploads/2019/09/hwl-2511-ss-ds.3.0.pdf" + }, + { + "url": "https://gist.github.com/Nwqda/b27418ab801eb0b9cdbe8d042cb0249b", + "refsource": "MISC", + "name": "https://gist.github.com/Nwqda/b27418ab801eb0b9cdbe8d042cb0249b" } ] } diff --git a/2022/36xxx/CVE-2022-36556.json b/2022/36xxx/CVE-2022-36556.json index 42aaf79cfba..b9eca643121 100644 --- a/2022/36xxx/CVE-2022-36556.json +++ b/2022/36xxx/CVE-2022-36556.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-36556", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-36556", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Seiko SkyBridge MB-A100/A110 v4.2.0 and below was discovered to contain a command injection vulnerability via the ipAddress parameter at 07system08execute_ping_01." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://gist.github.com/Nwqda/88232102fed50b54c43871e88e993b54", + "refsource": "MISC", + "name": "https://gist.github.com/Nwqda/88232102fed50b54c43871e88e993b54" + }, + { + "url": "https://www.seiko-sol.co.jp/products/skybridge/lineup/mb-a100/", + "refsource": "MISC", + "name": "https://www.seiko-sol.co.jp/products/skybridge/lineup/mb-a100/" } ] } diff --git a/2022/36xxx/CVE-2022-36557.json b/2022/36xxx/CVE-2022-36557.json index feca645f373..62afa9ef403 100644 --- a/2022/36xxx/CVE-2022-36557.json +++ b/2022/36xxx/CVE-2022-36557.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-36557", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-36557", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Seiko SkyBridge MB-A100/A110 v4.2.0 and below was discovered to contain an arbitrary file upload vulnerability via the restore backup function. This vulnerability allows attackers to execute arbitrary code via a crafted html file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://gist.github.com/Nwqda/88232102fed50b54c43871e88e993b54", + "refsource": "MISC", + "name": "https://gist.github.com/Nwqda/88232102fed50b54c43871e88e993b54" + }, + { + "url": "https://www.seiko-sol.co.jp/products/skybridge/lineup/mb-a100/", + "refsource": "MISC", + "name": "https://www.seiko-sol.co.jp/products/skybridge/lineup/mb-a100/" } ] } diff --git a/2022/36xxx/CVE-2022-36558.json b/2022/36xxx/CVE-2022-36558.json index 734bed11e7f..885560a85de 100644 --- a/2022/36xxx/CVE-2022-36558.json +++ b/2022/36xxx/CVE-2022-36558.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-36558", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-36558", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Seiko SkyBridge MB-A100/A110 v4.2.0 and below implements a hard-coded passcode for the root account. Attackers are able to access the passcord via the file /etc/ciel.cfg." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://gist.github.com/Nwqda/88232102fed50b54c43871e88e993b54", + "refsource": "MISC", + "name": "https://gist.github.com/Nwqda/88232102fed50b54c43871e88e993b54" + }, + { + "url": "https://www.seiko-sol.co.jp/products/skybridge/lineup/mb-a100/", + "refsource": "MISC", + "name": "https://www.seiko-sol.co.jp/products/skybridge/lineup/mb-a100/" } ] } diff --git a/2022/36xxx/CVE-2022-36559.json b/2022/36xxx/CVE-2022-36559.json index 542fe4ffd4a..113b35b41a7 100644 --- a/2022/36xxx/CVE-2022-36559.json +++ b/2022/36xxx/CVE-2022-36559.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-36559", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-36559", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Seiko SkyBridge MB-A200 v01.00.04 and below was discovered to contain a command injection vulnerability via the Ping parameter at ping_exec.cgi." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://gist.github.com/Nwqda/0db1fc6cfa39d7f0592d44e18c40146e", + "refsource": "MISC", + "name": "https://gist.github.com/Nwqda/0db1fc6cfa39d7f0592d44e18c40146e" + }, + { + "url": "https://www.seiko-sol.co.jp/products/skybridge/lineup/mb-a200/", + "refsource": "MISC", + "name": "https://www.seiko-sol.co.jp/products/skybridge/lineup/mb-a200/" } ] } diff --git a/2022/36xxx/CVE-2022-36560.json b/2022/36xxx/CVE-2022-36560.json index 2d99d633e5b..32250a70278 100644 --- a/2022/36xxx/CVE-2022-36560.json +++ b/2022/36xxx/CVE-2022-36560.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-36560", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-36560", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Seiko SkyBridge MB-A200 v01.00.04 and below was discovered to contain multiple hard-coded passcodes for root. Attackers are able to access the passcodes at /etc/srapi/config/system.conf and /usr/sbin/ssol-sshd.sh." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://gist.github.com/Nwqda/0db1fc6cfa39d7f0592d44e18c40146e", + "refsource": "MISC", + "name": "https://gist.github.com/Nwqda/0db1fc6cfa39d7f0592d44e18c40146e" + }, + { + "url": "https://www.seiko-sol.co.jp/products/skybridge/lineup/mb-a200/", + "refsource": "MISC", + "name": "https://www.seiko-sol.co.jp/products/skybridge/lineup/mb-a200/" } ] } diff --git a/2022/37xxx/CVE-2022-37680.json b/2022/37xxx/CVE-2022-37680.json index c79130e4d04..9cd847303d3 100644 --- a/2022/37xxx/CVE-2022-37680.json +++ b/2022/37xxx/CVE-2022-37680.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-37680", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-37680", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An access control issue in Hitachi Kokusai Electric Inc ISnex HC-IP9100HD Version 1.07 and below allows attackers to remotely reboot the device via a crafted POST request to the endpoint /ptipupgrade.cgi." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.hitachi-kokusai.co.jp/global/en/products/camera/network/index.html", + "refsource": "MISC", + "name": "https://www.hitachi-kokusai.co.jp/global/en/products/camera/network/index.html" + }, + { + "url": "https://gist.github.com/Nwqda/5efea18c9142c6a966d85c6be2c0c2b5", + "refsource": "MISC", + "name": "https://gist.github.com/Nwqda/5efea18c9142c6a966d85c6be2c0c2b5" } ] } diff --git a/2022/37xxx/CVE-2022-37681.json b/2022/37xxx/CVE-2022-37681.json index 500d364d12c..bcd5c4406ed 100644 --- a/2022/37xxx/CVE-2022-37681.json +++ b/2022/37xxx/CVE-2022-37681.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-37681", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-37681", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Hitachi Kokusai Electric Inc ISnex HC-IP9100HD Version 1.07 and below allows attackers to perform a directory traversal via a crafted GET request to the endpoint /ptippage.cgi." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.hitachi-kokusai.co.jp/global/en/products/camera/network/index.html", + "refsource": "MISC", + "name": "https://www.hitachi-kokusai.co.jp/global/en/products/camera/network/index.html" + }, + { + "url": "https://gist.github.com/Nwqda/5efea18c9142c6a966d85c6be2c0c2b5", + "refsource": "MISC", + "name": "https://gist.github.com/Nwqda/5efea18c9142c6a966d85c6be2c0c2b5" } ] } diff --git a/2022/38xxx/CVE-2022-38625.json b/2022/38xxx/CVE-2022-38625.json index 5ce62e5a329..20cd2f00bf7 100644 --- a/2022/38xxx/CVE-2022-38625.json +++ b/2022/38xxx/CVE-2022-38625.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2022-38625", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2022-38625", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Patlite NH-FB v1.46 and below was discovered to contain insufficient firmware validation during the upgrade firmware file upload process. This vulnerability allows authenticated attackers to create and upload their own custom-built firmware and inject malicious code." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.patlite.com/network-products/lineup/nh-fb.html", + "refsource": "MISC", + "name": "https://www.patlite.com/network-products/lineup/nh-fb.html" + }, + { + "url": "https://gist.github.com/Nwqda/dfad4e11b545dd40aebca6031d202f66", + "refsource": "MISC", + "name": "https://gist.github.com/Nwqda/dfad4e11b545dd40aebca6031d202f66" + }, + { + "url": "https://www.youtube.com/watch?v=4r9FH6U2VR8", + "refsource": "MISC", + "name": "https://www.youtube.com/watch?v=4r9FH6U2VR8" } ] }