Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 9 Jan 2015 18:51:33 +0000 (UTC)
From:      Sunpoet Po-Chuan Hsieh <sunpoet@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r376643 - head/security/vuxml
Message-ID:  <201501091851.t09IpXE0019817@svn.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: sunpoet
Date: Fri Jan  9 18:51:32 2015
New Revision: 376643
URL: https://svnweb.freebsd.org/changeset/ports/376643
QAT: https://qat.redports.org/buildarchive/r376643/

Log:
  - Fix typo

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Fri Jan  9 18:47:03 2015	(r376642)
+++ head/security/vuxml/vuln.xml	Fri Jan  9 18:51:32 2015	(r376643)
@@ -95,7 +95,7 @@ Notes:
   </vuln>
 
   <vuln vid="e9ccdb28-9802-11e4-9d9c-bcaec565249c">
-    <topic>WebKit-gtk -- Multiple vulnabilities</topic>
+    <topic>WebKit-gtk -- Multiple vulnerabilities</topic>
     <affects>
       <package>
 	<name>webkit-gtk2</name>
@@ -2637,7 +2637,7 @@ Notes:
   </vuln>
 
   <vuln vid="38242d51-3e58-11e4-ac2f-bcaec565249c">
-    <topic>dbus -- multiple vulnabilities</topic>
+    <topic>dbus -- multiple vulnerabilities</topic>
     <affects>
       <package>
 	<name>dbus</name>
@@ -4013,7 +4013,7 @@ Notes:
   </vuln>
 
   <vuln vid="e6a7636a-02d0-11e4-88b6-080027671656">
-    <topic>dbus -- multiple vulnabilities</topic>
+    <topic>dbus -- multiple vulnerabilities</topic>
     <affects>
       <package>
 	<name>dbus</name>
@@ -4697,7 +4697,7 @@ Notes:
   </vuln>
 
   <vuln vid="02db20d7-e34a-11e3-bd92-bcaec565249c">
-    <topic>openjpeg -- Multiple vulnabilities</topic>
+    <topic>openjpeg -- Multiple vulnerabilities</topic>
     <affects>
       <package>
 	<name>openjpeg</name>
@@ -6278,7 +6278,7 @@ Notes:
       <body xmlns="http://www.w3.org/1999/xhtml">;
 	<p>Google Chrome Releases reports:</p>
 	<blockquote cite="http://googlechromereleases.blogspot.nl/">;
-	  <p>New vulnerabilites after the Pwn2Own competition:</p>
+	  <p>New vulnerabilities after the Pwn2Own competition:</p>
 	  <ul>
 	    <li>[352369] Code execution outside sandbox. Credit to VUPEN.
 	      <ul>
@@ -20413,7 +20413,7 @@ executed in your Internet Explorer while
   </vuln>
 
   <vuln vid="6dd5e45c-f084-11e1-8d0f-406186f3d89d">
-    <topic>coppermine -- Multiple vulnerabilites</topic>
+    <topic>coppermine -- Multiple vulnerabilities</topic>
     <affects>
       <package>
 	<name>coppermine</name>
@@ -28732,7 +28732,7 @@ executed in your Internet Explorer while
   </vuln>
 
   <vuln vid="f08e2c15-ffc9-11e0-b0f3-bcaec565249c">
-    <topic>cacti -- Multiple vulnabilites</topic>
+    <topic>cacti -- Multiple vulnerabilities</topic>
     <affects>
       <package>
 	<name>cacti</name>
@@ -33798,7 +33798,7 @@ executed in your Internet Explorer while
   </vuln>
 
   <vuln vid="06a12e26-142e-11e0-bea2-0015f2db7bde">
-    <topic>webkit-gtk2 -- Multiple vulnabilities</topic>
+    <topic>webkit-gtk2 -- Multiple vulnerabilities</topic>
     <affects>
       <package>
 	<name>webkit-gtk2</name>
@@ -36742,7 +36742,7 @@ executed in your Internet Explorer while
   </vuln>
 
   <vuln vid="9bcfd7b6-bcda-11df-9a6a-0015f2db7bde">
-    <topic>webkit-gtk2 -- Multiple vulnabilities</topic>
+    <topic>webkit-gtk2 -- Multiple vulnerabilities</topic>
     <affects>
       <package>
 	<name>webkit-gtk2</name>
@@ -37706,7 +37706,7 @@ executed in your Internet Explorer while
   </vuln>
 
   <vuln vid="19419b3b-92bd-11df-b140-0015f2db7bde">
-    <topic>webkit-gtk2 -- Multiple vulnabilities</topic>
+    <topic>webkit-gtk2 -- Multiple vulnerabilities</topic>
     <affects>
       <package>
 	<name>webkit-gtk2</name>
@@ -45602,7 +45602,7 @@ executed in your Internet Explorer while
   </vuln>
 
   <vuln vid="78f5606b-f9d1-11dd-b79c-0030843d3802">
-    <topic>tor -- multiple vulnerabilites</topic>
+    <topic>tor -- multiple vulnerabilities</topic>
     <affects>
       <package>
 	<name>tor</name>
@@ -50758,7 +50758,7 @@ executed in your Internet Explorer while
   </vuln>
 
   <vuln vid="35e54755-54e4-11dd-ad8b-0030843d3802">
-    <topic>phpmyadmin -- cross site request forgery vulnerabilites</topic>
+    <topic>phpmyadmin -- cross site request forgery vulnerabilities</topic>
     <affects>
       <package>
 	<name>phpMyAdmin</name>
@@ -55761,7 +55761,7 @@ executed in your Internet Explorer while
   </vuln>
 
   <vuln vid="a5f667db-7596-11dc-8b7a-0019b944b34e">
-    <topic>xfs -- multiple vulnerabilites</topic>
+    <topic>xfs -- multiple vulnerabilities</topic>
     <affects>
       <package>
 	<name>xfs</name>
@@ -73924,7 +73924,7 @@ executed in your Internet Explorer while
 	<blockquote cite="http://www.gentoo.org/security/en/glsa/glsa-200506-04.xml">;
 	  <p>Due to a lack of input validation, WordPress is
 	    vulnerable to SQL injection and XSS attacks.</p>
-	  <p>An attacker could use the SQL injection vulnerabilites to
+	  <p>An attacker could use the SQL injection vulnerabilities to
 	    gain information from the database. Furthermore the
 	    cross-site scripting issues give an attacker the ability
 	    to inject and execute malicious script code or to steal
@@ -75485,7 +75485,7 @@ executed in your Internet Explorer while
     </affects>
     <description>
       <body xmlns="http://www.w3.org/1999/xhtml">;
-	<p>Erik Sjölund discovered a vulnerabilitiy in Sympa.  The
+	<p>Erik Sjölund discovered a vulnerability in Sympa.  The
 	  <code>queue</code> application processes messages received via
 	  aliases.  It contains a buffer overflow in the usage of
 	  <code>sprintf</code>.  In some configurations, it may allow an
@@ -78114,7 +78114,7 @@ executed in your Internet Explorer while
     </affects>
     <description>
       <body xmlns="http://www.w3.org/1999/xhtml">;
-	<p>Two separate SQL injection vulnerabilites have been
+	<p>Two separate SQL injection vulnerabilities have been
 	   identified in the PostNuke PHP content management
 	   system. An attacker can use this vulnerability to
 	   potentially insert executable PHP code into the content



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201501091851.t09IpXE0019817>