From: Josh Soref Date: Mon, 23 May 2022 02:00:56 +0000 (-0400) Subject: spelling: javascript X-Git-Tag: dnsdist-1.8.0-rc3~10^2~17 X-Git-Url: http://git.ipfire.org/?a=commitdiff_plain;h=09aca959f5724c5a2fc168376ec1b17dcfd3867a;p=thirdparty%2Fpdns.git spelling: javascript Signed-off-by: Josh Soref --- diff --git a/pdns/recursordist/docs/security-advisories/powerdns-advisory-2017-05.rst b/pdns/recursordist/docs/security-advisories/powerdns-advisory-2017-05.rst index 5ab5e4703c..c717d9c69d 100644 --- a/pdns/recursordist/docs/security-advisories/powerdns-advisory-2017-05.rst +++ b/pdns/recursordist/docs/security-advisories/powerdns-advisory-2017-05.rst @@ -15,7 +15,7 @@ PowerDNS Security Advisory 2017-05: Cross-Site Scripting in the web interface An issue has been found in the web interface of PowerDNS Recursor, where the qname of DNS queries was displayed without any escaping, allowing a remote -attacker to inject HTML and Javascript code into the web interface, altering +attacker to inject HTML and JavaScript code into the web interface, altering the content. This issue has been assigned CVE-2017-15092. PowerDNS Recursor from 4.0.0 up to and including 4.0.6 are affected.