diff options
author | Jochen Neumeister <joneum@FreeBSD.org> | 2020-07-23 14:43:55 +0000 |
---|---|---|
committer | Jochen Neumeister <joneum@FreeBSD.org> | 2020-07-23 14:43:55 +0000 |
commit | f47b428eedc9bb1505dd679256711e64325b61da (patch) | |
tree | 01d92a2be82bb177e3b9dcebe3cbaa1e69a4e522 | |
parent | modified the tomcat entry and add CVE-2020-11996 (diff) |
Fix typo
Sponsored by: Netzkommune GmbH
Notes
Notes:
svn path=/head/; revision=542935
-rw-r--r-- | security/vuxml/vuln.xml | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index f806404775ca..90927c0bc61a 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -89,7 +89,7 @@ Notes: requests with invalid payload lengths could lead to a denial of service.</p> <p>A specially crafted sequence of HTTP/2 requests could trigger high CPU usage for several seconds. If a sufficient number of such requests were - +made on concurrent HTTP/2 connections, the server could become unresponsive.</p> + made on concurrent HTTP/2 connections, the server could become unresponsive.</p> </body> </description> <references> |