remove autolink garbage from description
diff --git a/content/security/json/CVE-2023-25690.json b/content/security/json/CVE-2023-25690.json
index c27f6f0..3fe4e30 100644
--- a/content/security/json/CVE-2023-25690.json
+++ b/content/security/json/CVE-2023-25690.json
@@ -52,13 +52,13 @@
       ],
       "descriptions": [
         {
-          "value": "Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack.\n\n\n\n\nConfigurations are affected when mod_proxy is enabled along with some form of RewriteRule or ProxyPassMatch in which a non-specific pattern matches some portion of the user-supplied request-target (URL) data and is then re-inserted into the proxied request-target using variable substitution.\n\n For example, something like:\n\n\n\n\nRewriteEngine on\nRewriteRule \"^/here/(.*)\" \" http://example.com:8080/elsewhere?$1\" http://example.com:8080/elsewhere ; [P]\nProxyPassReverse /here/  http://example.com:8080/ http://example.com:8080/ \n\n\nRequest splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning.\n\n\n\n",
+          "value": "Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack.\n\n\n\n\nConfigurations are affected when mod_proxy is enabled along with some form of RewriteRule or ProxyPassMatch in which a non-specific pattern matches some portion of the user-supplied request-target (URL) data and is then re-inserted into the proxied request-target using variable substitution.\n\n For example, something like:\n\n\n\n\nRewriteEngine on\nRewriteRule \"^/here/(.*)\" \"http://example.com:8080/elsewhere?$1\"; [P]\nProxyPassReverse /here/ http://example.com:8080/\n\n\nRequest splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning.\n\n\n\n",
           "lang": "en",
           "supportingMedia": [
             {
               "type": "text/html",
               "base64": false,
-              "value": "<div>Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack.</div><div><br></div><div><div>Configurations are affected when mod_proxy is enabled along with some form of RewriteRule\n or ProxyPassMatch in which a non-specific pattern matches\n some portion of the user-supplied request-target (URL) data and is then\n re-inserted into the proxied request-target using variable \nsubstitution. For example, something like:</div><div><br></div><div>RewriteEngine on<br>RewriteRule \"^/here/(.*)\" \"<a target=\"_blank\" rel=\"nofollow\" href=\"http://example.com:8080/elsewhere?$1&quot;\">http://example.com:8080/elsewhere?$1\"</a>; [P]<br>ProxyPassReverse /here/ <a target=\"_blank\" rel=\"nofollow\" href=\"http://example.com:8080/\">http://example.com:8080/</a></div><br>Request splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning.<br><br></div>"
+              "value": "<div>Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack.</div><div><br></div><div><div>Configurations are affected when mod_proxy is enabled along with some form of RewriteRule\n or ProxyPassMatch in which a non-specific pattern matches\n some portion of the user-supplied request-target (URL) data and is then\n re-inserted into the proxied request-target using variable \nsubstitution. For example, something like:</div><div><br></div><div>RewriteEngine on<br>RewriteRule \"^/here/(.*)\" \"http://example.com:8080/elsewhere?$1\"; [P]<br>ProxyPassReverse /here/ http://example.com:8080/</div><br>Request splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning.<br><br></div>"
             }
           ]
         }