data/reports: update GO-2023-1494.yaml

For golang/vulndb#1494

Change-Id: I6d91b7a4c1cb73f3124ab024a6d33190aaf71bdb
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/464536
Auto-Submit: Julie Qiu <julieqiu@google.com>
TryBot-Result: Gopher Robot <gobot@golang.org>
Run-TryBot: Julie Qiu <julieqiu@google.com>
Reviewed-by: Julie Qiu <julieqiu@google.com>
Reviewed-by: Tatiana Bradley <tatianabradley@google.com>
Auto-Submit: Tatiana Bradley <tatianabradley@google.com>
diff --git a/data/osv/GO-2023-1494.json b/data/osv/GO-2023-1494.json
index a6d180b..c7cc363 100644
--- a/data/osv/GO-2023-1494.json
+++ b/data/osv/GO-2023-1494.json
@@ -6,7 +6,7 @@
     "CVE-2014-125064",
     "GHSA-g7mw-9pf9-p2pm"
   ],
-  "details": "There is a potential for SQL injection through manipulate of the sqlStatement argument.",
+  "details": "There is a potential for SQL injection through manipulation of the sqlStatement argument.",
   "affected": [
     {
       "package": {
diff --git a/data/reports/GO-2023-1494.yaml b/data/reports/GO-2023-1494.yaml
index 3dba2a2..bd71312 100644
--- a/data/reports/GO-2023-1494.yaml
+++ b/data/reports/GO-2023-1494.yaml
@@ -12,7 +12,7 @@
         derived_symbols:
           - QueryDbToArrayJson
           - QueryDbToMapJson
-description: There is a potential for SQL injection through manipulate of the sqlStatement
+description: There is a potential for SQL injection through manipulation of the sqlStatement
     argument.
 cves:
   - CVE-2014-125064