From 599a69ab9f74603b02c7a938329f9bc193c0b8ba Mon Sep 17 00:00:00 2001 From: Yozo TODA Date: Thu, 23 Dec 2021 15:29:13 +0900 Subject: [PATCH] CVE-2021-4144: aha, found that invalid URL "https://https://...", fixed to https://.... --- 2021/4xxx/CVE-2021-4144.json | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/2021/4xxx/CVE-2021-4144.json b/2021/4xxx/CVE-2021-4144.json index de854bfcd93..664a1c50de2 100644 --- a/2021/4xxx/CVE-2021-4144.json +++ b/2021/4xxx/CVE-2021-4144.json @@ -45,14 +45,14 @@ "references": { "reference_data": [ { - "url": "https://https://www.tp-link.com/jp/support/download/tl-wr802n/#Firmware", - "refsource": "MISC", - "name": "https://https://www.tp-link.com/jp/support/download/tl-wr802n/#Firmware" + "refsource": "CONFIRM", + "url": "https://www.tp-link.com/jp/support/download/tl-wr802n/#Firmware", + "name": "https://www.tp-link.com/jp/support/download/tl-wr802n/#Firmware" }, { + "refsource": "JVN", "url": "https://jvn.jp/en/vu/JVNVU94883311/", - "refsource": "MISC", - "name": "https://jvn.jp/en/vu/JVNVU94883311/" + "name": "JVNVU#94883311: TP-Link TL-WR802N V4(JP) vulnerable to OS command injection" } ] },