Fred Drake avatar Fred Drake committed 982eb76

fix typos

Comments (0)

Files changed (1)

 -------------
 
 This case is similar to external entity expansion, too. Some XML libraries
-like Python's xml.dom.pulldown retrieve document type definitions from remote
+like Python's xml.dom.pulldom retrieve document type definitions from remote
 or local locations. Several attack scenarios from the external entity case
 apply to this issue as well.
 
      148K zeros.xy
 
 None of Python's standard XML libraries decompress streams except for
-``xmlrpclib``. The module vulnerable <http://bugs.python.org/issue16043>
+``xmlrpclib``. The module is vulnerable <http://bugs.python.org/issue16043>
 to decompression bombs.
 
 lxml can load and process compressed data through libxml2 transparently.
Tip: Filter by directory path e.g. /media app.js to search for public/media/app.js.
Tip: Use camelCasing e.g. ProjME to search for ProjectModifiedEvent.java.
Tip: Filter by extension type e.g. /repo .js to search for all .js files in the /repo directory.
Tip: Separate your search with spaces e.g. /ssh pom.xml to search for src/ssh/pom.xml.
Tip: Use ↑ and ↓ arrow keys to navigate and return to view the file.
Tip: You can also navigate files with Ctrl+j (next) and Ctrl+k (previous) and view the file with Ctrl+o.
Tip: You can also navigate files with Alt+j (next) and Alt+k (previous) and view the file with Alt+o.