reports: fix typos and remove markdown
This CL covers the range 2021-0046 to 2021-0079.
Change-Id: Iffc09bc898bd33ecfdafcfa48deb4b3e643e6561
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/378114
Trust: Jonathan Amsterdam <jba@google.com>
Run-TryBot: Jonathan Amsterdam <jba@google.com>
TryBot-Result: Gopher Robot <gobot@golang.org>
Reviewed-by: Julie Qiu <julie@golang.org>
diff --git a/reports/GO-2020-0048.yaml b/reports/GO-2020-0048.yaml
index cc2e11d..8e52b06 100644
--- a/reports/GO-2020-0048.yaml
+++ b/reports/GO-2020-0048.yaml
@@ -2,7 +2,7 @@
versions:
- fixed: v1.3.1
description: |
- [`LoadURL`] does not check the Content-Type of loaded resources,
+ LoadURL does not check the Content-Type of loaded resources,
which can cause a panic due to nil pointer deference if the loaded
resource is not XML. If user supplied URLs are loaded, this may be
used as a denial of service vector.
diff --git a/reports/GO-2021-0051.yaml b/reports/GO-2021-0051.yaml
index 390d43b..22c9f8a 100644
--- a/reports/GO-2021-0051.yaml
+++ b/reports/GO-2021-0051.yaml
@@ -2,7 +2,7 @@
versions:
- fixed: v4.1.18-0.20201215153152-4422e3b66b9f
description: |
- Due to improper santization of user input on Windows, the static file handler
+ Due to improper sanitization of user input on Windows, the static file handler
allows for directory traversal, allowing an attacker to read files outside of
the target directory that the server has permission to read.
credit: "@little-cui (Apache ServiceComb)"
diff --git a/reports/GO-2021-0070.yaml b/reports/GO-2021-0070.yaml
index 4575ce2..46e3605 100644
--- a/reports/GO-2021-0070.yaml
+++ b/reports/GO-2021-0070.yaml
@@ -4,9 +4,9 @@
- fixed: v0.1.0
description: |
GetExecUser in the github.com/opencontainers/runc/libcontainer/user package will
- improperly interpred numeric UIDs as usernames. If the method is used without
- verify usernames are formatted as expected, it may allow a user to gain unexpected
- privileges.
+ improperly interpret numeric UIDs as usernames. If the method is used without
+ verifying that usernames are formatted as expected, it may allow a user to
+ gain unexpected privileges.
cves:
- CVE-2016-3697
symbols: