From 474951c82f15a02791164820bbce8a3f3253a346 Mon Sep 17 00:00:00 2001 From: Ben Harvie Date: Thu, 29 Jun 2023 09:06:12 +0100 Subject: [PATCH] Update CVE-2022-0528.json --- 2022/0xxx/CVE-2022-0528.json | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/2022/0xxx/CVE-2022-0528.json b/2022/0xxx/CVE-2022-0528.json index d48145065df9..a635a9f02bba 100644 --- a/2022/0xxx/CVE-2022-0528.json +++ b/2022/0xxx/CVE-2022-0528.json @@ -3,7 +3,7 @@ "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-0528", "STATE": "PUBLIC", - "TITLE": "Exposure of Sensitive Information to an Unauthorized Actor in transloadit/uppy" + "TITLE": "Server-Side Request Forgery (SSRF) in transloadit/uppy" }, "affects": { "vendor": { @@ -36,7 +36,7 @@ "description_data": [ { "lang": "eng", - "value": "Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository transloadit/uppy prior to 3.3.1." + "value": "Server-Side Request Forgery (SSRF) in GitHub repository transloadit/uppy prior to 3.3.1." } ] }, @@ -62,7 +62,7 @@ "description": [ { "lang": "eng", - "value": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor" + "value": "CWE-918 Server-Side Request Forgery (SSRF) } ] } @@ -86,4 +86,4 @@ "advisory": "8b060cc3-2420-468e-8293-b9216620175b", "discovery": "EXTERNAL" } -} \ No newline at end of file +}