data/reports: fix some report summaries to match style

Change-Id: I8fb5e80041ae95f2aec000f90a9a36b6b7bacbb5
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/542359
LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
Reviewed-by: Damien Neil <dneil@google.com>
diff --git a/data/osv/GO-2023-2024.json b/data/osv/GO-2023-2024.json
index a9fb203..869c90c 100644
--- a/data/osv/GO-2023-2024.json
+++ b/data/osv/GO-2023-2024.json
@@ -7,7 +7,7 @@
     "CVE-2023-40583",
     "GHSA-gcq9-qqwx-rgj3"
   ],
-  "summary": "libp2p nodes vulnerable to OOM attack",
+  "summary": "Out-of-memory vulnerability in github.com/libp2p/go-libp2p",
   "details": "A malicious actor can store an arbitrary amount of data in the memory of a remote node by sending the node a message with a signed peer record. Signed peer records from randomly generated peers can be sent by a malicious actor. This memory does not get garbage collected and so the remote node can run out of memory (OOM).",
   "affected": [
     {
diff --git a/data/osv/GO-2023-2153.json b/data/osv/GO-2023-2153.json
index 5666c70..c4f0c44 100644
--- a/data/osv/GO-2023-2153.json
+++ b/data/osv/GO-2023-2153.json
@@ -9,7 +9,7 @@
   "related": [
     "CVE-2023-44487"
   ],
-  "summary": "denial of service from HTTP/2 Rapid Reset in google.golang.org/grpc",
+  "summary": "Denial of service from HTTP/2 Rapid Reset in google.golang.org/grpc",
   "details": "An attacker can send HTTP/2 requests, cancel them, and send subsequent requests. This is valid by the HTTP/2 protocol, but would cause the gRPC-Go server to launch more concurrent method handlers than the configured maximum stream limit, `grpc.MaxConcurrentStreams`. This results in a denial of service due to resource consumption.",
   "affected": [
     {
diff --git a/data/osv/GO-2023-2160.json b/data/osv/GO-2023-2160.json
index 3378019..fc64cbf 100644
--- a/data/osv/GO-2023-2160.json
+++ b/data/osv/GO-2023-2160.json
@@ -7,7 +7,7 @@
     "CVE-2023-46239",
     "GHSA-3q6m-v84f-6p9h"
   ],
-  "summary": "panic during QUIC handshake in github.com/quic-go/quic-go",
+  "summary": "Panic during QUIC handshake in github.com/quic-go/quic-go",
   "details": "The QUIC handshake can cause a panic when processing a certain sequence of frames. A malicious peer can deliberately trigger this panic.",
   "affected": [
     {
diff --git a/data/osv/GO-2023-2163.json b/data/osv/GO-2023-2163.json
index 4597e6f..6317eae 100644
--- a/data/osv/GO-2023-2163.json
+++ b/data/osv/GO-2023-2163.json
@@ -7,7 +7,7 @@
     "CVE-2023-46129",
     "GHSA-mr45-rx8q-wcm9"
   ],
-  "summary": "curve KeyPairs fail to encrypt github.com/nats-io/nkeys",
+  "summary": "Curve KeyPairs fail to encrypt in github.com/nats-io/nkeys",
   "details": "Curve KeyPairs always use the same (all-zeros) key to encrypt data, and provide no security.",
   "affected": [
     {
diff --git a/data/reports/GO-2023-2024.yaml b/data/reports/GO-2023-2024.yaml
index 0947b6c..2a57d6c 100644
--- a/data/reports/GO-2023-2024.yaml
+++ b/data/reports/GO-2023-2024.yaml
@@ -15,7 +15,7 @@
             - idService.IdentifyConn
             - idService.IdentifyWait
             - netNotifiee.Connected
-summary: libp2p nodes vulnerable to OOM attack
+summary: Out-of-memory vulnerability in github.com/libp2p/go-libp2p
 description: |-
     A malicious actor can store an arbitrary amount of data in the memory of a
     remote node by sending the node a message with a signed peer record. Signed peer
diff --git a/data/reports/GO-2023-2153.yaml b/data/reports/GO-2023-2153.yaml
index ca93368..b823893 100644
--- a/data/reports/GO-2023-2153.yaml
+++ b/data/reports/GO-2023-2153.yaml
@@ -18,7 +18,7 @@
           derived_symbols:
             - NewServer
             - Server.Serve
-summary: denial of service from HTTP/2 Rapid Reset in google.golang.org/grpc
+summary: Denial of service from HTTP/2 Rapid Reset in google.golang.org/grpc
 description: |-
     An attacker can send HTTP/2 requests, cancel them, and send subsequent requests.
     This is valid by the HTTP/2 protocol, but would cause the gRPC-Go server to
diff --git a/data/reports/GO-2023-2160.yaml b/data/reports/GO-2023-2160.yaml
index d2eb5c0..79c9958 100644
--- a/data/reports/GO-2023-2160.yaml
+++ b/data/reports/GO-2023-2160.yaml
@@ -7,7 +7,7 @@
       vulnerable_at: 0.37.2
       packages:
         - package: github.com/quic-go/quic-go
-summary: panic during QUIC handshake in github.com/quic-go/quic-go
+summary: Panic during QUIC handshake in github.com/quic-go/quic-go
 description: |-
     The QUIC handshake can cause a panic when processing a certain sequence of
     frames. A malicious peer can deliberately trigger this panic.
diff --git a/data/reports/GO-2023-2163.yaml b/data/reports/GO-2023-2163.yaml
index d70c1a0..0a7fadf 100644
--- a/data/reports/GO-2023-2163.yaml
+++ b/data/reports/GO-2023-2163.yaml
@@ -13,7 +13,7 @@
             - ckp.Open
             - ckp.Seal
             - ckp.SealWithRand
-summary: curve KeyPairs fail to encrypt github.com/nats-io/nkeys
+summary: Curve KeyPairs fail to encrypt in github.com/nats-io/nkeys
 description: |-
     Curve KeyPairs always use the same (all-zeros) key to encrypt data,
     and provide no security.