diff --git a/2021/40xxx/CVE-2021-40531.json b/2021/40xxx/CVE-2021-40531.json index bbbed31faf1..4e60ce9b6b1 100644 --- a/2021/40xxx/CVE-2021-40531.json +++ b/2021/40xxx/CVE-2021-40531.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "Sketch before 75 mishandles external library feeds." + "value": "An issue discovered in sketch before version 75,that allows for library feeds to be used to bypass file quarantine which results in remote code execution." } ] }, diff --git a/2021/43xxx/CVE-2021-43785.json b/2021/43xxx/CVE-2021-43785.json index c903dff3c01..a3227060a6e 100644 --- a/2021/43xxx/CVE-2021-43785.json +++ b/2021/43xxx/CVE-2021-43785.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "@joeattardi/emoji-button is a Vanilla JavaScript emoji picker component. In affected versions there are two vectors for XSS attacks: a URL for a custom emoji, and an i18n string. In both of these cases, a value can be crafted such that it can insert a `script` tag into the page and execute malicious code. " + "value": "@joeattardi/emoji-button is a Vanilla JavaScript emoji picker component. In affected versions there are two vectors for XSS attacks: a URL for a custom emoji, and an i18n string. In both of these cases, a value can be crafted such that it can insert a `script` tag into the page and execute malicious code." } ] },