aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorJochen Neumeister <joneum@FreeBSD.org>2020-07-23 22:43:55 +0800
committerJochen Neumeister <joneum@FreeBSD.org>2020-07-23 22:43:55 +0800
commitf47b428eedc9bb1505dd679256711e64325b61da (patch)
tree01d92a2be82bb177e3b9dcebe3cbaa1e69a4e522
parent569e7f20b3c5548e36de155c6715fe114dfe9077 (diff)
downloadfreebsd-ports-gnome-f47b428eedc9bb1505dd679256711e64325b61da.tar.gz
freebsd-ports-gnome-f47b428eedc9bb1505dd679256711e64325b61da.tar.zst
freebsd-ports-gnome-f47b428eedc9bb1505dd679256711e64325b61da.zip
Fix typo
Sponsored by: Netzkommune GmbH
-rw-r--r--security/vuxml/vuln.xml2
1 files changed, 1 insertions, 1 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index f806404775ca..90927c0bc61a 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -89,7 +89,7 @@ Notes:
requests with invalid payload lengths could lead to a denial of service.</p>
<p>A specially crafted sequence of HTTP/2 requests could trigger high CPU
usage for several seconds. If a sufficient number of such requests were
- +made on concurrent HTTP/2 connections, the server could become unresponsive.</p>
+ made on concurrent HTTP/2 connections, the server could become unresponsive.</p>
</body>
</description>
<references>