data/reports: update GO-2023-1494.yaml
For golang/vulndb#1494
Change-Id: I6d91b7a4c1cb73f3124ab024a6d33190aaf71bdb
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/464536
Auto-Submit: Julie Qiu <julieqiu@google.com>
TryBot-Result: Gopher Robot <gobot@golang.org>
Run-TryBot: Julie Qiu <julieqiu@google.com>
Reviewed-by: Julie Qiu <julieqiu@google.com>
Reviewed-by: Tatiana Bradley <tatianabradley@google.com>
Auto-Submit: Tatiana Bradley <tatianabradley@google.com>
diff --git a/data/osv/GO-2023-1494.json b/data/osv/GO-2023-1494.json
index a6d180b..c7cc363 100644
--- a/data/osv/GO-2023-1494.json
+++ b/data/osv/GO-2023-1494.json
@@ -6,7 +6,7 @@
"CVE-2014-125064",
"GHSA-g7mw-9pf9-p2pm"
],
- "details": "There is a potential for SQL injection through manipulate of the sqlStatement argument.",
+ "details": "There is a potential for SQL injection through manipulation of the sqlStatement argument.",
"affected": [
{
"package": {
diff --git a/data/reports/GO-2023-1494.yaml b/data/reports/GO-2023-1494.yaml
index 3dba2a2..bd71312 100644
--- a/data/reports/GO-2023-1494.yaml
+++ b/data/reports/GO-2023-1494.yaml
@@ -12,7 +12,7 @@
derived_symbols:
- QueryDbToArrayJson
- QueryDbToMapJson
-description: There is a potential for SQL injection through manipulate of the sqlStatement
+description: There is a potential for SQL injection through manipulation of the sqlStatement
argument.
cves:
- CVE-2014-125064