diff --git a/docs/CVE-2024-6197.md b/docs/CVE-2024-6197.md index 0b10a2f1f5..699fd934c5 100644 --- a/docs/CVE-2024-6197.md +++ b/docs/CVE-2024-6197.md @@ -18,7 +18,7 @@ available chunks. This leads to the overwriting of nearby stack memory. The content of the overwrite is decided by the `free()` implementation; likely to be memory pointers and a set of flags. -The most likely outcome of exploting this flaw is a crash, although it cannot +The most likely outcome of exploiting this flaw is a crash, although it cannot be ruled out that more serious results can be had in special circumstances. INFO diff --git a/docs/CVE-2024-6874.md b/docs/CVE-2024-6874.md index cfec9b666d..eb20783b67 100644 --- a/docs/CVE-2024-6874.md +++ b/docs/CVE-2024-6874.md @@ -14,7 +14,7 @@ bytes, libcurl ends up reading outside of a stack based buffer when built to use the *macidn* IDN backend. The conversion function then fills up the provided buffer exactly - but does not null terminate the string. -This flaw can lead to stack contents accidently getting returned as part of +This flaw can lead to stack contents accidentally getting returned as part of the converted string. INFO