add inline details
diff --git a/content/security/json/CVE-2022-28614.json b/content/security/json/CVE-2022-28614.json
index 911b151..c47c580 100644
--- a/content/security/json/CVE-2022-28614.json
+++ b/content/security/json/CVE-2022-28614.json
@@ -11,7 +11,7 @@
     "DATE_PUBLIC": "",
     "TITLE": "read beyond bounds via ap_rwrite() ",
     "AKA": "",
-    "STATE": "REVIEW"
+    "STATE": "PUBLIC"
   },
   "source": {
     "defect": [],
@@ -67,7 +67,7 @@
   "description": {
     "description_data": [
       {
-        "value": "The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function.",
+        "value": "The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function.\n\nModules compiled and distributed separately from Apache HTTP Server that use the \"ap_rputs\" function and may pass it a very large (INT_MAX or larger) string must be compiled against current headers to resolve\nthe issue.",
         "lang": "eng"
       }
     ]
@@ -76,7 +76,7 @@
     "reference_data": [
       {
         "refsource": "CONFIRM",
-        "url": "",
+        "url": "https://httpd.apache.org/security/vulnerabilities_24.html",
         "name": ""
       }
     ]
@@ -108,15 +108,15 @@
     "CVE_list": [],
     "internal_comments": "",
     "todo": [],
-    "emailed": "",
-    "userslist": "",
+    "emailed": "yes",
+    "userslist": "dev@httpd.apache.org",
     "email": ""
   },
   "timeline": [
     {
-      "lang": "eng",
       "time": "2022-06-08",
-      "value": "2.4.54 released"
+      "lang": "eng",
+      "value": "released in 2.4.54"
     }
   ]
 }