From e10af35dbddebb394a0cf79b307466a295fddadd Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 23 Jan 2020 02:01:15 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2020/5xxx/CVE-2020-5223.json | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/2020/5xxx/CVE-2020-5223.json b/2020/5xxx/CVE-2020-5223.json index 933c23b951b..e0529a9f295 100644 --- a/2020/5xxx/CVE-2020-5223.json +++ b/2020/5xxx/CVE-2020-5223.json @@ -38,7 +38,7 @@ "description_data": [ { "lang": "eng", - "value": "In PrivateBin versions 1.2.0 before 1.2.2, and 1.3.0 before 1.3.2, a persistent XSS attack is possible.\n\nUnder certain conditions, a user provided attachment file name can inject HTML leading to a persistent Cross-site scripting (XSS) vulnerability. \n\nThe vulnerability has been fixed in PrivateBin v1.3.2 & v1.2.2. Admins are urged to upgrade to these versions to protect the affected users." + "value": "In PrivateBin versions 1.2.0 before 1.2.2, and 1.3.0 before 1.3.2, a persistent XSS attack is possible. Under certain conditions, a user provided attachment file name can inject HTML leading to a persistent Cross-site scripting (XSS) vulnerability. The vulnerability has been fixed in PrivateBin v1.3.2 & v1.2.2. Admins are urged to upgrade to these versions to protect the affected users." } ] }, @@ -98,4 +98,4 @@ "advisory": "GHSA-8j72-p2wm-6738", "discovery": "UNKNOWN" } -} +} \ No newline at end of file