in default/cve5/script.js [29:74]
function loadCVE(value) {
var realId = value.match(/(CVE-(\d{4})-(\d{1,12})(\d{3}))/);
if (realId) {
var id = realId[1];
var year = realId[2];
var bucket = realId[3];
fetch('https://raw.githubusercontent.com/CVEProject/cvelistv5/master/review_set/' + year + '/' + bucket + 'xxx/' + id + '.json', {
method: 'GET',
credentials: 'omit',
headers: {
'Accept': 'application/json, text/plain, */*'
},
redirect: 'error'
})
.then(function (response) {
if (!response.ok) {
errMsg.textContent = "Failed to load valid CVE JSON";
infoMsg.textContent = "";
throw Error(id + ' ' + response.statusText);
}
return response.json();
})
.then(function (res) {
if (res.dataVersion && res.dataVersion == '5.0') {
if (res.containers.cna.x_legacyV4Record) {
delete res.containers.cna.x_legacyV4Record;
}
if (res.containers) {
res = cveFixForVulnogram(res);
}
var edOpts = (res.cveMetadata.state == 'REJECTED') ? rejectEditorOption : publicEditorOption;
mainTabGroup.change(0);
loadJSON(res, id, "Loaded " + id + " from GIT!", edOpts);
} else {
errMsg.textContent = "Failed to load valid CVE JSON v 5.0 record";
infoMsg.textContent = "";
}
})
.catch(function (error) {
errMsg.textContent = error;
})
} else {
errMsg.textContent = "CVE ID required";
}
return false;
}