From e5cc46ed9d452d12f7373865240d37a70878ecc6 Mon Sep 17 00:00:00 2001 From: Garrit Witters <89417378+gew3784@users.noreply.github.com> Date: Fri, 21 Oct 2022 15:57:00 -0400 Subject: [PATCH] Update CVE-2014-7932.yml Increase upvotes by 15 and add nickname field. --- cves/CVE-2014-7932.yml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/cves/CVE-2014-7932.yml b/cves/CVE-2014-7932.yml index 24bcfeb7f..af4bb4011 100644 --- a/cves/CVE-2014-7932.yml +++ b/cves/CVE-2014-7932.yml @@ -1,5 +1,6 @@ --- CVE: CVE-2014-7932 +nickname: Mischievous Memory Meddling CWE_instructions: | Please go to cwe.mitre.org and find the most specific, appropriate CWE entry that describes your vulnerability. (Tip: this may not be a good one to start @@ -78,7 +79,7 @@ upvotes_instructions: | upvotes to each vulnerability you see. Your peers will tell you how interesting they think this vulnerability is, and you'll add that to the upvotes score on your branch. -upvotes: 4 +upvotes: 19 unit_tested: question: | Were automated unit tests involved in this vulnerability?