diff --git a/2022/39xxx/CVE-2022-39390.json b/2022/39xxx/CVE-2022-39390.json index 804b6588ec6..77641fa57be 100644 --- a/2022/39xxx/CVE-2022-39390.json +++ b/2022/39xxx/CVE-2022-39390.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "Octocat.js is a library used to render a set of options into an SVG. Versions prior to 1.2 are subject to JavaScript injection via user provided URLs. Users can include their own images for accessories via provided URLs. These URLs are not validated and can result in execution of injected code. This vulnerability was fixed in version 1.2 of octocat.js. As a workaround, writing an image to disk then using that image in an image element in HTML mitigates the risk. " + "value": "Octocat.js is a library used to render a set of options into an SVG. Versions prior to 1.2 are subject to JavaScript injection via user provided URLs. Users can include their own images for accessories via provided URLs. These URLs are not validated and can result in execution of injected code. This vulnerability was fixed in version 1.2 of octocat.js. As a workaround, writing an image to disk then using that image in an image element in HTML mitigates the risk." } ] },