From b3bca16060f10a6c928726ca0494e628645866db Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 4 Jun 2021 22:00:56 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2021/32xxx/CVE-2021-32641.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/2021/32xxx/CVE-2021-32641.json b/2021/32xxx/CVE-2021-32641.json index c0fafbbe4e9..9be00c2908a 100644 --- a/2021/32xxx/CVE-2021-32641.json +++ b/2021/32xxx/CVE-2021-32641.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "auth0-lock is Auth0's signin solution. Versions of nauth0-lock before and including `11.30.0` are vulnerable to reflected XSS. An attacker can execute arbitrary code when the library's `flashMessage` feature is utilized and user input or data from URL parameters is incorporated into the `flashMessage` or the library's `languageDictionary` feature is utilized and user input or data from URL parameters is incorporated into the `languageDictionary`. The vulnerability is patched in version 11.30.1." + "value": "auth0-lock is Auth0's signin solution. Versions of nauth0-lock before and including `11.30.0` are vulnerable to reflected XSS. An attacker can execute arbitrary code when the library's `flashMessage` feature is utilized and user input or data from URL parameters is incorporated into the `flashMessage` or the library's `languageDictionary` feature is utilized and user input or data from URL parameters is incorporated into the `languageDictionary`. The vulnerability is patched in version 11.30.1." } ] },