diff --git a/2022/0xxx/CVE-2022-0528.json b/2022/0xxx/CVE-2022-0528.json index d48145065df9..a635a9f02bba 100644 --- a/2022/0xxx/CVE-2022-0528.json +++ b/2022/0xxx/CVE-2022-0528.json @@ -3,7 +3,7 @@ "ASSIGNER": "security@huntr.dev", "ID": "CVE-2022-0528", "STATE": "PUBLIC", - "TITLE": "Exposure of Sensitive Information to an Unauthorized Actor in transloadit/uppy" + "TITLE": "Server-Side Request Forgery (SSRF) in transloadit/uppy" }, "affects": { "vendor": { @@ -36,7 +36,7 @@ "description_data": [ { "lang": "eng", - "value": "Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository transloadit/uppy prior to 3.3.1." + "value": "Server-Side Request Forgery (SSRF) in GitHub repository transloadit/uppy prior to 3.3.1." } ] }, @@ -62,7 +62,7 @@ "description": [ { "lang": "eng", - "value": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor" + "value": "CWE-918 Server-Side Request Forgery (SSRF) } ] } @@ -86,4 +86,4 @@ "advisory": "8b060cc3-2420-468e-8293-b9216620175b", "discovery": "EXTERNAL" } -} \ No newline at end of file +}