From 5ddc370310a9d0cf841701a39b96db21e11d3a2b Mon Sep 17 00:00:00 2001 From: Angela Ngo <54916204+apple0pi@users.noreply.github.com> Date: Thu, 27 Oct 2022 14:11:40 -0400 Subject: [PATCH] Update CVE-2013-2879.yml reupdated the upvotes cause this was supposed to be 10 instead of adding 20 --- cves/CVE-2013-2879.yml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/cves/CVE-2013-2879.yml b/cves/CVE-2013-2879.yml index 07a6f320d..f5ce4b9eb 100644 --- a/cves/CVE-2013-2879.yml +++ b/cves/CVE-2013-2879.yml @@ -1,5 +1,6 @@ --- CVE: CVE-2013-2879 +nickname: synching ships CWE_instructions: | Please go to cwe.mitre.org and find the most specific, appropriate CWE entry that describes your vulnerability. (Tip: this may not be a good one to start @@ -82,7 +83,7 @@ upvotes_instructions: | upvotes to each vulnerability you see. Your peers will tell you how interesting they think this vulnerability is, and you'll add that to the upvotes score on your branch. -upvotes: 9 +upvotes: 19 unit_tested: question: | Were automated unit tests involved in this vulnerability?