From bacc86d28e2bde3be6d366131e94d3c4c0999f38 Mon Sep 17 00:00:00 2001 From: Tod Beardsley Date: Thu, 3 Sep 2020 08:47:24 -0500 Subject: [PATCH] Update for vendor name Same as rapid7#33 -- add the vendor name to the title and desc --- 2020/7xxx/CVE-2020-7381.json | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/2020/7xxx/CVE-2020-7381.json b/2020/7xxx/CVE-2020-7381.json index aca662e158a..efc15257271 100644 --- a/2020/7xxx/CVE-2020-7381.json +++ b/2020/7xxx/CVE-2020-7381.json @@ -3,7 +3,7 @@ "ASSIGNER": "cve@rapid7.con", "ID": "CVE-2020-7381", "STATE": "PUBLIC", - "TITLE": "Code Injection in Nexpose Installer" + "TITLE": "Code Injection in Rapid7 Nexpose Installer" }, "affects": { "vendor": { @@ -42,7 +42,7 @@ "description_data": [ { "lang": "eng", - "value": "In Nexpose installer versions prior to 6.6.40, the Nexpose installer calls an executable which can be placed in the appropriate directory by an attacker with access to the local machine. This would prevent the installer from distinguishing between a valid executable called during a Security Console installation and any arbitrary code executable using the same file name." + "value": "In Rapid7 Nexpose installer versions prior to 6.6.40, the Nexpose installer calls an executable which can be placed in the appropriate directory by an attacker with access to the local machine. This would prevent the installer from distinguishing between a valid executable called during a Security Console installation and any arbitrary code executable using the same file name." } ] },