We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
1 parent ae199cb commit a0c4895Copy full SHA for a0c4895
1 file changed
dojo/templatetags/display_tags.py
@@ -3,6 +3,7 @@
3
import datetime
4
import logging
5
import mimetypes
6
+import re
7
from ast import literal_eval
8
from itertools import chain
9
@@ -782,6 +783,8 @@ def vulnerability_url(vulnerability_id):
782
783
return settings.VULNERABILITY_URLS[key] + str(vulnerability_id.replace("GLSA-", "glsa/"))
784
if key == "SSA:":
785
return settings.VULNERABILITY_URLS[key] + str(vulnerability_id.replace("SSA:", "SSA-"))
786
+ if key == "SSA-" and not re.findall(r"SSA-\d{4}-", vulnerability_id):
787
+ return "https://cert-portal.siemens.com/productcert/html/" + str(vulnerability_id.lower()) + ".html"
788
if key in {"AVD", "KHV", "C-"}:
789
return settings.VULNERABILITY_URLS[key] + str(vulnerability_id.lower())
790
if key == "SUSE-SU-":
0 commit comments