From 51b087a9e35da687640193bbfd3908816d3ffb00 Mon Sep 17 00:00:00 2001 From: Zyxel PSIRT <86775651+zyxel-psirt@users.noreply.github.com> Date: Wed, 11 Jan 2023 10:08:20 +0800 Subject: [PATCH] Update CVE-2022-43392.json --- 2022/43xxx/CVE-2022-43392.json | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/2022/43xxx/CVE-2022-43392.json b/2022/43xxx/CVE-2022-43392.json index 1efad15f282..6d69ef5077e 100644 --- a/2022/43xxx/CVE-2022-43392.json +++ b/2022/43xxx/CVE-2022-43392.json @@ -15,7 +15,7 @@ "product": { "product_data": [ { - "product_name": "Nebula NR7101 firmware", + "product_name": "NR7101 firmware", "version": { "version_data": [ { @@ -62,8 +62,8 @@ "description_data": [ { "lang": "eng", - "value": "A buffer overflow vulnerability in the parameter of web server in Zyxel Nebula NR7101 firmware prior to V1.15(ACCC.3)C0, which could allow an authenticated attacker to cause denial-of-service (DoS) conditions by sending a crafted authorization request." + "value": "A buffer overflow vulnerability in the parameter of web server in Zyxel NR7101 firmware prior to V1.15(ACCC.3)C0, which could allow an authenticated attacker to cause denial-of-service (DoS) conditions by sending a crafted authorization request." } ] } -} \ No newline at end of file +}