From dcc64e0f1530fbe5d528873977199ceeb715305d Mon Sep 17 00:00:00 2001 From: Mathieu Deous Date: Thu, 30 Aug 2018 14:30:43 +0200 Subject: Fix two typos in the readme --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) (limited to 'README.md') diff --git a/README.md b/README.md index 3960db5..115cd20 100644 --- a/README.md +++ b/README.md @@ -55,7 +55,7 @@ without having to touch the PHP code. * Close to zero performance impact * Powerful yet simple to write virtual-patching rules -* Killing several classes for vulnerabilities +* Killing several classes of vulnerabilities * [Unserialize-based](https://www.owasp.org/images/9/9e/Utilizing-Code-Reuse-Or-Return-Oriented-Programming-In-PHP-Application-Exploits.pdf) code execution * [`mail`-based]( https://blog.ripstech.com/2016/roundcube-command-execution-via-email/ ) code execution * Cookie-stealing [XSS]( https://en.wikipedia.org/wiki/Cross-site_scripting ) @@ -64,7 +64,7 @@ without having to touch the PHP code. * [XXE]( https://en.wikipedia.org/wiki/XML_external_entity_attack ) * Hardening features * Automatic `secure` and `samesite` flag for cookies - * Bundled set of rule to detect post-compromissions behaviours + * Bundled set of rules to detect post-compromissions behaviours * Global [strict mode]( https://secure.php.net/manual/en/migration70.new-features.php#migration70.new-features.scalar-type-declarations) and type-juggling prevention * Whitelisting of [stream wrappers](https://secure.php.net/manual/en/intro.stream.php) * Preventing writeable files execution -- cgit v1.3