From 09aca959f5724c5a2fc168376ec1b17dcfd3867a Mon Sep 17 00:00:00 2001 From: Josh Soref Date: Sun, 22 May 2022 22:00:56 -0400 Subject: [PATCH] spelling: javascript Signed-off-by: Josh Soref --- .../docs/security-advisories/powerdns-advisory-2017-05.rst | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/pdns/recursordist/docs/security-advisories/powerdns-advisory-2017-05.rst b/pdns/recursordist/docs/security-advisories/powerdns-advisory-2017-05.rst index 5ab5e4703c..c717d9c69d 100644 --- a/pdns/recursordist/docs/security-advisories/powerdns-advisory-2017-05.rst +++ b/pdns/recursordist/docs/security-advisories/powerdns-advisory-2017-05.rst @@ -15,7 +15,7 @@ PowerDNS Security Advisory 2017-05: Cross-Site Scripting in the web interface An issue has been found in the web interface of PowerDNS Recursor, where the qname of DNS queries was displayed without any escaping, allowing a remote -attacker to inject HTML and Javascript code into the web interface, altering +attacker to inject HTML and JavaScript code into the web interface, altering the content. This issue has been assigned CVE-2017-15092. PowerDNS Recursor from 4.0.0 up to and including 4.0.6 are affected. -- 2.47.2