diff options
author | danfe <danfe@FreeBSD.org> | 2017-07-05 03:01:06 +0800 |
---|---|---|
committer | danfe <danfe@FreeBSD.org> | 2017-07-05 03:01:06 +0800 |
commit | 4f3cb5efd3a1fd91ce103f6da547054a88e0c055 (patch) | |
tree | 3b9199eee6dd4a1937e6ec0be032a515eb5f2410 /security | |
parent | beeceeccf35e376ec3e442713a92a4fc157790b0 (diff) | |
download | freebsd-ports-gnome-4f3cb5efd3a1fd91ce103f6da547054a88e0c055.tar.gz freebsd-ports-gnome-4f3cb5efd3a1fd91ce103f6da547054a88e0c055.tar.zst freebsd-ports-gnome-4f3cb5efd3a1fd91ce103f6da547054a88e0c055.zip |
Fix a bunch of noticed typos and spelling mistakes, covering years
2016-2017. Some of those are so common that I've taken liberty to
fix them all over the file.
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 118 |
1 files changed, 59 insertions, 59 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 3a67a17ab44b..bc70bd0d25e0 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -447,7 +447,7 @@ maliciously crafted GET request to the Horde server.</p> </affects> <description> <body xmlns="http://www.w3.org/1999/xhtml"> - <p>Google Chrome releaseses reports:</p> + <p>Google Chrome releases reports:</p> <blockquote cite="https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop_15.html"> <p>5 security fixes in this release, including:</p> <ul> @@ -1655,7 +1655,7 @@ maliciously crafted GET request to the Horde server.</p> filter, content inside Hamlit filters (:css, :javascript, :preserve, :plain) is not automatically escaped.</p> <h1>Cross-Site Scripting (XSS) vulnerability in git submodule support</h1> - <p>Jobert Abma from HackerOne reported a persitent XSS vulnerability in the + <p>Jobert Abma from HackerOne reported a persistent XSS vulnerability in the GitLab repository files view that could be exploited by injecting malicious script into a git submodule.</p> <h1>Cross-Site Scripting (XSS) vulnerability in repository "new branch" @@ -2841,7 +2841,7 @@ maliciously crafted GET request to the Horde server.</p> </vuln> <vuln vid="d9e01c35-2531-11e7-b291-b499baebfeaf"> - <topic>MySQL -- mulitiple vulnerabilities</topic> + <topic>MySQL -- multiple vulnerabilities</topic> <affects> <package> <name>mariadb55-server</name> @@ -3765,7 +3765,7 @@ maliciously crafted GET request to the Horde server.</p> application. Methods and means of acquiring the CRLs is not part of the TLS handshake and in the strict TLS setting this vulnerability cannot be triggered remotely. The vulnerability - cannot be triggered unless the application explicitely calls + cannot be triggered unless the application explicitly calls mbedtls_x509_crl_parse() or mbedtls_x509_crl_parse_file()on a PEM formatted CRL of untrusted origin. In which case the vulnerability can be exploited to launch a denial of service @@ -4562,7 +4562,7 @@ maliciously crafted GET request to the Horde server.</p> </vuln> <vuln vid="79bbb8f8-f049-11e6-8a6a-bcaec565249c"> - <topic>gtk-vnc -- bounds checking vulnabilities</topic> + <topic>gtk-vnc -- bounds checking vulnerabilities</topic> <affects> <package> <name>gtk-vnc</name> @@ -4837,7 +4837,7 @@ maliciously crafted GET request to the Horde server.</p> <p>Jens Georg reports:</p> <blockquote cite="https://mail.gnome.org/archives/shotwell-list/2017-January/msg00048.html"> <p>I have just released Shotwell 0.24.5 and 0.25.4 which turn - on HTTPS encyption all over the publishing plugins.</p> + on HTTPS encryption all over the publishing plugins.</p> <p>Users using Tumblr and Yandex.Fotki publishing are strongly advised to change their passwords and reauthenticate Shotwell to those services after upgrade.</p> @@ -5313,10 +5313,10 @@ maliciously crafted GET request to the Horde server.</p> </blockquote> <blockquote cite="https://www.phpmyadmin.net/security/PMASA-2017-3/"> <h3>Summary</h3> - <p>DOS vulnerabiltiy in table editing</p> + <p>DOS vulnerability in table editing</p> <h3>Description</h3> <p>It was possible to trigger recursive include operation by - crafter parameters when editing table data.</p> + crafted parameters when editing table data.</p> <h3>Severity</h3> <p>We consider this to be non critical.</p> </blockquote> @@ -5385,7 +5385,7 @@ maliciously crafted GET request to the Horde server.</p> </affects> <description> <body xmlns="http://www.w3.org/1999/xhtml"> - <p>Intel Corporaion reports:</p> + <p>Intel Corporation reports:</p> <blockquote cite="https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00063&languageid=en-fr"> <p>A security vulnerability in the Intel(R) Ethernet Controller X710 and Intel(R) Ethernet Controller XL710 family of products @@ -6841,7 +6841,7 @@ maliciously crafted GET request to the Horde server.</p> <body xmlns="http://www.w3.org/1999/xhtml"> <p>Samba team reports:</p> <blockquote cite="https://www.samba.org/samba/latest_news.html#4.5.3"> - <p>[CVE-2016-2123] Authenicated users can supply malicious dnsRecord attributes + <p>[CVE-2016-2123] Authenticated users can supply malicious dnsRecord attributes on DNS objects and trigger a controlled memory corruption.</p> <p>[CVE-2016-2125] Samba client code always requests a forwardable ticket when using Kerberos authentication. This means the target server, which must be in the current or trusted @@ -7032,7 +7032,7 @@ maliciously crafted GET request to the Horde server.</p> <body xmlns="http://www.w3.org/1999/xhtml"> <p>Squid security advisory 2016:10 reports:</p> <blockquote cite="http://www.squid-cache.org/Advisories/SQUID-2016_10.txt"> - <p>Due to incorrect comparsion of request headers Squid can deliver + <p>Due to incorrect comparison of request headers Squid can deliver responses containing private data to clients it should not have reached.</p> <p>This problem allows a remote attacker to discover private and @@ -7249,7 +7249,7 @@ maliciously crafted GET request to the Horde server.</p> <h2>printf floating point buffer overflow</h2> <p>libcurl's implementation of the printf() functions triggers a buffer overflow when doing a large floating point output. The bug - occurs whenthe conversion outputs more than 255 bytes.</p> + occurs when the conversion outputs more than 255 bytes.</p> </blockquote> </body> </description> @@ -7491,7 +7491,7 @@ maliciously crafted GET request to the Horde server.</p> ':' delimiter of any request header lines.<br/><br/> RFC7230 Section 3.5 calls out some of these whitespace exceptions, and section 3.2.3 eliminated and clarified the role of implied - whitespace in the grammer of this specification. Section 3.1.1 + whitespace in the grammar of this specification. Section 3.1.1 requires exactly one single SP between the method and request-target, and between the request-target and HTTP-version, followed immediately by a CRLF sequence. None of these @@ -7505,7 +7505,7 @@ maliciously crafted GET request to the Horde server.</p> application servers, either through mod_proxy or using conventional CGI mechanisms. In each case where one agent accepts such CTL characters and does not treat them as whitespace, there is the - possiblity in a proxy chain of generating two responses from a + possibility in a proxy chain of generating two responses from a server behind the uncautious proxy agent. In a sequence of two requests, this results in request A to the first proxy being interpreted as requests A + A' by the backend server, and if @@ -8299,7 +8299,7 @@ maliciously crafted GET request to the Horde server.</p> <blockquote cite="http://seclists.org/oss-sec/2016/q4/413"> <p>Imagemagick before 3cbfb163cff9e5b8cdeace8312e9bfee810ed02b suffer from a heap overflow in WaveletDenoiseImage(). This problem is - easelly trigerrable from a perl script.</p> + easily trigerrable from a Perl script.</p> </blockquote> </body> </description> @@ -8401,7 +8401,7 @@ maliciously crafted GET request to the Horde server.</p> sensitive host files (an information leak). Additionally, a malicious guest administrator can cause files on the host to be removed, causing a denial of service. In some unusual host - configurations, ability to remove certain files may be useable for + configurations, ability to remove certain files may be usable for privilege escalation.</p> </blockquote> </body> @@ -9466,8 +9466,8 @@ maliciously crafted GET request to the Horde server.</p> <p>LegalHackers' reports:</p> <blockquote cite="http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html"> <p>RCE Bugs discovered in MySQL and its variants like MariaDB. - It works by manupulating my.cnf files and using --malloc-lib. - The bug seems fixed in MySQL5.7.15 by Oracle</p> + It works by manipulating my.cnf files and using --malloc-lib. + The bug seems fixed in MySQL 5.7.15 by Oracle</p> </blockquote> </body> </description> @@ -10511,7 +10511,7 @@ fuzzing and other initiatives.</li> </affects> <description> <body xmlns="http://www.w3.org/1999/xhtml"> - <p>Node.js has released new verions containing the following security fix:</p> + <p>Node.js has released new versions containing the following security fix:</p> <blockquote cite="https://nodejs.org/en/blog/vulnerability/october-2016-security-releases/"> <p>The following releases all contain fixes for CVE-2016-5180 "ares_create_query single byte out of buffer write": Node.js v0.10.48 (Maintenance), Node.js v0.12.17 (Maintenance), @@ -11045,7 +11045,7 @@ and CVE-2013-0155.</p> <p>Debian reports:</p> <blockquote cite="https://www.debian.org/security/2016/dsa-3675"> <p>Various memory handling problems and cases of missing or - incomplete input sanitising may result in denial of service or the + incomplete input sanitizing may result in denial of service or the execution of arbitrary code if malformed SIXEL, PDB, MAP, SGI, TIFF and CALS files are processed.</p> </blockquote> @@ -11299,7 +11299,7 @@ and CVE-2013-0155.</p> directory.</p> <h1>Impact:</h1> <p>An attacker who can control freebsd-update's or portsnap's - input to tar can change file content or permisssions on + input to tar(1) can change file content or permissions on files outside of the update tool's working sandbox.</p> </body> </description> @@ -11856,8 +11856,8 @@ and CVE-2013-0155.</p> <p>LegalHackers' reports:</p> <blockquote cite="http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html"> <p>RCE Bugs discovered in MySQL and its variants like MariaDB. - It works by manupulating my.cnf files and using --malloc-lib. - The bug seems fixed in MySQL5.7.15 by Oracle</p> + It works by manipulating my.cnf files and using --malloc-lib. + The bug seems fixed in MySQL 5.7.15 by Oracle</p> </blockquote> </body> </description> @@ -12613,7 +12613,7 @@ and CVE-2013-0155.</p> </vuln> <vuln vid="e195679d-045b-4953-bb33-be0073ba2ac6"> - <topic>libxml2 -- multiple vulnabilities</topic> + <topic>libxml2 -- multiple vulnerabilities</topic> <affects> <package> <name>libxml2</name> @@ -13880,7 +13880,7 @@ and CVE-2013-0155.</p> <h1>Problem Description:</h1> <p>The SNMP protocol supports an authentication model called USM, which relies on a shared secret. The default permission - of the snmpd.configiguration file, /etc/snmpd.config, is + of the snmpd configuration file, /etc/snmpd.config, is weak and does not provide adequate protection against local unprivileged users.</p> <h1>Impact:</h1> @@ -14184,7 +14184,7 @@ and CVE-2013-0155.</p> would run commands.</p> <h1>Impact:</h1> <p>This issue could be exploited to execute arbitrary - commands as the user invoking patch(1) against a specically + commands as the user invoking patch(1) against a specially crafted patch file, which could be leveraged to obtain elevated privileges.</p> </body> @@ -14260,7 +14260,7 @@ and CVE-2013-0155.</p> commands.</p> <h1>Impact:</h1> <p>This issue could be exploited to execute arbitrary - commands as the user invoking patch(1) against a specically + commands as the user invoking patch(1) against a specially crafted patch file, which could be leveraged to obtain elevated privileges.</p> </body> @@ -14463,7 +14463,7 @@ and CVE-2013-0155.</p> can read or write 16-bits of kernel memory.</p> <h1>Impact:</h1> <p>An unprivileged process can read or modify 16-bits of - memory which belongs to the kernel. This smay lead to + memory which belongs to the kernel. This may lead to exposure of sensitive information or allow privilege escalation.</p> </body> @@ -15869,7 +15869,7 @@ and CVE-2013-0155.</p> pre-existing pagetable entries, to skip expensive re-validation in safe cases (e.g. clearing only Access/Dirty bits). The bits considered safe were too broad, and not actually safe.</p> - <p>A malicous PV guest administrator can escalate their privilege to + <p>A malicious PV guest administrator can escalate their privilege to that of the host.</p> </blockquote> </body> @@ -15886,7 +15886,7 @@ and CVE-2013-0155.</p> </vuln> <vuln vid="cb5189eb-572f-11e6-b334-002590263bf5"> - <topic>libidn -- mulitiple vulnerabilities</topic> + <topic>libidn -- multiple vulnerabilities</topic> <affects> <package> <name>libidn</name> @@ -16408,7 +16408,7 @@ and CVE-2013-0155.</p> </vuln> <vuln vid="00cb1469-4afc-11e6-97ea-002590263bf5"> - <topic>atutor -- multiple vulnerabilites</topic> + <topic>atutor -- multiple vulnerabilities</topic> <affects> <package> <name>atutor</name> @@ -16435,7 +16435,7 @@ and CVE-2013-0155.</p> </vuln> <vuln vid="ffa8ca79-4afb-11e6-97ea-002590263bf5"> - <topic>atutor -- multiple vulnerabilites</topic> + <topic>atutor -- multiple vulnerabilities</topic> <affects> <package> <name>atutor</name> @@ -16901,7 +16901,7 @@ and CVE-2013-0155.</p> rate-limited in any way. The guest can easily cause qemu to print messages to stderr, causing this file to become arbitrarily large. </p> - <p>The disk containing the logfile can be exausted, possibly causing a + <p>The disk containing the logfile can be exhausted, possibly causing a denial-of-service (DoS).</p> </blockquote> </body> @@ -18037,7 +18037,7 @@ and CVE-2013-0155.</p> <body xmlns="http://www.w3.org/1999/xhtml"> <p>Piwik reports:</p> <blockquote cite="http://piwik.org/changelog/piwik-2-16-1/"> - <p>iThe Piwik Security team is grateful for the responsible + <p>The Piwik Security team is grateful for the responsible disclosures by our security researchers: Egidio Romano (granted a critical security bounty), James Kettle and Paweł Bartunek (XSS) and Emanuel Bronshtein (limited XSS).</p> @@ -21844,10 +21844,10 @@ and CVE-2013-0155.</p> <p>JMS Object messages depends on Java Serialization for marshaling/unmashaling of the message payload. There are a couple of places inside the broker where deserialization can occur, like web console or stomp - object message transformation. As deserialization of untrusted data can leaed to + object message transformation. As deserialization of untrusted data can lead to security flaws as demonstrated in various reports, this leaves the broker - vunerable to this attack vector. Additionally, applications that consume - ObjectMessage type of messages can be vunerable as they deserlize objects on + vulnerable to this attack vector. Additionally, applications that consume + ObjectMessage type of messages can be vulnerable as they deserialize objects on ObjectMessage.getObject() calls.</p> </blockquote> </body> @@ -23108,7 +23108,7 @@ and CVE-2013-0155.</p> <p>Andreas Schneider reports:</p> <blockquote cite="https://www.libssh.org/2016/02/23/libssh-0-7-3-security-and-bugfix-release/"> <p>libssh versions 0.1 and above have a bits/bytes confusion bug and - generate the an anormaly short ephemeral secret for the + generate an abnormally short ephemeral secret for the diffie-hellman-group1 and diffie-hellman-group14 key exchange methods. The resulting secret is 128 bits long, instead of the recommended sizes of 1024 and 2048 bits respectively. There are @@ -23134,7 +23134,7 @@ and CVE-2013-0155.</p> </vuln> <vuln vid="7d09b9ee-e0ba-11e5-abc4-6fb07af136d2"> - <topic>exim -- local privilleges escalation</topic> + <topic>exim -- local privillege escalation</topic> <affects> <package> <name>exim</name> @@ -23532,7 +23532,7 @@ and CVE-2013-0155.</p> <p>The Apache Software Foundation reports:</p> <blockquote cite="http://xerces.apache.org/xerces-c/secadv/CVE-2016-0729.txt"> <p>The Xerces-C XML parser mishandles certain kinds of malformed input - documents, resulting in buffer overlows during processing and error + documents, resulting in buffer overflows during processing and error reporting. The overflows can manifest as a segmentation fault or as memory corruption during a parse operation. The bugs allow for a denial of service attack in many applications by an unauthenticated @@ -26466,14 +26466,14 @@ and CVE-2013-0155.</p> <body xmlns="http://www.w3.org/1999/xhtml"> <p>DrWhax reports:</p> <blockquote cite="http://www.thewildbeast.co.uk/claws-mail/bugzilla/show_bug.cgi?id=3557"> - <p>So in codeconv.c there is a function for japanese character set + <p>So in codeconv.c there is a function for Japanese character set conversion called conv_jistoeuc(). There is no bounds checking on the output buffer, which is created on the stack with alloca() Bug can be triggered by sending an email to TAILS_luser@riseup.net or whatever. Since my C is completely rusty, you might be able to make a better - judgement on the severity of this issue. Marking critical for now.</p> + judgment on the severity of this issue. Marking critical for now.</p> </blockquote> </body> </description> @@ -28407,7 +28407,7 @@ and CVE-2013-0155.</p> </vuln> <vuln vid="84c7ea88-bf04-4bdc-973b-36744bf540ab"> - <topic>flash -- multiple vulnabilities</topic> + <topic>flash -- multiple vulnerabilities</topic> <affects> <package> <name>linux-c6-flashplugin</name> @@ -29013,7 +29013,7 @@ and CVE-2013-0155.</p> a potential volume name of something like '../../../etc/passwd' to attempt to access a file not belonging to the storage pool. When fine-grained Access Control Lists (ACL) are in effect, a user with - storage_vol:create ACL permission but lacking domain:write permssion + storage_vol:create ACL permission but lacking domain:write permission could thus abuse virStorageVolCreateXML and similar APIs to gain access to files not normally permitted to that user. Fortunately, it appears that the only APIs that could leak information or corrupt @@ -29306,7 +29306,7 @@ and CVE-2013-0155.</p> <body xmlns="http://www.w3.org/1999/xhtml"> <p>ISC reports:</p> <blockquote cite="https://kb.isc.org/article/AA-01328/0/BIND-9.10.3-P2-Release-Notes.html"> - <p>Named is potentially vulnerable to the OpenSSL vulnerabilty described in CVE-2015-3193.</p> + <p>Named is potentially vulnerable to the OpenSSL vulnerability described in CVE-2015-3193.</p> <p>Incorrect reference counting could result in an INSIST failure if a socket error occurred while performing a lookup. This flaw is disclosed in CVE-2015-8461. [RT#40945]</p> @@ -29836,7 +29836,7 @@ and CVE-2013-0155.</p> <body xmlns="http://www.w3.org/1999/xhtml"> <p>Redmine reports:</p> <blockquote cite="http://www.redmine.org/projects/redmine/wiki/Security_Advisories"> - <p>Mass-assignemnt vulnerability that would allow an attacker to + <p>Mass-assignment vulnerability that would allow an attacker to bypass part of the security checks.</p> <p>Persistent XSS vulnerability</p> </blockquote> @@ -29928,7 +29928,7 @@ and CVE-2013-0155.</p> </vuln> <vuln vid="c8842a84-9ddd-11e5-8c2f-c485083ca99c"> - <topic>flash -- multiple vulnabilities</topic> + <topic>flash -- multiple vulnerabilities</topic> <affects> <package> <name>linux-c6-flashplugin</name> @@ -30865,7 +30865,7 @@ and CVE-2013-0155.</p> </vuln> <vuln vid="e5423caf-8fb8-11e5-918c-bcaec565249c"> - <topic>libxml2 -- multiple vulnabilities</topic> + <topic>libxml2 -- multiple vulnerabilities</topic> <affects> <package> <name>libxml2</name> @@ -31236,7 +31236,7 @@ and CVE-2013-0155.</p> </vuln> <vuln vid="547fbd98-8b1f-11e5-b48b-bcaec565249c"> - <topic>flash -- multiple vulnabilities</topic> + <topic>flash -- multiple vulnerabilities</topic> <affects> <package> <name>linux-c6-flashplugin</name> @@ -33534,7 +33534,7 @@ and CVE-2013-0155.</p> </vuln> <vuln vid="4e3e8a50-65c1-11e5-948e-bcaec565249c"> - <topic>flash -- multiple vulnabilities</topic> + <topic>flash -- multiple vulnerabilities</topic> <affects> <package> <name>linux-c6-flashplugin</name> @@ -40554,7 +40554,7 @@ and CVE-2013-0155.</p> </vuln> <vuln vid="d46ed7b8-1912-11e5-9fdf-00262d5ed8ee"> - <topic>www/chromium -- mulitple vulnerabilities</topic> + <topic>www/chromium -- multiple vulnerabilities</topic> <affects> <package> <name>chromium</name> @@ -43726,7 +43726,7 @@ and CVE-2013-0155.</p> </vuln> <vuln vid="505904d3-ea95-11e4-beaf-bcaec565249c"> - <topic>wordpress -- multiple vulnabilities</topic> + <topic>wordpress -- multiple vulnerabilities</topic> <affects> <package> <name>wordpress</name> @@ -49192,8 +49192,8 @@ and CVE-2013-0155.</p> limited amount of information exposure.</p> <p>SECURITY-127 and SECURITY-128 are rated <strong>high</strong>. The - formed can be used to further escalate privileges, and the latter - results inloss of data.</p> + former can be used to further escalate privileges, and the latter + results in loss of data.</p> <p>SECURITY-131 and SECURITY-138 is rated <strong>critical</strong>. This vulnerabilities results in exposure of sensitie information @@ -102539,7 +102539,7 @@ executed in your Internet Explorer while displaying the email.</p> </blockquote> <blockquote cite="http://drupal.org/node/184348"> <p>The Drupal Forms API protects against cross site request - forgeries (CSRF), where a malicous site can cause a user + forgeries (CSRF), where a malicious site can cause a user to unintentionally submit a form to a site where he is authenticated. The user deletion form does not follow the standard Forms API submission model and is therefore not @@ -105879,7 +105879,7 @@ executed in your Internet Explorer while displaying the email.</p> <body xmlns="http://www.w3.org/1999/xhtml"> <p>The freeradius development team reports:</p> <blockquote cite="http://www.freeradius.org/security.html"> - <p>A malicous 802.1x supplicant could send malformed Diameter format + <p>A malicious 802.1x supplicant could send malformed Diameter format attributes inside of an EAP-TTLS tunnel. The server would reject the authentication request, but would leak one VALUE_PAIR data structure, of approximately 300 bytes. If an attacker performed @@ -120075,7 +120075,7 @@ executed in your Internet Explorer while displaying the email.</p> <p>In fetchmail 6.2.5.1, the remote code injection via POP3 UIDL was fixed, but a denial of service attack was introduced:</p> - <p>Two possible NULL-pointer dereferences allow a malicous + <p>Two possible NULL-pointer dereferences allow a malicious POP3 server to crash fetchmail by respondig with UID lines containing only the article number but no UID (in violation of RFC-1939), or a message without Message-ID when no UIDL @@ -129031,7 +129031,7 @@ http_access deny Gopher</pre> <p><code>acl something src "/path/to/empty_file.txt"<br/> http_access allow something somewhere</code></p> <p>gets parsed (with warnings) as</p> - <p><code>http_access allow somwhere</code></p> + <p><code>http_access allow somewhere</code></p> <p>And similarily if you are using proxy_auth acls without having any auth schemes defined.</p> </blockquote> @@ -131313,7 +131313,7 @@ http_access deny Gopher</pre> </affects> <description> <body xmlns="http://www.w3.org/1999/xhtml"> - <p>Sean <q>infamous42md</q> reports that a malicous GroupWise + <p>Sean <q>infamous42md</q> reports that a malicious GroupWise messaging server may be able to exploit a heap buffer overflow in gaim, leading to arbitrary code execution.</p> </body> |