diff options
author | sunpoet <sunpoet@FreeBSD.org> | 2015-01-10 02:51:32 +0800 |
---|---|---|
committer | sunpoet <sunpoet@FreeBSD.org> | 2015-01-10 02:51:32 +0800 |
commit | 36f1c2b6b6796d93025989074bcefd6e733a935c (patch) | |
tree | 710569aef27f458d52b5047956030202acbd95bd /security/vuxml | |
parent | a27150aad3cf1a68bd50f35b0c2f3bfef0ddbd73 (diff) | |
download | freebsd-ports-gnome-36f1c2b6b6796d93025989074bcefd6e733a935c.tar.gz freebsd-ports-gnome-36f1c2b6b6796d93025989074bcefd6e733a935c.tar.zst freebsd-ports-gnome-36f1c2b6b6796d93025989074bcefd6e733a935c.zip |
- Fix typo
Diffstat (limited to 'security/vuxml')
-rw-r--r-- | security/vuxml/vuln.xml | 32 |
1 files changed, 16 insertions, 16 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 677f578b8a76..01dffb945e90 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -95,7 +95,7 @@ Notes: </vuln> <vuln vid="e9ccdb28-9802-11e4-9d9c-bcaec565249c"> - <topic>WebKit-gtk -- Multiple vulnabilities</topic> + <topic>WebKit-gtk -- Multiple vulnerabilities</topic> <affects> <package> <name>webkit-gtk2</name> @@ -2637,7 +2637,7 @@ Notes: </vuln> <vuln vid="38242d51-3e58-11e4-ac2f-bcaec565249c"> - <topic>dbus -- multiple vulnabilities</topic> + <topic>dbus -- multiple vulnerabilities</topic> <affects> <package> <name>dbus</name> @@ -4013,7 +4013,7 @@ Notes: </vuln> <vuln vid="e6a7636a-02d0-11e4-88b6-080027671656"> - <topic>dbus -- multiple vulnabilities</topic> + <topic>dbus -- multiple vulnerabilities</topic> <affects> <package> <name>dbus</name> @@ -4697,7 +4697,7 @@ Notes: </vuln> <vuln vid="02db20d7-e34a-11e3-bd92-bcaec565249c"> - <topic>openjpeg -- Multiple vulnabilities</topic> + <topic>openjpeg -- Multiple vulnerabilities</topic> <affects> <package> <name>openjpeg</name> @@ -6278,7 +6278,7 @@ Notes: <body xmlns="http://www.w3.org/1999/xhtml"> <p>Google Chrome Releases reports:</p> <blockquote cite="http://googlechromereleases.blogspot.nl/"> - <p>New vulnerabilites after the Pwn2Own competition:</p> + <p>New vulnerabilities after the Pwn2Own competition:</p> <ul> <li>[352369] Code execution outside sandbox. Credit to VUPEN. <ul> @@ -20413,7 +20413,7 @@ executed in your Internet Explorer while displaying the email.</p> </vuln> <vuln vid="6dd5e45c-f084-11e1-8d0f-406186f3d89d"> - <topic>coppermine -- Multiple vulnerabilites</topic> + <topic>coppermine -- Multiple vulnerabilities</topic> <affects> <package> <name>coppermine</name> @@ -28732,7 +28732,7 @@ executed in your Internet Explorer while displaying the email.</p> </vuln> <vuln vid="f08e2c15-ffc9-11e0-b0f3-bcaec565249c"> - <topic>cacti -- Multiple vulnabilites</topic> + <topic>cacti -- Multiple vulnerabilities</topic> <affects> <package> <name>cacti</name> @@ -33798,7 +33798,7 @@ executed in your Internet Explorer while displaying the email.</p> </vuln> <vuln vid="06a12e26-142e-11e0-bea2-0015f2db7bde"> - <topic>webkit-gtk2 -- Multiple vulnabilities</topic> + <topic>webkit-gtk2 -- Multiple vulnerabilities</topic> <affects> <package> <name>webkit-gtk2</name> @@ -36742,7 +36742,7 @@ executed in your Internet Explorer while displaying the email.</p> </vuln> <vuln vid="9bcfd7b6-bcda-11df-9a6a-0015f2db7bde"> - <topic>webkit-gtk2 -- Multiple vulnabilities</topic> + <topic>webkit-gtk2 -- Multiple vulnerabilities</topic> <affects> <package> <name>webkit-gtk2</name> @@ -37706,7 +37706,7 @@ executed in your Internet Explorer while displaying the email.</p> </vuln> <vuln vid="19419b3b-92bd-11df-b140-0015f2db7bde"> - <topic>webkit-gtk2 -- Multiple vulnabilities</topic> + <topic>webkit-gtk2 -- Multiple vulnerabilities</topic> <affects> <package> <name>webkit-gtk2</name> @@ -45602,7 +45602,7 @@ executed in your Internet Explorer while displaying the email.</p> </vuln> <vuln vid="78f5606b-f9d1-11dd-b79c-0030843d3802"> - <topic>tor -- multiple vulnerabilites</topic> + <topic>tor -- multiple vulnerabilities</topic> <affects> <package> <name>tor</name> @@ -50758,7 +50758,7 @@ executed in your Internet Explorer while displaying the email.</p> </vuln> <vuln vid="35e54755-54e4-11dd-ad8b-0030843d3802"> - <topic>phpmyadmin -- cross site request forgery vulnerabilites</topic> + <topic>phpmyadmin -- cross site request forgery vulnerabilities</topic> <affects> <package> <name>phpMyAdmin</name> @@ -55761,7 +55761,7 @@ executed in your Internet Explorer while displaying the email.</p> </vuln> <vuln vid="a5f667db-7596-11dc-8b7a-0019b944b34e"> - <topic>xfs -- multiple vulnerabilites</topic> + <topic>xfs -- multiple vulnerabilities</topic> <affects> <package> <name>xfs</name> @@ -73924,7 +73924,7 @@ executed in your Internet Explorer while displaying the email.</p> <blockquote cite="http://www.gentoo.org/security/en/glsa/glsa-200506-04.xml"> <p>Due to a lack of input validation, WordPress is vulnerable to SQL injection and XSS attacks.</p> - <p>An attacker could use the SQL injection vulnerabilites to + <p>An attacker could use the SQL injection vulnerabilities to gain information from the database. Furthermore the cross-site scripting issues give an attacker the ability to inject and execute malicious script code or to steal @@ -75485,7 +75485,7 @@ executed in your Internet Explorer while displaying the email.</p> </affects> <description> <body xmlns="http://www.w3.org/1999/xhtml"> - <p>Erik Sjölund discovered a vulnerabilitiy in Sympa. The + <p>Erik Sjölund discovered a vulnerability in Sympa. The <code>queue</code> application processes messages received via aliases. It contains a buffer overflow in the usage of <code>sprintf</code>. In some configurations, it may allow an @@ -78114,7 +78114,7 @@ executed in your Internet Explorer while displaying the email.</p> </affects> <description> <body xmlns="http://www.w3.org/1999/xhtml"> - <p>Two separate SQL injection vulnerabilites have been + <p>Two separate SQL injection vulnerabilities have been identified in the PostNuke PHP content management system. An attacker can use this vulnerability to potentially insert executable PHP code into the content |