diff options
author | Jochen Neumeister <joneum@FreeBSD.org> | 2020-07-23 22:43:55 +0800 |
---|---|---|
committer | Jochen Neumeister <joneum@FreeBSD.org> | 2020-07-23 22:43:55 +0800 |
commit | f47b428eedc9bb1505dd679256711e64325b61da (patch) | |
tree | 01d92a2be82bb177e3b9dcebe3cbaa1e69a4e522 | |
parent | 569e7f20b3c5548e36de155c6715fe114dfe9077 (diff) | |
download | freebsd-ports-gnome-f47b428eedc9bb1505dd679256711e64325b61da.tar.gz freebsd-ports-gnome-f47b428eedc9bb1505dd679256711e64325b61da.tar.zst freebsd-ports-gnome-f47b428eedc9bb1505dd679256711e64325b61da.zip |
Fix typo
Sponsored by: Netzkommune GmbH
-rw-r--r-- | security/vuxml/vuln.xml | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index f806404775ca..90927c0bc61a 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -89,7 +89,7 @@ Notes: requests with invalid payload lengths could lead to a denial of service.</p> <p>A specially crafted sequence of HTTP/2 requests could trigger high CPU usage for several seconds. If a sufficient number of such requests were - +made on concurrent HTTP/2 connections, the server could become unresponsive.</p> + made on concurrent HTTP/2 connections, the server could become unresponsive.</p> </body> </description> <references> |