Skip to content

Commit a61ceeb

Browse files
authored
Merge pull request #14703 from manuel-sommer/mozilla_vulnid
🎉 add mozilla foundation sec advice to vulnid
2 parents 4decd88 + 76d8ed8 commit a61ceeb

File tree

2 files changed

+2
-1
lines changed

2 files changed

+2
-1
lines changed

dojo/settings/settings.dist.py

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2036,6 +2036,7 @@ def saml2_attrib_map_format(din):
20362036
"KHV": "https://avd.aquasec.com/misconfig/kubernetes/", # e.g. https://avd.aquasec.com/misconfig/kubernetes/khv045
20372037
"LEN-": "https://support.lenovo.com/cl/de/product_security/", # e.g. https://support.lenovo.com/cl/de/product_security/LEN-94953
20382038
"MAL-": "https://cvepremium.circl.lu/vuln/", # e.g. https://cvepremium.circl.lu/vuln/mal-2025-49305
2039+
"MFSA": "https://www.mozilla.org/en-US/security/advisories/", # e.g. https://www.mozilla.org/en-US/security/advisories/mfsa2025-01/
20392040
"MGAA-": "https://advisories.mageia.org/&&.html", # e.g. https://advisories.mageia.org/MGAA-2013-0054.html
20402041
"MGASA-": "https://advisories.mageia.org/&&.html", # e.g. https://advisories.mageia.org/MGASA-2025-0023.html
20412042
"MSRC_": "https://cvepremium.circl.lu/vuln/", # e.g. https://cvepremium.circl.lu/vuln/msrc_cve-2025-59200

dojo/templatetags/display_tags.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -854,7 +854,7 @@ def vulnerability_url(vulnerability_id):
854854
return settings.VULNERABILITY_URLS[key] + str(vulnerability_id.replace("SSA:", "SSA-"))
855855
if key == "SSA-" and not re.findall(r"SSA-\d{4}-", vulnerability_id):
856856
return "https://cert-portal.siemens.com/productcert/html/" + str(vulnerability_id.lower()) + ".html"
857-
if key in {"AVD", "KHV", "C-", "ELA-"}:
857+
if key in {"AVD", "KHV", "C-", "ELA-", "MFSA"}:
858858
return settings.VULNERABILITY_URLS[key] + str(vulnerability_id.lower())
859859
if key == "SUSE-SU-":
860860
return settings.VULNERABILITY_URLS[key] + str(vulnerability_id.lower().removeprefix("suse-su-")[:4]) + "/" + vulnerability_id.replace(":", "")

0 commit comments

Comments
 (0)