diff --git a/2002/0xxx/CVE-2002-0477.json b/2002/0xxx/CVE-2002-0477.json index 1d46a775055..edf5bade3e0 100644 --- a/2002/0xxx/CVE-2002-0477.json +++ b/2002/0xxx/CVE-2002-0477.json @@ -1,87 +1,87 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2002-0477", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "Standalone Macromedia Flash Player 5.0 before 5,0,30,2 allows remote attackers to execute arbitrary programs via a .SWF file containing the \"exec\" FSCommand." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2002-0477", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "20020109 Shockwave Flash player issue", - "refsource" : "BUGTRAQ", - "url" : "http://marc.info/?l=bugtraq&m=101071988413107&w=2" - }, - { - "name" : "20020319 More SWF vulnerabilities?", - "refsource" : "BUGTRAQ", - "url" : "http://www.securityfocus.com/archive/1/262990" - }, - { - "name" : "http://www.macromedia.com/support/flash/ts/documents/swf_clear.htm", - "refsource" : "CONFIRM", - "url" : "http://www.macromedia.com/support/flash/ts/documents/swf_clear.htm" - }, - { - "name" : "http://www.macromedia.com/support/flash/ts/documents/standalone_update.htm", - "refsource" : "CONFIRM", - "url" : "http://www.macromedia.com/support/flash/ts/documents/standalone_update.htm" - }, - { - "name" : "flash-fscommand-exec(8587)", - "refsource" : "XF", - "url" : "http://www.iss.net/security_center/static/8587.php" - }, - { - "name" : "4321", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/4321" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Standalone Macromedia Flash Player 5.0 before 5,0,30,2 allows remote attackers to execute arbitrary programs via a .SWF file containing the \"exec\" FSCommand." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "http://www.macromedia.com/support/flash/ts/documents/swf_clear.htm", + "refsource": "CONFIRM", + "url": "http://www.macromedia.com/support/flash/ts/documents/swf_clear.htm" + }, + { + "name": "20020109 Shockwave Flash player issue", + "refsource": "BUGTRAQ", + "url": "http://marc.info/?l=bugtraq&m=101071988413107&w=2" + }, + { + "name": "20020319 More SWF vulnerabilities?", + "refsource": "BUGTRAQ", + "url": "http://www.securityfocus.com/archive/1/262990" + }, + { + "name": "flash-fscommand-exec(8587)", + "refsource": "XF", + "url": "http://www.iss.net/security_center/static/8587.php" + }, + { + "name": "http://www.macromedia.com/support/flash/ts/documents/standalone_update.htm", + "refsource": "CONFIRM", + "url": "http://www.macromedia.com/support/flash/ts/documents/standalone_update.htm" + }, + { + "name": "4321", + "refsource": "BID", + "url": "http://www.securityfocus.com/bid/4321" + } + ] + } +} \ No newline at end of file diff --git a/2002/0xxx/CVE-2002-0648.json b/2002/0xxx/CVE-2002-0648.json index 69113755fc6..95341d78d41 100644 --- a/2002/0xxx/CVE-2002-0648.json +++ b/2002/0xxx/CVE-2002-0648.json @@ -1,102 +1,102 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2002-0648", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "The legacy